Font Size: a A A

The Theoretical Analysis And Application Of Blind Signature

Posted on:2014-04-04Degree:MasterType:Thesis
Country:ChinaCandidate:B LiFull Text:PDF
GTID:2268330422452296Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the rapid development of computer hardware, the running speed of computer andthe cracking ability to the traditional public key algorithm are becoming stronger, which putsa great threat to various of existing electronic payment protocols. Researchers enhance thesafety of E-payment protocol through constructing more complex blind signature protocols.The efficiency of the protocol is not very well although the safety of the protocol can beimproved. Consequently, the constructions of blind signature and E-payment scheme that aresafe and efficient have become the research hot spots of information safety.Among the already proposed blind signature schemes that are based on public keycryptosystems, several schemes can successfully fabricate signature information through themeet-in-the-middle attack and active attack. This paper concludes five safe blind signatureschemes that are based on public key cryptosystems from the proposed ones, and gives theefficiency analysis among them.The zero knowledge proof plan of Schnorr digital signature can protect the safety ofSchnorr digital signature well, and prevent the signature from spreading freely. The proverdoes not need to provide the Schnorr digital signature to the verifier, but provides theinteractive information of the zero knowledge proof protocol. The verifier can’t learn anyrelative information of the signature through interactive information, but ensure that thesigner owns the signature information, which can effectively prevent the Schnorr digitalsignature from spreading freely.With the card safety theory, this paper raises two blind signature schemes that are basedon identity in the standard model and certificateless signature in the random oracle modelmachine, respectively. Both of them define the blind signature system first, then structure theblind signature scheme by bilinear pairing, classify the safety to the difficult math problem atlast.We put forward a simple e-cash scheme based on identity on the basis of the blindsignature project based on identity in the standard model raised in this paper, and analyze thecorrectness, anonymous letter and unforgeability of the proposed e-cash scheme. Analysisshows that the e-cash scheme possesses a higher safety and can be applied to E-Business.
Keywords/Search Tags:blind signature, electronic cash, standard model, random oracle model, zero-knowledge proof
PDF Full Text Request
Related items