Font Size: a A A

Acting Research And Design Signature Scheme

Posted on:2014-06-06Degree:MasterType:Thesis
Country:ChinaCandidate:L YangFull Text:PDF
GTID:2268330425453365Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the advent of the information age of the21st century, information has become a special resources and wealth which attracted great attention. At the same time, information security issues become particularly important. Because the information once be intercepted, stolen, tampered or destruction by the unauthorized signer, it will cause irreparable huge loss. Cryptography theory has made a lot of research on these issues which achieved many important results.Digital signature is an important branch of cryptography, which plays a significant role in ensuring information security. According to the feature of signature and the different application environment, digital signatures have many classifications. Such as proxy signature, blind signature, ring signature and group signature. This paper mainly introduces the proxy signature, which agent instead the primitive people to exercise the signature rights. The main contents are as follows:1. We first introduce the related research and development of digital signature and proxy signature.2. This thesis made analysis to a new proxy signature, points out that it cannot resist the public key replacement attack. We propose an improvement scheme on the basis of the original one.3. It analysis a certificateless proxy blind signature scheme which proposes by HuangJuan et al. And points out that there are security flaws. This thesis proposes a new certificateless proxy blind signature scheme which can resist the public key replacement attack and malicious-but-passive KGC attack. So the new scheme is more security.4. We analysis an efficient certificateless signature scheme which proposes by DuHongzhen et al, find out this scheme cannot resist malicious KGC attack. Then we design a new scheme which is more security.
Keywords/Search Tags:digital signature, proxy signature, public key replacement attack, malicious-but-passive KGC attack, certificateless public key cryptography
PDF Full Text Request
Related items