Dissertation > Excellent graduate degree dissertation topics show

A Study and Design of Threshold Proxy Signature

Author: WeiLong
Tutor: PengDaiYuan
School: Southwest Jiaotong University
Course: Cryptography
Keywords: Proxy signature Threshold proxy signature Verifiable secret sharing Elliptic Curve Cryptography
CLC: TN918.1
Type: Master's thesis
Year: 2005
Downloads: 122
Quote: 0
Read: Download Dissertation


In 1996 , Mambo, Usuda and Okamoto proposed the concept of proxy signature , that is, in a proxy signature scheme , a designated proxy signer can generate a valid proxy signature on behalf of the original signer . Since then many of the special requirements of proxy signature environment for the deformation method has been proposed , a (t, n) door limit proxy signature refers to : the the proxy signature group of n individuals , only t a or t or more of the people in order on behalf of the original signer the completed proxy signature information . Threshold proxy signature more secure, decentralized management rights and good nature and widespread concern . Verifiable secret sharing mechanism is a useful tool for protecting important and sensitive information is the design threshold cryptosystem important techniques , have applications in most of the threshold proxy signature scheme . This paper first introduces the Lagrange interpolation formula , it is important mathematical foundations verifiable secret sharing mechanism , and then highlights and analysis of the wide use several typical threshold proxy signature verifiable secret sharing protocol . Existing threshold proxy signature scheme is mostly based on the discrete logarithm problem (also part based on RSA ) This paper presents an elliptic curve discrete logarithm threshold proxy signature scheme . Compared with ordinary discrete logarithm , elliptic curve cryptography has a unique advantage in terms of safety performance , key length, processing speed , system parameters , bandwidth requirements . In the introduction of a more classic threshold proxy signature mechanism SLH program based on a threshold proxy signature mechanism and the mechanism SLH program . The mechanism has a good performance , proxy signature scheme is based on elliptic curve cryptography , key and signature length is shorter . New threshold proxy signature scheme based on the use of VC programming , analog threshold proxy signature signing process , to provide a reference for the software implementation . Finally, we use threshold proxy signature concept of a new anti - fraud electronic trading program .

Related Dissertations

  1. Secret sharing scheme,TN918.1
  2. Design of Secure E-mail System Based on Encryption,TP393.098
  3. The Reserch on Efficient Divisible E-Cash Based on ECC,TP393.09
  4. Researches on Threshold Proxy Signature Schemes and Multi-level Proxy Signature Schemes,TN918.1
  5. Research on Verifiable Secret Sharing Scheme,TN918.1
  6. Combination of public key cryptosystem key management center Research and Implementation,TP393.08
  7. The special proxy signature analysis and improvement,TN918.1
  8. Research and Application of Elliptic Curve Cryptosystems,TN918.1
  9. Some special digital signature scheme analysis, design and applied research,TN918.1
  10. The Research of Secret Sharing Encryption Without Trusted Center,TN918.1
  11. Security Analysis and Improvement on Deterministic Random Bit Generators,TN918.2
  12. Research on Technology of Application Specific Instruction and Reconfigurable Unit of Elliptic Curve Cryptography Coprocessor Design,TN918.2
  13. Research on Public Key Digital Watermarking Based on ECC,TP309.7
  14. Research and Design of Special Proxy Signature,TN918.1
  15. Wireless sensor networks based on elliptic curve cryptography certification program design and implementation,TP212.9
  16. Research on Elliptic Curve Cryptosystem over OEF and Its Application,TN918.1
  17. Verifiably encrypted signature and its applications,TN918.1
  18. Research of Forward-secure Digital Signature Scheme Based on Owe-way Hash Chain,TN918.1
  19. Research and Application of Elliptic Curve Cryptography and SHA-1 algorithm in the VOIP voice encryption,TP309.7
  20. Java smart card security analysis and research,TN409
  21. An identity-based proxy signature without trusted PKG,TN918

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net  Mobile