Font Size: a A A

The Relevant Research On The Proxy Signature

Posted on:2008-05-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2178360212993088Subject:Systems analysis and integration
Abstract/Summary:PDF Full Text Request
The vogue of Internet is making the changes of the people's style. With the rapid development of Internet, the theory and technology of information security become more and more important. Security is one of the key elements of the development of Internet. Digital certification can take the place of identification and verification in virtual world constructed by computer network. The digital signature is the foundation and guarantee of the information security and plays a key role in protecting the security of networking communication.In real life, people always entrust some rights to a trusted proxy, it is the trusted proxy who exerts these rights. In these entrusted rights, signing right is included. Signing right also will be encountered in virtual information world. Being a legal replacement for handwritten signatures, digital signature does not have agential function in first.In 1996 Mambo, Usuda and Okamoto introduce the concept of proxy signature and bring digital signature into a new direction. The proxy signature is a signature scheme that an original signer delegates his/her signing capability to a proxy signer without leaking his or her private key, and then the proxy signer creates a valid signature on behalf of the original signer, the receiver of the signature verifies the signature itself and the original signer's delegation together. Proxy signature schemes are the variation of digital signature schemes. If a manger delegates his rights to his secretaries while he traveling outside, the secretaries can sign the message on behalf of the manger.Since the concept of proxy signature was introduced, the salient features of proxy signature make them come to front. The proxy signature primitive and the first efficient solution were introduced by Mambo, Usuda and Okamoto. Since then proxy signature schemes have enjoyed a considerable amount of interest from the cryptographic research community. Furthermore, various extensions of the basic proxy signature primitive have been considered. These include proxy multi-signature, threshold proxy signatures, ID-based proxy signature, blind proxy signatures, proxy signatures with warrant recovery, nominative proxy signatures, one-time proxy signatures, and proxy- anonymous proxy signatures. Proxy signatures have found numerous practical applications, include Electronic Payment System, E-commerce, Electronic auction distributed systems, Grid computing, mobile agent applications, distributed shared object systems, global distribution net-works, and mobile communications.The main achievements contained in this paper are as follows:(1) A forward secure ID-based proxy signature scheme is proposed in this paper. ID-based public key cryptosystem can reduce the costs of the management of the certification. The scheme introduced in this paper can deal with the key exposure problem in the ID-based proxy signature. The scheme requires the general security parameters only independent to the total number of time periods. The scheme can perform key update for unlimited time periods while maintaining sizes of keys and signature fixed. For using bilinear pairings, the scheme possesses the characteristic of short signature and short key. The security of this scheme is based on CDH problem.(2) An ID-based proxy multi-signature scheme is proposed in this paper. The scheme using bilinear pairing is based on the proxy multi-signature scheme that has been proposed, and it has the advantages of the ID-based public key cryptosystem.(3) A forward secure ID-based proxy multi-signature scheme is proposed in this paper. The scheme that is improving from the ID-based proxy multi-signature scheme has the forward secure property. The scheme requires the general security parameters only independent to the total number of time periods. The security of this scheme is based on CDH problem.
Keywords/Search Tags:proxy signature, ID-based, forward secure, proxy multi-signature, bilinear pairing
PDF Full Text Request
Related items