Font Size: a A A

Research On Combination Multi-signature And Its Application In E-Government

Posted on:2008-05-06Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhangFull Text:PDF
GTID:2178360242498856Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
With the development of information technology, Internet brings convenience to our lives, at the same time, it causes various insecure factors. Digital signature has the most importance among a large number of technologies that ensure the information security, and it ensures the integrity, authenticity and non-repudiation during the exchange of information. So digital signature plays an important part in information security field.In this paper, by analysis of Li-Yang's sequence multi-signature scheme,which is relatively safer and more effective, we designed an improved scheme of sequence multi-signature. The improved scheme not only can prevent a variety of forgery attack but also can prevent the exchange digital signature between the adjacent two neighbour users, and the scheme also has the better efficiency compare to other scheme.Secondly, we designed the new scheme of broadcasting multi-signature which is compatible with the improved scheme. With these we proposed much safer schemes of the second layer combination multi-signature and the third layer combination multi-signature. Compare with the structured multi-signature scheme, this schemes could ignore affects due to changing members or signature order changing, and needn't to change members' secret keys for adapting new signature environment.Finally the scheme was applied in electron loan examination system, combination multi-signature and data encryption technology guaranteed the electron loan examination date was confidential, integral, authentic, and could't be denied. Consequently, this combination multi-signature has satisfying application in electronic document transmission, document examination, approval and some financial affairs.
Keywords/Search Tags:E-Government, Information security, Digital signature, combination multi-signature, forgery attack
PDF Full Text Request
Related items