Font Size: a A A

Research On ID-Based Signature Schemes

Posted on:2009-11-25Degree:MasterType:Thesis
Country:ChinaCandidate:P LiFull Text:PDF
GTID:2178360242998411Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The ID-based encryption and signature technology can simplify key management in the traditional(certification-based) public key cryptology environment effectively, and also may realize the ID-based encryption and signature technology by using the bilinear map highly and effectively. In the last few years, the domestic and foreign scholars proposed some ID-based cryptosystems and signature schemes. After analyzing these schemes, they found that the signer need to trust a Trusted-Authority(we called TA) in these schemes. For the private key of the signer generated from TA, so TA can forge a valid signature and all right passed verification. there fore, these schemes cannot apply in the public system environment.The researches of this thesis as follows:In the design and analysis of the ID-based signature scheme, the main research proposes a new ID-based signature scheme which based on the principle of introduces two TA to prevent the attack of TA's decrypt effectively in the expanding ID-based Boneh-Franklin public key cryptosystem. Carried on security analyzed and has given the theorem and certification in secure aspect, and has also given the concrete analysis in the system performance aspect.During the designing and analysis of the ID-based proxy signature scheme and blind signature scheme, the main researches are import a proxy entrust mechanism reasonably, and propose a new ID-based proxy signature scheme, and at the same time, combined the characteristic of the blind signature and the merit of the existing blind signature scheme, propose a new ID-based blind signature scheme, which are based on a new ID-based signature scheme proposed in this thesis. Also Carried on security analyzed and have given the theorem and certification in secure aspect, have given the concrete analysis in the system performance aspect.Finally, the conclusion is that the schemes which were proposed in this thesis are secure and feasible, can apply in the public system environment and can also apply in many kinds of situation, such as the electronic commerce, the electronic government affairs and so on.
Keywords/Search Tags:Digital Signature, Identity-based, Trusted-Authority, Bilinear map, Weil pairing
PDF Full Text Request
Related items