Font Size: a A A

Research Of Proxy Blind Signature Schemes Based On ECC

Posted on:2016-08-20Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhangFull Text:PDF
GTID:2308330464471140Subject:Applied cryptography
Abstract/Summary:PDF Full Text Request
With the accelerated process of social information, the information security technology becomes more and more important. Network information disclosure occurred in recent years shows that information security is facing serious challenges. As the physical signature in real-life,digital signature is an important network information security technology for identification and singing power. With the popularity of wireless mobile terminals, to ensure the safety of the premise, the digital signature scheme with shorter secret key will be more attention. Elliptic Curve Cryptography fits these requirements.This paper mainly studies several types of proxy blind signature schemes based on elliptic curve cryptosystem. In some elliptic curve-based proxy blind signature schemes have been proposed, the security needs to be further improved. As in the anti-forgery, since the designer only designed to verify the proxy signing secret key value, but ignored to verify the structure of proxy signing secret key, this leads to proxy signer can make a "legitimate" signature without the authorization of the original signer. In terms of anti-link, the designer of some programs ignored that the proxy signer can use the open blind signature and date in his/her hand to determine whether the two signatures match after the blind signature is published. Proxy signer can link the blind signature by this way.For security problems described above in some proposed proxy blind signature scheme based on elliptic curve cryptography, three types of proxy blind signature scheme is designed or improved in this paper. The new proxy blind signature scheme improved proxy signing secret key from the "DTS scheme ". A new blind method which is different from the original scheme is designed. For the risk of collusion attack of "CCH1-LX scheme", the new scheme improves its proxy signing secret key generation method and designs a new blind method. Then it becomes a new muti-proxy blind signature. The new ID-based proxy blind signature scheme focuses on verifying the structure of proxy signing secret key. It designs a new secret key generation, signing and verification methods using bilinear method with a strong anti-forgery. After security analysis,we will find these three new designed proxy blind signature schemes are all to meet the basic safety requirements of proxy blind signature scheme. The efficient comparison with similar schemes shows that three new proxy blind signature scheme proposed in this paper has some advantages in terms of efficiency.
Keywords/Search Tags:Elliptic curve, Bilinear pairs, Proxy signature, Blind signature
PDF Full Text Request
Related items