Study On The Classification And Application Of Special Digital Signatures | Posted on:2013-03-24 | Degree:Master | Type:Thesis | Country:China | Candidate:J Cai | Full Text:PDF | GTID:2248330374482936 | Subject:Basic mathematics | Abstract/Summary: | PDF Full Text Request | Since the20th Century, with the fast development of Information technology, Internet has played an increasingly essential role in every aspect of our life and has influenced us tremendously. Simultaneously, due to its general significance, Information Security has attracted a lot interests. In this paper, we mainly discuss two special digital signatures:blind digital signature and nominative digital signature. We research on the classification of blind digital signature and the application of it in a sensing shared task of smart phones. Consequently, we reduce some parameters in the Huang-Wang nominitive scheme.(1) The security of Chaum’s RSA-based blind signature scheme is based on the "one-more-forgery" problem and it is unique. Also, we focus on the Chaum’s RSA-based blind signature scheme. Then we concern the strong unforgeability of blind signature scheme. We present a new category scheme named strong blind signature schemes. By using one kind game reduction method, we compare the unforgeable attack game of strong blind signature schemes with that of the unique blind signature schemes. Finally, we concluded that the strong blind signature and the unique blind signature are equivalent. As a result, we can claim that our speculation is correct and more importantly, the strong blind signature which is defined by us presents a more general security definition and a determination, method for the unique blind signature.(2) With the widespread use of smart phones, the successively development of sensor technology and high-speed access of mobile Internet, smart phones are becoming the largest wireless sensor networks on Earth. Our article concentrate on protecting the private information (or preventing the private information from disclosing) in a sensing shared task of smart phones under some relative premises and verifying the authenticity and validity of sensor data. By analyzing the impact of CA (Certificate Authority key management technology), we believe that the blind digital signature technology has extensive application. Consequently, we design a positioning system for both participants in the privacy and the effectiveness of sensor data.(3) In this paper, we focus on some parameters to be cornerstone of cryptographic protocols as reducing parameters can simplify the design process and accurately define the security. By observing the proposition of the nominative signature and the Huang-Wang nominative scheme, we reduce some parameters in the Huang-Wang scheme. And in the standard model, the modified scheme can also satisfy security requirements of the original scheme. | Keywords/Search Tags: | Blind digital signature, Strong unforgeability, Unique blind signature, Strong blind signature, One-more-forgery, Smartphone, Sensor, nominative signature | PDF Full Text Request | Related items |
| |
|