Font Size: a A A

Researches Of Ring Signature Scheme Based On Identity

Posted on:2015-03-01Degree:MasterType:Thesis
Country:ChinaCandidate:P P SangFull Text:PDF
GTID:2298330422974896Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Nowadays computer has become an indispensable part of human life in all areas,information technology has brought great convenience, but a variety of threats such aseavesdropping, interception, modification and forgery attack followed. Thereforeinformation technology must be secure enough to resist these threats.Digital signature is a hot research topic in the field of information security, it can beunderstood the signature of the digital information. The recipient can determine the sourceof the message through the signed message after receiving the message, confirming that themessage really comes from the negotiated sender and the integrity.Ring signature is a new kind of anonymous signature technology, is a group orienteddigital signature scheme. Scheme is due to the parameters of the signature according to acertain rules of head-tail ring. The identity of the true signer won’t be leaked and othermembers of the ring can not forge a legally valid signature, namely the unconditionalanonymity and the unforgeability are the basic characteristics of ring signature.The third chapter of this paper puts forward the threshold ring signature scheme withthe designated verifier and the fourth chapter puts forward the proxy ring signature schemewith the proved identity of the signature as the foundation, after that, the fifth chapter putsforward the threshold proxy ring signature scheme based on the identity and bilinearpairings. The advantage of the threshold ring signature is that t members share the signingauthority to make the sign information together. The advantage of the proxy ring signatureis that when original signer is not convenient to make signature information, the proxysigner is awarded the power to sign the message. Combining these two kinds of schemes,make it possess the unconditional anonymity and unforgeability. At the same time it hasthe advantages of threshold ring signature and proxy ring signature.
Keywords/Search Tags:digital signature, hash function, bilinear pairings, the threshold ringsignature, the proxy ring signature, the threshold proxy ring signature
PDF Full Text Request
Related items