Font Size: a A A

With The Analysis And Improvement Of A Fault Threshold Signature Scheme

Posted on:2014-07-29Degree:MasterType:Thesis
Country:ChinaCandidate:Y N ZhangFull Text:PDF
GTID:2268330398497629Subject:System theory
Abstract/Summary:PDF Full Text Request
With the development of computers, information security has become a modern society, one of the important issues in modern society, networked interactive information for people, as well as the development of science, technology, culture, education and improving the effect of bringing about a profound. But in advancing human progress at the same time, also poses a challenge to personal privacy, and State secrets, information security has become an important emerging discipline. The digital signature is the cryptology important constituent, is one of information security core technologies, has the authentication, the integrity and undeniable. Along with the computer network fast development, simulated writing by hand to sign simply already cannot meet the needs completely; massive had the special nature digital signature plan to rise.Chaum in1983, a blind signature schemes, blind signature refers to the signer of the message the signature process is not to know the contents of the message, on behalf of the signed message has a protection function. Mambo was introduced in1996proxy signature scheme, proxy signature refers to the signer by the designated agent may represent the original signer, and the resulting effect is equivalent to the signature of the original signers, so even if the original signer can inconvenience the signature is to generate a valid signature. Lin, who in2000first proposed proxy blind signature scheme, as a new type of digital signature schemes, its have a blind signature and proxy signature characteristics. Exactly what the advantages and makes proxy blind signature scheme is widely used in electronic money, electronic commerce, network security, electronic voting and electronic auctions, and other fields.In the traditional public key system, a public key certificate management there is a problem of great complexity and high costs, and identity-based cryptography addresses these issues, and the two can complement each other. Bilinear pairing a basic tool for building identity-based signature. But due to the high of bilinear pairing operation, the impact of the efficiency of the programme, so an ID-based blind signature scheme in real-world applications are not ideal.In the signature and blind signed on the basis of our analysis, based on identity in the context of the current program of the acting blind signatures on safety and efficiency of research results, this article is mainly:1. Proxy blind signature of Ling-Ling Chen safety of the program are analyzed, Chen pointed out that the program a security issue, such as the agent who forged the signature of the authorized issue of the original signer, proxy signer’s post-tracking problem.2. In Chen’s safety defects, we have made a better acting blind signature program. And the new program and the original program for purposes of comparison, proved the safety of the new signed programs can resist the acting signed other than the original program, so that any attacks tend to improve3. Apply new agent’s blind signature scheme concretely to the electronic vote system, realize its actual using value.
Keywords/Search Tags:digital signatures, proxy blind signature, identity-based signature, electronic voting
PDF Full Text Request
Related items