Font Size: a A A

The Research And Design Of Blind Signature

Posted on:2008-04-05Degree:MasterType:Thesis
Country:ChinaCandidate:H ChenFull Text:PDF
GTID:2178360245468418Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer and communication technique, information security has become more and more crucial. The blind signature which is one of key techniques in information security has been widely used in electronic voting, electronic cash, etc.The dissertation has made a systemic research about the theory of blind signature and its application, especially about some important fields. The following are the author's main research results.1. we have implemented RSA blind signature and some basic arithmetic in CAP which is often used in blind signature, such as prime-test , arithmetic of generator, algorithm of modular power and modular inverse, and so on.2. The Schnorr blind signature schemes were presented alone, in defect of uniform method, and we couldn't know which one was the best. Therefore, according to the structure characteristics of Schnorr signature, we have proposed a method to generate Schnorr blind signature scheme, which contains almost the known type of schemes. Moreover, their securities have been proved in theory and the experiment result in CAP has indicated that they are feasible, secure and operable.3.Through the analysis of an ID-based proxy blind signature scheme, it has been proved that the scheme have two security defects. Based on theory of weil paring and ID-based cryptography system, a new ID-Based proxy blind signature has been presented, which satisfies the security properties of both proxy signature scheme and blind signature scheme. The scheme which uses ID-Based public key to replace the digital certification public key could effectively omit the process of getting public key from the system and reduce the interaction times and the memory space. Otherwise, it has resolved two issues in the former scheme, which could effectively prevent original signer from forging a valid proxy blind signature for any file and restrict the virtual proxy power of proxy signatory.4. As to the blind signature scheme's applications, we have introduced some initial concepts of electronic voting at first. Secondly, an e-voting protocol has been proposed based on the essential properties of e-voting.
Keywords/Search Tags:blind signature, proxy blind signature, ID-based security analysis, electronic voting
PDF Full Text Request
Related items