Font Size: a A A

The Research And Application Of Blind Signature

Posted on:2006-09-24Degree:MasterType:Thesis
Country:ChinaCandidate:S L GongFull Text:PDF
GTID:2168360152987230Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the development of computer network technology, network information security problem becomes more and more important. Digital signature as one of key technology of the information security is widely used in military, communication, e-commerce, etc. With "electronic signature law" being put into practice, the application of digital signature will become more and more popular.The paper firstly introduces some basic conceptions of cryptography, such as digital signature, blind signature, digital certification, hash function etc and typical blind signature schemes, for instance, RSA blind signature scheme, Schnorr blind signature scheme and ElGamal blind signature scheme. The wide use of blind signature theory in e-vote system and e-cash system is also summarized. Besides, Tan's proxy blind signature scheme is improved and a proxy blind signature scheme based on Schnorr blind signature is designed with the theory proving and test analysis. Our scheme could satisfy security request of proxy blind signature. Compared with Tan's scheme, the improved proxy blind signature scheme shortens the time of signing and improves the efficiency of signing effectively.Secondly, A multiple blind signature scheme based on ElGamal strong blind signature scheme is designed with theory analysis to the security of the scheme. It is possible for many signers to sign at the same time by using this scheme and this scheme has both properties of blind and untraceable. Finally, this paper presents an anonymous electronic vote protocol on the basis of blind signature technology and security analysis of this protocol is presented in detail. The protocol can realize anonymity of voter of identity and prevent that one people have two votes or the same vote is thrown many times. Then an anonymous electronic vote system scheme based on this protocol is proposed. This paper provides the design of function modules in detail and a part of programming code is given. In the end, this paper presents the assumption of the further improvement and research of blind signature theory and looks forward to the development trend of blind signature theory in the future.
Keywords/Search Tags:digital signature, blind signature, proxy blind signature, multiple blind signature, electronic vote
PDF Full Text Request
Related items