系統識別號 | U0002-2506200915281100 |
---|---|
DOI | 10.6846/TKU.2009.00945 |
論文名稱(中文) | 具強指定驗證者的匿名環簽章 |
論文名稱(英文) | An Anonymous Ring Signature Scheme with Strong Specified Verifiers |
第三語言論文名稱 | |
校院名稱 | 淡江大學 |
系所名稱(中文) | 資訊工程學系碩士班 |
系所名稱(英文) | Department of Computer Science and Information Engineering |
外國學位學校名稱 | |
外國學位學院名稱 | |
外國學位研究所名稱 | |
學年度 | 97 |
學期 | 2 |
出版年 | 98 |
研究生(中文) | 鄭凱隆 |
研究生(英文) | Kai-Lung Cheng |
學號 | 696410546 |
學位類別 | 碩士 |
語言別 | 英文 |
第二語言別 | |
口試日期 | 2009-06-15 |
論文頁數 | 31頁 |
口試委員 |
指導教授
-
黃心嘉(sjhwang@mail.tku.edu.tw)
委員 - 顏嵩銘(yensm@csie.ncu.edu.tw) 委員 - 何煒華(whhe@csim.scu.edu.tw) 委員 - 黃仁俊 |
關鍵字(中) |
環簽章 指定驗證者 匿名 |
關鍵字(英) |
Ring signature specified verifier anonymity random oracle model |
第三語言關鍵字 | |
學科別分類 | |
中文摘要 |
為了對簽章者提供更高的匿名性,我們提出了具強指定驗證者的匿名環簽章。在具強指定驗證者的匿名環簽章中,對指定驗證者而言簽章者必定是環成員的其中一人,而對其他人而言簽章者卻有可能是任何人。所以在指定驗證者眼中,此簽章對簽章者的隱私提供了簽章者模糊性,而在其他任何人眼中,此簽章則是對簽章者的隱私提供了簽章者匿名性。為了能達到簽章者的匿名性,我們希望讓所有人都能偽造此簽章。而為了能達到簽章者的模糊性及確保簽章的可信度,我們希望讓指定驗證者仍然可以驗證簽章的合法性,確認是由環成員中的某一人所簽署。在我們方法中為了確保簽章者的利益,提供了可以讓簽章者證明該簽章是他所簽署的演算法。最後我們在安全分析上也證明了我們的方法是滿足環簽章的正確性及不可偽造性。 |
英文摘要 |
To provide more anonymous protection for the actual signer, the first ring signatures with strong specified verifiers is proposed in 2007. In the ring signature scheme with strong specified verifiers, any member in the ad-hoc ring is able to generate ring signatures, so ring signatures provide signer ambiguity to protect the actual signer’s anonymity. Moreover, only the specified verifier is convinced that the actual signer is one of the ring members. The other only guesses the actual signer may be one of the ring members and the specified verifier. If the other one guesses the actual signer being not only the ring members but also any possible ones, the scheme with strong specified verifiers provides the maximum anonymity protection for the actual signer. In order to convince the specified verifier, the specified verifier is still sure that the actual signer is one of the ring members. Therefore, the first anonymous ring signature scheme with strong specified verifiers is proposed. In our scheme, the signer admission is also provided for the actual singer to prove who the actual signer is. The provable security analysis is provided to show that our scheme satisfies the ring signatures’ correctness and unforgeability. |
第三語言摘要 | |
論文目次 |
Chapter 1 Introduction………………………………………p. 1 Chapter 2 Review………………………………………………p. 6 2.1 Schnorr Signature Scheme and Corresponding Promises ……………………………………………………………………p. 6 2.2 Generalized Ring Signature Scheme based on ElGamal Signature Scheme ……………………………………………p. 7 2.3 Underlying Hard Problems………………………………p. 10 Chapter 3 Our Anonymous Ring Signature Scheme with Strong Specified Verifiers …………………………………………p. 12 3.1 Formal Definition of Our Scheme ……………………p. 12 3.2 Formal Security Model …………………………………p. 13 3.3 Our Concrete Scheme……………………………………p. 14 Chapter 4 Security Analysis………………………………p. 17 Chapter 5 Performance Analysis and Discussions………p. 25 Chapter 6 Conclusions………………………………………p. 28 References………………………………………………………p. 29 Table 1: Anonymity Comparison with Other Ring Signatures with Specified Verifiers……………………………………p. 27 Table 2: Performance Analysis of Our Scheme…………p. 27 |
參考文獻 |
[1] M. Abe, M. Ohkubo, and K. Suzuki, “1-out-of-n Signatures from a Variety of Keys,” Advances in Cryptology-ASIACRYPT 2002, LNCS 2501, Berlin: Springer Verlag, 2002, pp.415-432. [2] G. Ateniese, “Efficient Verifiable Encryption (and Fair Exchange) of Digital Signature,” Proceedings of 6th ACM Conference on Computer and Communications Security, New York: ACM, 1999, pp. 138-146. [3] D. Chaum and E. V. Heyst, “Group signatures,” Advances in Cryptology-Eurocrypt’91, LNCS 547, New York: Springer Verlag, 1991, pp. 257-265. [4] W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, Vol. 22, Issue 6, pp. 644-654, Nov. 1976. [5] T. A. ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, July. 1985. [6] C. Gamage, B. Gras, B. Crispo, and A. S Tanenbaum, “An Identity-based Ring Signature Scheme with Enhanced Privacy,” Securecomm and Workshops, Baltimore, MD, Aug. 28-Sep. 1, 2006, pp. 1-5. [7] S. Goldwasser, S. Micali, and R. L. Rivest, “A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks,” SIAM Journal on Computing, Vol. 17, Issue 2, pp. 281-308, 1988. [8] M. Jakobsson, K. Sako and R. Impagliazzo, “Designated Verifier Proofs and Their Applications,” Advances in Cryptology-Eurocrypt’96, LNCS 1070, Berlin: Springer Verlag, 1996, pp.143-154. [9] J. S. Lee and J. H. Chang, “Strong Designated Verifier Ring Signature Scheme,” Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, Netherlands: Springer Verlag, 2007, pp.543-547. [10] J. K. Liu, V. K. Wei, and D. S. Wong, “Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups,” Information Security and Privacy, LNCS 3108, Berlin: Springer Verlag, 2004, pp. 325-335. [11] J. Lv and X. Wang, “Verifiable Ring Signature,” Proceedings of DMS- The 9th International Conference on Distributed Multimedia Systems, Miami, Florida, USA, Sep. 2003, pp. 663-667. [12] M. Naor, “Deniable Ring Authentication,” Advances in Cryptology-CRYPTO 2002, LNCS 2442, Berlin: Springer Verlag, 2002, pp. 481-498. [13] K. Nguyen, “Asymmetric Concurrent Signatures,” Information and Communications Security, LNCS 3783, Berlin: Springer Verlag, 2005, pp. 181-193. [14] D. Pointcheval and J. Stern, “Security Arguments for Digital Signatures and Blind Signatures,” Journal of Cryptology, Vol. 13, No. 3, New York: Springer Verlag, pp. 361-396, Dec. 2000. [15] J. Ren and L. Harn, “Generalized Ring Signature,” IEEE Transactions on Dependable and Secure Computing, Vol. 5, Issue 3, pp. 155-163, July-Sept. 2008. [16] R. L. Rivest, A. Shamir, and Y. Tauman, “How to Leak a Secret,” Advances in Cryptology-ASIACRYPT 2001, LNCS 2248, Berlin: Springer Verlag, 2001, pp. 552-565. [17] C. P. Schnorr, “Efficient Identification and Signatures for Smart Cards,” Advances in Cryptology-CRYPTO’89 Proceedings, LNCS 435, Berlin: Springer Verlag, 1990, pp. 239-252. [18] L. Wu and D. Li, “Strong Designated Verifier ID-Based Ring Signature Scheme,” Information Science and Engineering, 2008, ISISE’08, International Symposium, Vol. 1, Shanghai, People's Republic of China, Dec. 20-22, 2008, pp.294-298. [19] F. Zhang and K. Kim, “ID-Based Blind Signature and Ring Signature from Pairings,” Advances in Cryptology-ASIACRYPT 2002, LNCS 2501, Berlin: Springer Verlag, 2002, pp. 533-547. [20] J. Zhang and J. Xie, “A Novel Ring Signature Scheme with Multi-designated Verifiers,” IEEE International Conference on Cybernetics and Intelligent Systems, Chengdu, People's Republic of China, Sep. 21-24, 2008, pp.873-877. |
論文全文使用權限 |
如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信