Font Size: a A A

An Anonymity-Revoking Electronic Impeaching System

Posted on:2009-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:J X ZhuangFull Text:PDF
GTID:2178360242477099Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the development at full speed in computer network technology, electronic impeaching system (EIS) is increasingly becoming the focus of attention. Security, anonymity and efficiency are the key points in the EIS. Simultaneously, an important factor must to be considered is how to prevent the malice calumny of some illegal members. Therefore, how to design a safe and high-efficiency EIS has received increasing attention. This paper mainly studies the design, security discussion and key technologies of the EIS, such as group signature, bit commitment, knowledge signature, etc.Aiming at the actual need of impeach work, and on the basis of analyzing, concluding, summarizing and informing against the systematic current situation at present, the article structure the new model of electronic impeaching system, adopt group signature and bit commitment technology to realize each functions of the system respectively, and guarantee the security of accuser, such as anonymity, unforgeability, undeniable, unlinkability,traceability,etc.The paper presents an security model of the EIS, which can not only satisfies the identity of impeacher anonymity and protect privacy from being peeped by impeaching centre, But also, when necessary, can remove the anonymity of the user and track the true identity of the calumniator in collaboration with the Trusted Third Party and Electronic Impeaching Center. And the EIC can not figure out whether the pre and post documents of the anonymous documents are done by the same calumniator. Although TTP has the right to check identity of anonymous informants, but it can not forge any member's identity to impeach anonymously, and frame the prosecutor later. After the analysis of the status of the group signature, this paper makes use of the anonymity technology of group signature to design the EIS which is based on the group signature. The largest application of this program is small and medium scale units. While using this program, the accuser is able to impeach only through being registered as a group member. And, we have also proven the safety of the program.Owing to the limitations of signature group, the paper has also put forward another electronic reporting program based on the bit commitment. Making use of the lessons from the double signature ideas in the SET protocol, this program construct a new program with dual commitments.
Keywords/Search Tags:Electronic impeaching system, Group signature, Bit commitment, Anonymity revocation
PDF Full Text Request
Related items