Font Size: a A A

Based Proxy Ring Signature Scheme

Posted on:2012-04-19Degree:MasterType:Thesis
Country:ChinaCandidate:J R ZhangFull Text:PDF
GTID:2208330335971193Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The information age brings us more convenience and unlimited business opportunities. Also there are huge hidden dangers and security issues. Because of the defects of the internet itself, some unscrupulous attacks and inadequate laws and regulations or other factors make the current network are often attacked, which caused some confidential information or data is often leaked or tampered with. Problems range from a number of companies and enterprises sector to a standstill, not working properly and resulting in loss of personal interests and weighs will be related to national security and social stability. At present, people have realized that computer information security issues that must be resolved urgency. The world has to list information security as one of the important issues the people's livelihood.Digital signature technology is an important tool to guarantee integrity of information and identity authentication, is a key technology in information security areas today, and is also an important way to protect information security. To meet the needs of different applications environment, produce a number of special digital signature schemes, such as group signature, blind signature, proxy signature, ring signature and so on. Among them, the proxy signature can exercise the functions of proxy signature authority instead of the original signer. Ring signature can satisfy unconditional anonymity in the process of realizing signature to the signer, and is an anonymous way to disclose reliable information. To study these special digital signatures has important theoretical and practical significance. We can easily solve many problems of information security facing using these signatures. So they become the research focus in the field of modern cryptography and digital signatures. It is the focus of this paper to combine the advantages of the proxy signature and ring signature. The technology can meet the proxy signature while protecting proxy signer's unconditional anonymity. So they are often used in electronic cash, anonymous electronic voting, electronic auctions and other applications.In today's information age, when researchers gradually move towards the practical application from theory to study the proxy ring signature, the level of efficiency and safety of the proxy ring signature have become a primary concern. This paper is based on bilinear pairings, analyzing and summarizing the existing proxy ring signature scheme. For the defects and shortcomings of existing programs, it proposes a new efficient signature programs to meet the safety needs of practical applications in this paper, and analysis the safety and effectiveness of this scheme. The following will describe the main contribution of this paper:(1) Because the two existing identity-based proxy ring signature scheme is too slow or not high security, a new efficient ID-based proxy ring signature PRS program is proposed, which is on bilinear pairings. The program is more efficient than other existing scheme, and proves that it meet with the five basic security nature of the proxy ring signature requiring in this paper. It has a relatively high security. Finally, make compared with several existing schemes, and has carried on the detailed analysis to its validity.(2) In view of the advantages of non-certificate digital signature and the flaws of the existing proxy ring signature schemes, this article puts forward a new non-certificate proxy ring signature CL-NPRS scheme. This scheme is based on bilinear pairing. And the efficiency is higher than the existing non-certificate proxy ring signature schemes. Besides, this scheme also satisfies five security natures which proxy ring signature requests. The security nature is much higher than other. Finally, make compared with several previous programs, and has carried on the detailed analysis to its validity.(3) Finally, make a summary and put forward the further research direction in a future time to this article contents.
Keywords/Search Tags:proxy signature, ring signature, digital signatures, proxy ring signature, bilinear pairings
PDF Full Text Request
Related items