Font Size: a A A

ID-Based Blind Signatures Technology Research

Posted on:2007-04-24Degree:MasterType:Thesis
Country:ChinaCandidate:J H LuFull Text:PDF
GTID:2178360182988670Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The information security has become more and more crucial with the development of computer and network technologies. The digital signature is one of key techniques in information security, especially in the authentication, data integrity, and non-repudiation. It has been widely used in military, communication, e-commerce and e-government, etc., and will become more and more popular after the e-signature law is put in practice.Comparing with the systems based on the traditional public key cryptography , ID-based public key cryptography systems use the publicly avaible information as a public key, such as Email address, role, task, eliminate the need for certificates and simplify the operations and management of public keys. And there is only Authority to set up to authenticate the users, check their rights, and generate and transfer the private keys.ID-based public key cryptography systems mainly use bilinear pairing, for example Weil pairing and Tate pairing defined on Elliptic Curve and Hyperelliptic Curve.Using the bilinear theory defined on elliptic curve, a new strong ID-based blind signature scheme is proposed. In this scheme, ID-based public key is not the public key stored in certificate. This scheme can omit the process of getting public key from the system in verification phase, therefore decrease interaction time and reduce the store space.In this paper, the characteristics of normal blind signatures, such as blindness, unlinkability and non-forgery is given.In order to make network-based network-based testament subscription come true, an ID-based blind message signature scheme is proposed, and security anlyse of this scheme is given. A special ID-based blind parameters signature scheme is proposed in order to adapt to CA of e-business system issuing the passwords of the business parites. And then another ID-based weak blind signature scheme is proposed, security anlyse of these schemes is given. The efficiency of this scheme is compared with original blind shemes.A ID-based fair blind signature scheme is proposed to avid Double Spending, Blackmailing and Mone-Laundering, which may happen in tranditional e-cash systems based on blind signatures. Using this ID-based fair blind signature scheme, a fair e-cash is proposed. And then security anlyse of this scheme is given.Finally referring to pbc and using VC++ and miracl, Tate pairing is implemented. The results of the experiment indicate that the efficiecy of Tate pairing in existing computing condition can satisfies the actual application.Kinds of ID-based blind signature schemes are systematically proposed in this paper.bilinear pairing, elliptic curve, ID-based, blind signature, fair e-cash, Tate pairing...
Keywords/Search Tags:bilinear pairing, elliptic curve, ID-based, blind signature, fair e-cash, Tate pairing
PDF Full Text Request
Related items