Font Size: a A A

Research And Implementation Of E-Signature System Based On Ring Signature

Posted on:2015-07-14Degree:MasterType:Thesis
Country:ChinaCandidate:H L LiFull Text:PDF
GTID:2308330464966897Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the development of the non-paper office, the E-Signature system has become a strong security basic in the E-business and E-government system, and has been widely used in the real life. E-Signature is a form of Chinese characteristics, which is a perfect organic combination of Chinese ancient imperial culture and electronic signature, and is caused by the rapid development of information technology and the wide application of computer network.Nowadays, the development of the E-Signature technology is China is full swing. More and more software companies and universities are involved in the research of the E-Signature system. At the same time, the State Password Management Bureau also issued a set to conform to the needs of the current password management and the design standard of E-Signature system regularly. Rely on the normative standard of design and the "Electronic Signature Law", the technology of E-Signature system has been widely developed and applied.With the design of the E-Signature system, more and more requirements have been proposed. In the design of the traditional E-Signature system, each E-seal is owned by one user or a department. To the person who is verifying the E-Signature, the attribute information of the E-seal is completely transparent. But in some special application areas, such as electronic cash, electronic voting, anonymous and the relevant departments who issue an official document, usually need hide the information of specific signature user. At this point, we should just require that the electronic signature is valid and the department information of the E-seal, but need no the specific user who sign it.The design of the E-Signature system is often rely on the design and strategy of the electronic signature algorithm. From the point of signature strategy, there appeared the blind signature, proxy signature, group signature and ring signature one after another. Each signature strategy has its scope of application. Among them, the performance of the group signature is similar to the ring signature. Any user of the group or ring can sign represent the group or ring. The user who is verifying the signature can only know the validity of the signature, but is unable to determine the specific signer’s information.Both of them have the characteristics anonymity. Differ from the group signature, the ring signature does not set the role of administrator. All the user of the whole ring is in the same class, so that it can make up for the defects that the administrator can specific the information of user who sign the document. Above all, we can determine that the ring signature is unconditional anonymity, which can meet the need for hidden the specific signer’s information in the above.This paper’s writing is based on the national science and technology project****. By researching the characteristics of the E-Signature system and the strategy of the ring signature, I put forward a design scheme of E-Signature system based on the ring signature strategy, and implement the strategy from the bottom testing and the system testing. According to the test results, we can know that the design meet the demand of the E-Signature system in some special fields. At the same time, I put forward a integration strategy between the new system and the traditional E-Signature system, which can lower the cost of the system development effectively.
Keywords/Search Tags:E-Signature, Ring Signature, Digital Signature, E-Office Document
PDF Full Text Request
Related items