系統識別號 | U0002-1706200813481800 |
---|---|
DOI | 10.6846/TKU.2008.00475 |
論文名稱(中文) | 實用的匿名代理簽章 |
論文名稱(英文) | Practical anonymous proxy signature schemes |
第三語言論文名稱 | |
校院名稱 | 淡江大學 |
系所名稱(中文) | 資訊工程學系碩士在職專班 |
系所名稱(英文) | Department of Computer Science and Information Engineering |
外國學位學校名稱 | |
外國學位學院名稱 | |
外國學位研究所名稱 | |
學年度 | 96 |
學期 | 2 |
出版年 | 97 |
研究生(中文) | 徐碧鴻 |
研究生(英文) | Pi-Hung Hsu |
學號 | 795410132 |
學位類別 | 碩士 |
語言別 | 繁體中文 |
第二語言別 | 英文 |
口試日期 | 2008-05-26 |
論文頁數 | 38頁 |
口試委員 |
指導教授
-
黃心嘉(sjhwang@mail.tku.edu.tw)
委員 - 顏嵩銘 委員 - 黃仁俊 |
關鍵字(中) |
匿名性 代理簽章 保護代理簽章 同時簽章法 |
關鍵字(英) |
Anonymity proxy protection proxy signatures concurrent signatures |
第三語言關鍵字 | |
學科別分類 | |
中文摘要 |
代理簽章的架構主要是由原始簽章者授權給代理簽章者,代替原始簽章者去簽署文件;於現實世界中,衍生保護代理簽章者的需求,因此匿名的代理簽章架構主要是為了保護代理簽章者的隱私權而產生。最早的代理簽章觀念,於1996年由日本學者所提出,陸續有許多相關的論文相繼產生。於2002年,Sum 及Wei提出了一套實用的代理簽章架構,採用匿名憑證中心的觀念,核發匿名憑證給代理簽章者,但該架構被證實並沒有符合不可偽造的特性。因此,我們期望可以發展出一套的匿名代理簽章架構,符合匿名簽章應包含的特性及實用性。為了達成該需求,將導入同時簽章法(Concurrent signatures)的特性於匿名簽章申請階段,並證明該架構的安全性。 |
英文摘要 |
Proxy signature schemes with anonymous proxy signers are called anonymous proxy signature schemes. Anonymous proxy signature schemes are used to protect proxy signers’ privacy. Among the proposed anonymous proxy signature schemes, Sum and Wei’s scheme is more practical than the other proposed scheme. However, their scheme does not satisfy strong unforgeability. Here, a new practical anonymous proxy signature scheme is first proposed with the help of concurrent signature schemes. In the new scheme, the anonymous names of proxy signers keep secret before use to protect proxy signers’ privacy. |
第三語言摘要 | |
論文目次 |
Chapter 1 Introduction I Chapter 2 Review of asymmetric concurrent signature algorithms 5 2.1. Two promises of signatures schemes 5 2.2. Asymmetric concurrent signature schemes 6 2.3. Asymmetric Concurrent signature protocol 9 Chapter 3 Our scheme with trusted alias issuing authority 11 3.1 Underlying algorithms 11 3.2 Our scheme with trusted authority 12 3.3 Security analysis 16 Chapter 4 Our scheme without trusted alias issuing authority 20 4.1. Our scheme without trusted alias issuing authority 20 4.2. Security analysis 24 Chapter 5 Discussions and Conclusions 27 References 28 Appendix-A practical anonymous proxy signature scheme with trusted alias issuing authority 30 |
參考文獻 |
[1] Chen, L., Kudla, C., and Paterson, K. G., “Concurrent signatures,” Eurocrypt ’04, LNCS 3027, New York: Spriger-Verlag, pp. 287-305, 2004. [2] Hwang, Shin-Jia and Shi, Chi-Hwai, “A proxy signature scheme without using one-way hash functions,” 2000 International computer symposium, Chiayi, Taiwan, R.O.C., Dec. 6-8, pp. 60-64, 2000. [3] Hwang, Shin-Jia and Shi, Chi-Hwai, “The specifiable proxy signature,” National computer symposium 1999, Vol. 1334, Taiwan, pp. 190-197, December 1999. [4] Kim, S., Park, S., and Won, D., “Proxy signatures, revisited,” ICICS ’97, LNCS 1334, New York: Springer, Berlin, pp. 223-232, 1997. [5] Khanh Nguyen, “Asymmetric concurrent signatures,” Information and Communications Security Conference, ICICS 2005, Lecture Notes in Computer Science 3783, pp.181-193, Springer-Verlag, 2005. [6] Li, Li-Hua, Tzeng, Shiang-Feng, and Hwang, Min-Shiang, “Generalization of proxy signature-based on discrete logarithms,” Computers & Security, Vol. 22, No. 3, pp. 245-255, 2003. [7] Lee, Narn-Yih, Hwang, Tzonelih, and Wang, Chin Hung, “On Zhang’s nonrepudiable proxy signature schemes,” Third Australasian Conference, ACISP ’98, pp. 415-422, 1998. [8] Lee, Narn-Yih and Lee, Ming-Feng, “The security of a strong proxy signature scheme with proxy signer privacy protection,” Applied Mathematics and Computation, Vol. 161, pp. 807-812, 2005. [9] MAMBO, Masahiro, USUDA Keisuke, and OKAMOTO, Eiji, “Proxy signatures: Delegation of the power to sign message,” IEICE. Trans. Fundamentals, E79-A, 9, pp. 1338-1354, 1996. [10] MAMBO, Masahiro, USUDA, Keisuke, and OKAMOTO, Eiji, “Proxy signatures for delegation signing operation,“ Proc. 3nd ACM Conference on Computer and Communication Security, pp. 48-57, 1996. [11] Mehta, M. and Harn L. “Efficient one-time proxy signatures,” IEE Proc.-Commun., Vol. 152, No. 2, April 2005 [12] Shum, K. and Wei, Victor K., “A strong proxy signature scheme with proxy signer privacy protection,” Proceedings of the IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE’02), pp. 55-56, 2002. [13] Schnorr, C.P., “Efficient identification and signatures for smart cards,” Advances in Cryptology - CRYPTO 1989, Lecture Notes in Computer Science 435, pp.239-252, Springer-Verlag, 1990. [14] Wang, Guilin, Bao, Feng, and Zhou, Jianying, “The Fairness of Perfect Concurrent Signatures,” ICICS 06, LNCS 4307, New York: Spriger- Verlag, pp. 435-451, 2006. |
論文全文使用權限 |
如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信