Font Size: a A A

Proxy Signature Research And Technology Development

Posted on:2007-04-10Degree:MasterType:Thesis
Country:ChinaCandidate:C Y LiuFull Text:PDF
GTID:2208360185982828Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The network technology development changes with each new day, causes the on-line commerce, on-line government affairs and so on to move into us to live the universal phenomenon. May foresee, electronic commerce, the electronic government affairs, on-line processing live and works each business will be the important way that the future information society will move. This is more prominent network information security importance. Nowadays, public key infrastructure (PKI) applies day by day under the widespread situation in the present; the digital signature has become the core technology of the information security.The this article main content is the research of proxy signature scheme, it took one kind of new digital signature schemes, first proposed by Mambo et al. in 1996. In a typical proxy signature scheme, the primitive signer authorizes proxy signer to represent him/her to have the effective proxy to sign, the confirmation signs valid during the confirmation proxy to confirm the authorization.In order to solve sometimes needs to be authorized gives community the question, The threshold mechanism and the proxy signature fuses, obtains the so-called threshold proxy signature scheme. In the (t, n) threshold proxy signature scheme, when also only works as at least has t proxy signers to unite, may construct an effective proxy signature. This article signs the research development order according to the proxy signature, reviewed and analyzes the classics proxy signature and the threshold proxy signature schemes. Because the anonymous threshold proxy signature schemes always not to have the very good means in the resistance plot attack aspect, in 1999 Sun Hung-Min proposed the known undersigned's threshold proxy signature scheme, attempts through the mechanism solution plot attack question which may trace. In 2001 Hsu et al. pointed out Sun's scheme can come under the plot attack the threat, and proposed a improvement scheme, has also introduced the resistance plot attack another solution mentality in this, namely introduces SA. In 2004, Zuo-Wen Tan et al. pointed out their improvement scheme can suffer the primitive signer forge attack. This article to Hsu et al. scheme has made another new attack, And according to the above and proposed a new improvement program, And points out the new scheme both to be able effectively to resist the plot attack through the analysis, Also...
Keywords/Search Tags:Digital Signature, Proxy Signature, Threshold Signature, Random Oracle Model, Threshold Proxy Signature
PDF Full Text Request
Related items