Font Size: a A A

The Research Of Proxy Blind Signature And Its Application In Electronic Cash

Posted on:2012-05-13Degree:MasterType:Thesis
Country:ChinaCandidate:H Y TanFull Text:PDF
GTID:2178330332995882Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer network technology, electronic information develops increasingly, but network security issues has become more and more crucial, the password technology is an effective way to solve this problem. Because of having a proxy signature and blind signature features, the proxy blind signature which is one of key password techniques in network security has been widely used in electronic cash, electronic voting system and other fields.This paper has made a systemic research about the theory and methods of proxy blind signature and its application. And it has done some work about DLP-based and ID-based proxy blind signature:1. we have proposed a method to generate Schnorr, ELGamal and ID-based signature schemes, these methods of construction have effect on our two proxy blind signatures on this article.2. It has improved two DLP-based proxy blind signatures which have two security defects, a new proxy blind signature has been presented, which satisfies the security properties of unforgeability and unlinkbility.3. Combined with the advantages of ID-based cryptography, according to bilinear theory, a new ID-based proxy blind signature without trusted PKG has been presented, which satisfies the security properties of both proxy signature and blind signature in the random oracle, assuming the hardness of DLP and CDHP . Moreover, its efficiency is also higher than that of Yu. The scheme which uses ID-based public key to replace the digital certification public key can avoid the problem of key management problems, saving storage space.4. For the application of proxy blind signature,we have introduced electronic cash system and its properties. Moreover, our ID-based proxy blind signature scheme without trusted PKG has been used for electronic cash system, which has good application value.
Keywords/Search Tags:proxy blind signature, discrete logrithm, ID-based, electronic cash, security analysis
PDF Full Text Request
Related items