Font Size: a A A

Blind Digital Signature Scheme And One Dense

Posted on:2011-07-15Degree:MasterType:Thesis
Country:ChinaCandidate:J N HeFull Text:PDF
GTID:2208360305959644Subject:Computational Mathematics
Abstract/Summary:PDF Full Text Request
Cryptography formed gradually by password designers and cryptanalysis in the ongoing struggle. With extensive application of computer and communications networks, digital signature technology found the space to developed futher in the commercial areas, such as e-mail, electronic transfers, office automation system. Both domestic and foreign scholars pay a lot of effort in the research on digital signature, so diverse digital signature programs which appreciates different security requiremen-ts spring out at once. Blind digital signature and the signatures of one-time pad program are the main items which we studied in this paper, and the principal tasks are as follows:1. Summarizes the theoretical knowledge that related to digital signatures, including definitions of digital signature, program descriptions, and classification of digital signature scheme.2. The notion of blind digital signatures were introduced in this paper, and then presented the proxy blind signature scheme which have a message recovery potent by use of bilinear pairings on elliptic curves characteristic, the program is not only an advantages of common proxy signature and blind signature, but also can make the message recovery, the literature of even lower communications costs declined compared to the message recovery in the literature[1-2], and speed up the computing speed. finally the security of this program is discussed.3. We apply the features on which DDHP can be solved in polynomial time on GDH group,and without any possible algorithm to solve CDHP, then we put forward a new blind Fail-stop signature scheme which combined with blind signatures and Fail-stop signature scheme,. This scheme applies in conjunction with the electronic payment system.4. By review and analysis of Lu and Cao program, we constructs a one-time pad signature program to make up the signature program of the key can not be reused defects by use of information theory in the shift register encoder principle.
Keywords/Search Tags:Digital signatures, Blind signatures, Proxy signature, One-time signature
PDF Full Text Request
Related items