Font Size: a A A

Proxy Signature Scheme With Security Based On Elliptic Curve

Posted on:2013-06-26Degree:MasterType:Thesis
Country:ChinaCandidate:C X WuFull Text:PDF
GTID:2248330374976033Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
The proxy signature is very important part of public key cryptography,which is widelyused in many aspects of life. With the development of network communication technologyand business needs, many proxy signature scheme with a specific function are proposedaccording to the application requirements in the real-life,such as proxy multi-signature、proxysignature scheme with message recovery、designated verifier proxy signature, multi-proxymulti-signature scheme.etc. The studies of this paper is the proxy signature based on ellipticcurve cryptosystem which puts the proxy multi-signature,message recovery signature andshared verifier signature together organically,And design a new high efficiency anonymousproxy program.At last, research and analysis of several aspects of these programs are asfollows:1. Based on elliptic curve discrete logarithm hard problems, this paper proposes a newmessage recovery signature scheme, optimizing efficiency and improving security. Comparedto the literature[1], the computing speed of this program in the recovery message is faster.2. In practical applications, only one of the designated verifier may be taking bribes,orattacks by collusion. In this case,the original signer want to specify multiple verifier, todiversify authentication permissions and increase the security of signature. Therefore, on thebasis of this reality need, the new scheme about shared verifier signature are proposed, whichaim to strengthen the security and reliability of the signature verification, and maintain theadvantages of the signature with message recovery, reducing the bandwidth.3. About proxy signature in certain circumstances, the identity of the agent to be keptconfidential, In case of dispute,the original signer can expose who signed it by looking up hisdata bank. Proxy signature scheme on elliptic curve can be further study in this paper,pointedout that there is an error in the proxy signature scheme proposed in literature[21], and correctits mistakes.4. Finally, anonymous proxy signature scheme is designed in this paper, and prove itssecurity. Then compared efficiency and computational complexity with literature[21], Thisscheme has obvious advantages in the realization of the program.
Keywords/Search Tags:Proxy signature, message recovery, shared verification, anonymous proxy, elliptic curve
PDF Full Text Request
Related items