Font Size: a A A

Investigation Of Digital Signature From Bilinear Pairing

Posted on:2006-04-11Degree:DoctorType:Dissertation
Country:ChinaCandidate:C B MaFull Text:PDF
GTID:1118360182961604Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
In the electronics world, the signature, as an important method to protect information security, has been drawing the attention of more and more researchers. Digital signature has been broadly used. It can ensure the identity of the mail sender or contract signer as what the handwriting signature does and the business going on with right way over the Internet. Generally speaking, digital signature can realize the following four security aims: security; identification; integrality; undeniable. With the growth of the science and technology, more and more requires are brought forward, such as how to make the signature occupy the less store resource and the secret key as short as it can be under the ensuring security condition. Lots of researchers have done abundant work in this way. Since Boneh and Franklin present the short signature scheme from bilinear pairings in 2001, the bilinear pairings, because of its virtue, come to be an important tool to make a signature.To date, the bilinear pairings is still in the stage of research, and there are many problems remain to be solved. Therefore, lucubration of signature scheme from bilinear pairings is very necessary.A new kind of signature: group inside signature from bilinear pairings in distributed network is presented for the first time. In this signature, despite without certificate, the public key can be related to the identity of the holder of the corresponding private key, that is, the authentication of the signature is CL-PKC; Nobody besides the ones in the same group with the signer can verify the signature and the verification can be completed by himself without any others help; it is only the signer who knows his private key, even the KGC (Key Generating Centre) doesn't, so there are no menace of key escrow; the signature can be transmitted by broadcast to the one in the same group with the signer on the Internet, so the efficiency of the system is improved.A new kind of signature: broadcast group-oriented signature from bilinear pairings in distributed network is presented. The signature's authentication is CL-PKC, so it's public key can be self certificated. Nobody besides the members in the designated group can verify the signature and the verification can be completed by the member himself without the help of any others; there is no menace of key escrow; theefficiency of the system is improved, because that the signature transmitted by broadcast.Constructing a new kind of group signature. The signature from bilinear pairings is based on access structure; the subliminal channel is the skill to realize the process of "Open" in the group signature for disclosing the signer.A new kind of signature: Chameleon multi-signature from bilinear pairings is presented. Only the designated member can verify the signature. Although the ordinary member can verify the right of the signature, which the designated member presents to him, but he can't assurance about the valid of the signature, because the designated member has the ability of forge; under the condition of forge occur, the signer (receiver) can find the private key of the cheater without interactive process; the signer (receiver) can disclose the cheater, but not presents the original signature to the authority.Constructing a new proxy signature scheme: Chameleon proxy signature scheme from bilinear pairings. Only the designated member can verify it; under the condition of forge occurring, the signer (receiver) can find the private key of the cheater without interactive process; the signer (receiver) can discloses the cheater, but not present the original signature to the authority.With respect to the distributed electronic auction on the Internet, a new kind of signature: proxy chain signature from bilinear pairings is presented for the fist time. The proxies taking part in the auction compose a clientage chain in order. The end user can get information about the original seller and the proxies.
Keywords/Search Tags:Supersingular Elliptic Curve, Bilinear Paring, Decision Diffie-Hellman (DDH), Computational Diffie-Hellman (CDH), Digital Signature
PDF Full Text Request
Related items