Font Size: a A A

Proxy Signature Schemes Based On The Conic Curve Over Z_n

Posted on:2010-11-10Degree:MasterType:Thesis
Country:ChinaCandidate:X Q FengFull Text:PDF
GTID:2178360278960601Subject:Computational Mathematics
Abstract/Summary:PDF Full Text Request
In the real world, people often need to own certain rights entrusted to a reliable agent, by an agent on behalf of my exerciseof these rights,in which the right can be commissionedto include the signature of the rights of people. In the information society will be faced by the signature issue of theright to commission a result, proxy signature digital signature as an important branch came into being. Proxy signature as a new type of digital signature technology, the nature of theirgood will, oncemadea cause for widespreadconcem. Many scholars of theproxy signature of an in-depth and research, has achieved fruitful results. In many basic proxy signature scheme was proposed at the same time, many new type of proxy signature scheme has also emerged, such as: proxy multi-signature, threshold proxy signature,identity-based proxy signature, proxy blind signature with the certificate of revocation of proxy signature feature, a one-time Deputy signatures. Proxy signature in the e-banking,e-commerce, mobileagent applications, such as more an dm ore prospects.With the computing hardware and software technology the improvement of public key cryptography classic faces increasing security threats,a branch of public-key cry ptosy stem based on algebra curves on a calculation of the difficulty caused by the password system to pay more attention to researchers, in which elliptic curve cryptography-related standards have been introduced, in addition, we hope to find more,or more advantages in certain areas to achi eve the algebrai c curve public-key cry ptosy stem. Conic ring Z_n of algebraic curves is one such.The dissertation makes systematic research into conic curve overresi due class ring,designs a digital signature schemeon thepubli c-key cryptography of conic curve over z_n.The research content of this dissertation are summarized as follows:In thi s paper,a detail ed study of the ring on the nature of coni c secti on,coni c ring structure of the proxy signature scheme. Summarized the main contents are as foll ows:The conic of the ring curve c_n(a,b) and the nature of the system: 1. Study the conic of the ring curve c_n(a,b) and the nature of the system:(1) F_p similarto the limited domain of the conic section,the definition of the ring z_n on the coni c secti on(2) The dissertation discusses basic properties of the group(c_n(a, b),(?)) including DLP, order computati on, generator finding, and pints out how to prove the propertiesof c_n (a, b) by those of c_p(a, b) )and c_q(a,b),makes it possibleto establish analogue over the conics for kinds of cryptographic protocols.2. c_n(a,b) on the structure of the various types of public-key cryptosystem, madeto its research and analysis(1) Of c_n(a,b) studies have shown that the explicit embedding, bands, thepoint between the operator, and inverse calculations,suchas Elliptic Curve Cry ptography over cal cul ati on easi er(2) The threats confronted by classical RSA are analyzed;it is proposed that the public-key cry ptosy stem over c_n (a,b) i s safer and more promi sing in application than theclassical RSA forit can resistsmall encryption exponent attack and small decryption exponent attack, though for both of them,the security is based on difficulties in fact orizing large integer.c_n(a,b) based on theseprograms and programs based on the E_n(a, b) compared to the original proposal not only preserves the advantages, but alsoin the amount calculated on amuchsmaller, but also easy to implement(3) Givenbased on a number of Conic Z_n on publickey cryptography system of proxy signature scheme. Such as multi-level agents,suchas multi-proxy signature scheme. And its security analy sis. Utilizati on of theseprogram s are difficult for the decompositi on of large numbers and to calculate a finite group of discretelogarithm problems,thereby increasing the program of the digital signature security.
Keywords/Search Tags:coniccurve, proxy signature finite additive group, roxy multi-signatur
PDF Full Text Request
Related items