淡江大學覺生紀念圖書館 (TKU Library)
進階搜尋


下載電子全文限經由淡江IP使用) 
系統識別號 U0002-2506200915281100
中文論文名稱 具強指定驗證者的匿名環簽章
英文論文名稱 An Anonymous Ring Signature Scheme with Strong Specified Verifiers
校院名稱 淡江大學
系所名稱(中) 資訊工程學系碩士班
系所名稱(英) Department of Computer Science and Information Engineering
學年度 97
學期 2
出版年 98
研究生中文姓名 鄭凱隆
研究生英文姓名 Kai-Lung Cheng
學號 696410546
學位類別 碩士
語文別 英文
口試日期 2009-06-15
論文頁數 31頁
口試委員 指導教授-黃心嘉
委員-顏嵩銘
委員-何煒華
委員-黃仁俊
中文關鍵字 環簽章  指定驗證者  匿名 
英文關鍵字 Ring signature  specified verifier  anonymity  random oracle model 
學科別分類 學科別應用科學資訊工程
中文摘要 為了對簽章者提供更高的匿名性,我們提出了具強指定驗證者的匿名環簽章。在具強指定驗證者的匿名環簽章中,對指定驗證者而言簽章者必定是環成員的其中一人,而對其他人而言簽章者卻有可能是任何人。所以在指定驗證者眼中,此簽章對簽章者的隱私提供了簽章者模糊性,而在其他任何人眼中,此簽章則是對簽章者的隱私提供了簽章者匿名性。為了能達到簽章者的匿名性,我們希望讓所有人都能偽造此簽章。而為了能達到簽章者的模糊性及確保簽章的可信度,我們希望讓指定驗證者仍然可以驗證簽章的合法性,確認是由環成員中的某一人所簽署。在我們方法中為了確保簽章者的利益,提供了可以讓簽章者證明該簽章是他所簽署的演算法。最後我們在安全分析上也證明了我們的方法是滿足環簽章的正確性及不可偽造性。
英文摘要 To provide more anonymous protection for the actual signer, the first ring signatures with strong specified verifiers is proposed in 2007. In the ring signature scheme with strong specified verifiers, any member in the ad-hoc ring is able to generate ring signatures, so ring signatures provide signer ambiguity to protect the actual signer’s anonymity. Moreover, only the specified verifier is convinced that the actual signer is one of the ring members. The other only guesses the actual signer may be one of the ring members and the specified verifier. If the other one guesses the actual signer being not only the ring members but also any possible ones, the scheme with strong specified verifiers provides the maximum anonymity protection for the actual signer. In order to convince the specified verifier, the specified verifier is still sure that the actual signer is one of the ring members. Therefore, the first anonymous ring signature scheme with strong specified verifiers is proposed. In our scheme, the signer admission is also provided for the actual singer to prove who the actual signer is. The provable security analysis is provided to show that our scheme satisfies the ring signatures’ correctness and unforgeability.
論文目次 Chapter 1 Introduction………………………………………p. 1

Chapter 2 Review………………………………………………p. 6

2.1 Schnorr Signature Scheme and Corresponding Promises ……………………………………………………………………p. 6

2.2 Generalized Ring Signature Scheme based on ElGamal Signature Scheme ……………………………………………p. 7

2.3 Underlying Hard Problems………………………………p. 10

Chapter 3 Our Anonymous Ring Signature Scheme with Strong Specified Verifiers …………………………………………p. 12

3.1 Formal Definition of Our Scheme ……………………p. 12

3.2 Formal Security Model …………………………………p. 13

3.3 Our Concrete Scheme……………………………………p. 14

Chapter 4 Security Analysis………………………………p. 17

Chapter 5 Performance Analysis and Discussions………p. 25

Chapter 6 Conclusions………………………………………p. 28

References………………………………………………………p. 29

Table 1: Anonymity Comparison with Other Ring Signatures with Specified Verifiers……………………………………p. 27

Table 2: Performance Analysis of Our Scheme…………p. 27
參考文獻 [1] M. Abe, M. Ohkubo, and K. Suzuki, “1-out-of-n Signatures from a Variety of Keys,” Advances in Cryptology-ASIACRYPT 2002, LNCS 2501, Berlin: Springer Verlag, 2002, pp.415-432.
[2] G. Ateniese, “Efficient Verifiable Encryption (and Fair Exchange) of Digital Signature,” Proceedings of 6th ACM Conference on Computer and Communications Security, New York: ACM, 1999, pp. 138-146.
[3] D. Chaum and E. V. Heyst, “Group signatures,” Advances in Cryptology-Eurocrypt’91, LNCS 547, New York: Springer Verlag, 1991, pp. 257-265.
[4] W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, Vol. 22, Issue 6, pp. 644-654, Nov. 1976.
[5] T. A. ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, July. 1985.
[6] C. Gamage, B. Gras, B. Crispo, and A. S Tanenbaum, “An Identity-based Ring Signature Scheme with Enhanced Privacy,” Securecomm and Workshops, Baltimore, MD, Aug. 28-Sep. 1, 2006, pp. 1-5.
[7] S. Goldwasser, S. Micali, and R. L. Rivest, “A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks,” SIAM Journal on Computing, Vol. 17, Issue 2, pp. 281-308, 1988.
[8] M. Jakobsson, K. Sako and R. Impagliazzo, “Designated Verifier Proofs and Their Applications,” Advances in Cryptology-Eurocrypt’96, LNCS 1070, Berlin: Springer Verlag, 1996, pp.143-154.
[9] J. S. Lee and J. H. Chang, “Strong Designated Verifier Ring Signature Scheme,” Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, Netherlands: Springer Verlag, 2007, pp.543-547.
[10] J. K. Liu, V. K. Wei, and D. S. Wong, “Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups,” Information Security and Privacy, LNCS 3108, Berlin: Springer Verlag, 2004, pp. 325-335.
[11] J. Lv and X. Wang, “Verifiable Ring Signature,” Proceedings of DMS- The 9th International Conference on Distributed Multimedia Systems, Miami, Florida, USA, Sep. 2003, pp. 663-667.
[12] M. Naor, “Deniable Ring Authentication,” Advances in Cryptology-CRYPTO 2002, LNCS 2442, Berlin: Springer Verlag, 2002, pp. 481-498.
[13] K. Nguyen, “Asymmetric Concurrent Signatures,” Information and Communications Security, LNCS 3783, Berlin: Springer Verlag, 2005, pp. 181-193.
[14] D. Pointcheval and J. Stern, “Security Arguments for Digital Signatures and Blind Signatures,” Journal of Cryptology, Vol. 13, No. 3, New York: Springer Verlag, pp. 361-396, Dec. 2000.
[15] J. Ren and L. Harn, “Generalized Ring Signature,” IEEE Transactions on Dependable and Secure Computing, Vol. 5, Issue 3, pp. 155-163, July-Sept. 2008.
[16] R. L. Rivest, A. Shamir, and Y. Tauman, “How to Leak a Secret,” Advances in Cryptology-ASIACRYPT 2001, LNCS 2248, Berlin: Springer Verlag, 2001, pp. 552-565.
[17] C. P. Schnorr, “Efficient Identification and Signatures for Smart Cards,” Advances in Cryptology-CRYPTO’89 Proceedings, LNCS 435, Berlin: Springer Verlag, 1990, pp. 239-252.
[18] L. Wu and D. Li, “Strong Designated Verifier ID-Based Ring Signature Scheme,” Information Science and Engineering, 2008, ISISE’08, International Symposium, Vol. 1, Shanghai, People's Republic of China, Dec. 20-22, 2008, pp.294-298.
[19] F. Zhang and K. Kim, “ID-Based Blind Signature and Ring Signature from Pairings,” Advances in Cryptology-ASIACRYPT 2002, LNCS 2501, Berlin: Springer Verlag, 2002, pp. 533-547.
[20] J. Zhang and J. Xie, “A Novel Ring Signature Scheme with Multi-designated Verifiers,” IEEE International Conference on Cybernetics and Intelligent Systems, Chengdu, People's Republic of China, Sep. 21-24, 2008, pp.873-877.
論文使用權限
  • 同意紙本無償授權給館內讀者為學術之目的重製使用,於2012-07-01公開。
  • 同意授權瀏覽/列印電子全文服務,於2012-07-01起公開。


  • 若您有任何疑問,請與我們聯絡!
    圖書館: 請來電 (02)2621-5656 轉 2281 或 來信