Font Size: a A A

Research On Digital Signature And Its Application In Networks Authentication

Posted on:2013-08-18Degree:DoctorType:Dissertation
Country:ChinaCandidate:W LiFull Text:PDF
GTID:1228330374486957Subject:Information security
Abstract/Summary:PDF Full Text Request
Digital signature is one of the most important research topics in cryptography and its research always draw much attention from the academic community. Often there are new schemes were proposed and some extant schemes were broken. On the foundation of the former works, especially the research of the recent years, we have researched some digital schemes with special characteristics, especially ring signature schemes. Further their applications in networks authentication were also studied, the main innovation including as follow:In the common identity-based ring signature schemes, the signature size will increase as the number of ring members increased, in order to address this problem, an identity-based ring signature scheme with constant-size signature using bilinear pairing was proposed in this dissertation, it is provable secure under the standard model, further more it has a shorter signature size and more efficient compared with the current similar schemes. In ID-based ring signature schemes there is private key escort problem, in order to address this problem, a self-certified public key based ring signature scheme and its extended version were proposed, comparing with the previous ring signature schemes based on certificates, our scheme doesn’t have to implement sophisticated certificates verification and management. Further more the private key escort problem can also be avoided in our scheme compared with those ID-based schemes. Further more our schemes are provably secure against chosen message attack in the random oracle model.As to the linkable ring signature schemes, we first propose a ring signature scheme using the difficult assumption of q-SDH, the signature length is shorter compared with the current schemes, further more there is no pairing computation in the signature algorithm and only one time pairing computation is needed in the verify algorithm, so it is more efficient. Subsequently we propose an extension scheme using zero-knowledge to the former one and propose a selective linkable ring signature scheme with the advantage of shorter signature length and high efficiency, at last we show our scheme is provable secure under the random oracle model. Based on some current ring signature scheme, we further make some research in the selective linkable and convertible ring signature schemes under the standard model, then we construct one such scheme using the characteristics of bilinear pairing, the whole scheme is provable secure under standard model, further more our scheme is superior than the extant ones in storage and computation cost.As to signature schemes secure under quantum computing environment, we proposed an attribute-based ring signature scheme in lattice after review the recent research papers about the lattice-based signature schemes and attribute-based ring signature schemes. The scheme is secure under quantum attacks, further more our scheme is more efficient than IF and DLP-based ones due to using simple algebra structure, such as modular multiply and add in small integers, so the computation cost is low, at last we show this scheme is provable secure under standard model. We have also proposed an arbitrated quantum signature scheme using the properties of quantum entanglement, compared with the current scheme it is more efficient, further more the private information of the participants was also protected. Based on the former scheme we proposed a quantum anonymous signature scheme in the final of this chapter.Digital signature schemes have seen widely applications in networks authentication, then we make some research about its application in automatic trusted negotiation and anonymous reputation authentication. We have proposed an anonymous credentials scheme for trusted negotiation, there is no pairing computation in our scheme compared with the extant similar ones, the computational cost and signature length can also meet the requirement in application. We also propose an anonymous reputation authentication scheme based on the Signature Proof of Knowledge (SPK), then we make some improvement to it using ring signature scheme, at last we proposed an attributes reduction scheme for reputation assessment in networks authentication.
Keywords/Search Tags:digital signature, ring signature, networks authentication, bilinearpairing, standard model
PDF Full Text Request
Related items