Font Size: a A A

The Theory Of Proxy Blind Signature And Its Research And Application On Electronic Cash Systems

Posted on:2011-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:Q XuFull Text:PDF
GTID:2178360308963760Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
As the rapid development of computer network technology and communications technology, e-commerce, e-government and other new technology are quietly rising, followed by network transmission of information security issues are also increasingly prominent, and information security as a key technology in encryption technology and digital signature technology has also been widespread concern, special digital signatures which can be applied to specific areas have emerged. As the combination of proxy signature and blind signature, proxy blind signature plays an important role in the electronic cash system. In 1996, Mambo, Usuda, and Okamoto first proposed the concept of proxy signature, which means that when someone could not subscribe the message or file for some reason, he give another credible person the right to present him complete the process of signiture, anyone can verify the validity of the signature and to distinguish who signed the signature; 1983 Chaum first proposed the concept of blind signature, which means the signer did not know the true content of the signed message, and when his signature was publicized the signer can't linking a special message with the digital signature. What we discussed in this paper are as follow:1. This paper describes the concept of digital signature, and then leads to several typical encryption algorithm and digital signature algorithm, and we made a detailed analysis of the security of these algorithms.2. We made a comprehensive security analysis of a proxy blind signature algorithm, pointing out the defects of the algorithm and gives an improved algorithm, which solves the problem of attacks; Then analyze two proxy blind signature algorithm of the proxy signature part and blind signature part, We enhance the algorithm security by analyze both of the two proxy blind signature algorithm.3. An electronic cash application model is given in this paper, and an identity-based proxy blind signature algorithm is applied to this model, give an electronic cash system which has practical sense.
Keywords/Search Tags:proxy blind signature, identity-based, discrete logarithm, electronic cash
PDF Full Text Request
Related items