Font Size: a A A

A Research On Digital Signature Scheme With Message Recovery

Posted on:2011-06-23Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y SunFull Text:PDF
GTID:2178360305496156Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
The concept of message recovery was first proposed in 1994 by Nyberg and Rueppel. Digital signature with message recovery refers to the Signature Scheme which the verifier would restore the original message that has been signed in the verification process after the signature of the message. Since this concept has been proposed, it receives wide concerns from scholars home and abroad. In order to apply to some special cases practically, people combine other forms of signature schemes with message recovery signature scheme, and put forward many new signature schemes with message recovery to satisfy the specific properties. For example, a message recovery proxy signature, proxy blind signature with message recovery, multiple proxy signature with message recovery, identity-based signature scheme with message recovery, encryption scheme with message recovery, designated verifier signature with message recovery and so on. Digital signature with message recovery has been widely used in electronic voting, electronic cash and electronic commerce. This thesis discussed the development and the research status of the existing digital signature scheme with message recovery. It mainly studied on digital signature with message recovery feature which is based on discrete logarithm and factorization dual problems and the application of designated verifier signature in message recovery signature scheme. This paper's main results are:1.Cryptanalysis the discrete logarithm-based message recovery signature scheme (denoted by ZL program), which was proposed by Zhang Shaoting, and the author offered a forgery attack method. Any recipient of a signature can be forged proxy multi-signature, thereby proving the insecurity.2.Propose a signature scheme based on Factoring and Discrete Logarithms, and proved the security from the conventional point of view that as long as these two math problems are not broken at the same time.3.Propose a multiple proxy signature with message recovery by using the designated verifier ID verification scheme based on RSA algorithm and the discrete logarithm problem, The author analyzed the security of the program, and has tried a variety of common methods to attack it, but without success by now.
Keywords/Search Tags:digital signature, message recovery, designated verifier
PDF Full Text Request
Related items