Font Size: a A A

Study On Digital Signatures From Bilinear Pairing

Posted on:2007-04-04Degree:DoctorType:Dissertation
Country:ChinaCandidate:X G ChengFull Text:PDF
GTID:1118360212459894Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Information security is one of the most important problems in modern information society and becomes a new important subject in the information science. Digital signature, which can provide authentication, integrity, and non-repudiation, is one of the key techniques of information security and plays an important role in E-commerce and E-governance. As the deepening of digital signature research and the rapid development of E-commerce and E-governance, the standard signature, which is a simple simulacrum of handwritten signature, can not meet the practical need any more. Thus making research on the digital signatures with additional properties becomes a main research direction in digital signatures.Bilinear pairing, derived from Weil pairing or Tate pairing of elliptic or hyper-elliptic curves, is becoming an important tool for constructing cryptographic protocols in recent years. There are two advantages of protocols from bilinear pairing: (1) Constructions of cryptographic protocols which can not be constructed using other techniques. (2) Constructions of cryptographic protocols which can be constructed using other techniques, but for which bilinear pairing provides improved functionality.There are two parts in this thesis. The first part is a review of the bilinear pairing theory. We give a description of Weil pairing and Tate pairing of elliptic curves and show that an efficiently computable bilinear pairing can be derived from Weil pairing or Tate pairing of super singular elliptic curves. The second part, which is also the core of this thesis, presents some digital signatures from bilinear pairing. The main contributions are as follows.Based on the BLS and ZSS short signatures from bilinear pairing respectively given by Boneh et.al and Zhang et.al, we come up with two identity-based cryptosystems: BLS cryptosystem and ZSS cryptosystem.We present a transform SI-to-IBI that transforms a standard identification scheme into an identity-based identification scheme. It is shown that such a transform is security-preserving, that is, if the starting standard identification scheme is secure against impersonation under passive attacks (active attacks or concurrent attacks), so is the resulting identity-based identification scheme (in the random oracle model).
Keywords/Search Tags:Bilinear Pairing, Identification Protocol, Identity-Based Signature, Threshold Signature, Group Signature, Blind Signature
PDF Full Text Request
Related items