Font Size: a A A

Research On Proxy Blind Signature Scheme

Posted on:2011-04-13Degree:MasterType:Thesis
Country:ChinaCandidate:X J WuFull Text:PDF
GTID:2178360302494759Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
As a safe and effective means to guarantee information, the digital signature can guarantee the information integrity, identify the authenticity of the sender and non-repudiation of signatures, and also offers encryption features. Because of these features, digital signatures are widely applied to various areas of the network. With in-depth study of digital signatures, many digital signatures which have the special use have been proposed one after another. The proxy blind signature is proposed in this case. Proxy blind signature not only has the characteristics of proxy signature but also has the characteristics of blind signature, so that it can apply to electronic cash, electronic voting and other applications with high practical value. After analyzing existing schemes the following aspects were studied.Firstly, on the safety analysis of the first signature scheme, points out that it does not satisfy the unforgeability. The current proxy blind signature are based on the identity or certificate, needing reliable third-party authentication. Public key system without the certificate has to overcome this shortcoming. This paper combines it with the blind signature then proposes the certificateless proxy blind signature scheme. Proves to meet various properties of proxy blind signature, and then describes the use in electronic cash.Secondly, on the safety analysis of previous scheme, for the non-connectivity of this scheme, and in the transmission process requires a secure channel, based on the separate logarithm, the paper proposes a proxy multiple blind signature scheme. And demonstrate its not only meeting all the nature of the proxy blind signature, while in transit without a secure channel. And the efficiency of this scheme and other scheme are compared.Finally, experimental method are used to prove the correctness of the derivation of the proxy multiple blind signatures in this paper, and verify effectiveness from multiple aspects of the scheme.
Keywords/Search Tags:Digital signature, Proxy signature, Blind signature, Proxy blind signature, Proxy multiple blind signatures
PDF Full Text Request
Related items