Font Size: a A A

Threshold Proxy Signature Scheme And Its Application

Posted on:2009-08-02Degree:MasterType:Thesis
Country:ChinaCandidate:Q L DongFull Text:PDF
GTID:2208360245979594Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of the information technology, the meaning of information security is enlarged. It means not only the physical security or communicates in privacy, but also the message's integrity, authentication, nonrepudiable and so on. Among them, the authentication and the privacy are two important aspects. The digital signature is the primary method to provide the authentication. It is an important aspect of research of modern cryptology. Threshold signature and threshold proxy signature, which are two kinds of particular digital signatures, because of their peculiar threshold characteristic and proxy characteristic, have become one of the major subjects in the cryptography field. This paper proposes a threshold signature scheme and a threshold proxy signature scheme which are secure and efficient. The designing of an electronic review system based on the presented threshold proxy signature scheme is introduced in the last part of the paper.First, in this paper, based on the others works, a typical threshold signature scheme is analyzed and improved from traceable, anonymous, robust, stable and nonpseudo characteristics, it can satisfy security and performance requirements of threshold signature schemes. Second, grounded on analyzed basic knowledge of threshold proxy signature, the paper generalizes the security problems in existing schemes. A typical threshold proxy signature scheme is analyzed and improved from some weakness. It can satisfy security and performance requirements of threshold proxy signature schemes. Third, considering the characteristics such as security, key short, shorter length of signatures, and the proposed threshold proxy scheme of the elliptic curve cryptosystem, a scheme based on elliptic curve discrete logarithm problem (ECDLP) is come out. Last, based on the above scheme, an electronic review system is designed, which can reduce the workload of editors and avoid pretending to be the subeditor to copy edit.
Keywords/Search Tags:Digital Signature, Threshold Signature, Threshold Proxy Signature, ECC, Electronic Review system
PDF Full Text Request
Related items