Dissertation > Excellent graduate degree dissertation topics show

The Research of Anonymous Proxy Signature

Author: DengChangBing
Tutor: XuLanFang
School: Huazhong University of Science and Technology
Course: Information Security
Keywords: digital signature proxy signature anonymous discrete logarithm elliptic curve cryptosystem security
CLC: TN918
Type: Master's thesis
Year: 2007
Downloads: 45
Quote: 0
Read: Download Dissertation

Abstract


With the development of networks and the wide application of information system, there are increasing demands on processing various digital documents in systems of E-Government and E-Commerce. Being a legal replacement for handwritten signatures, digital signature is sure to be more extensively used in the coming years. In 1996, Mambo, Usudu and Okamoto firstly proposed and systematically expounded the concept of proxy signature. If the original signer and the proxy signer have the protocal with the law efficacity, the proxy signer may substitute the original signer to sign the file. As a special digital signature, proxy signature has many important applications in E-commerce, E-elections and mobile agents etc. But there exist some anonymous problems, such as the protection of proxy signer’s privacy and the confidentiality of content and so on, which arouse extensive research.After analyzing the flaws and loopholes in the existing proxy signature schemes, we propose three improved schemes, which have higher security and overcome the existing shortcomings in the original schemes. In addition, we propose a anonymous proxy signature based on the elliptic curve crypotosystem, which has the characters of high security and less length of key. Compared with the schemes based on the discrete logarithm problem, the scheme has higher security.The anonymous proxy signature scheme with a credible third party and the anonymous proxy signature scheme without a credible third party are both the anonymous proxy signature schemes based on the protection of proxy signer’s privacy and both have certain shortcomings and loopholes, such as original signer’s forgery attacks and original signer’s public key substitution attacks and so on. Against the defects of the anonymous proxy signature scheme without a credible third party, we present an improved scheme with higher security, which eliminates the above attacks and satisfies the safety requirements of the anonymous proxy signature based on the protection of proxy signer’s privacy. The anonymous proxy signature scheme based on the confidentiality of content possesses the defects of designated recipient’s forgery attacks and abuse of authority by the proxy signer. The two improved anonymous proxy schemes can overcome the above flaws and satisfy the safety requirements of the anonymous proxy signature based on the confidentiality of content.

Related Dissertations

  1. Subliminal Channel in Multisignature,TN918.1
  2. Study on System of Electronic Documetnt Security Signature,TN918.2
  3. Design and Implementation of Windows Kernel-mode Cryptographic Service Interface,TP309.7
  4. The Design and Implementation of Security Mechanism of Embedded Dependable Computer,TP309
  5. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  6. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  7. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  8. Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
  9. Military exercises in the Corps of Engineers engineering equipment maintenance to protect the allocation of resources,E251.2
  10. Implementation and Research of Illegal Websites Detection System Based on Comparison Methods,TP393.08
  11. Study on US Veterans’ Social Security System and Its Enlightenment to China,E712
  12. Yellow phosphorus storage tank area of Safety Evaluation,TQ126.317
  13. The Study of Social Security System of the Fishermen of Guangdong after the Beibu Gulf Demarcation,F323.89
  14. Health protection of migrant workers,D412.6
  15. Research on Selection and Construction of the China’s Social Security Budget Pattern,D632.1
  16. Comprehensive Evaluation of Ecological Security of Land Application,X826
  17. Study on Evaluation Index System for Land Ecological Security,X826
  18. Urban Community Security Service Research in Terms of New Public Service Theory,D631.4
  19. Research on the Social Security of Fishermen under the Harmonious Society,D632.1
  20. Genetically Modified Food Ethics,B82-05
  21. On the systematic construction of the Chinese Communist Party democracy,D262.11

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security
© 2012 www.DissertationTopic.Net  Mobile