Font Size: a A A

Researching Of Efficient Designated Verifier Signature Scheme And Application

Posted on:2017-03-02Degree:MasterType:Thesis
Country:ChinaCandidate:F YueFull Text:PDF
GTID:2308330485984753Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Digital signature is a kind of technical method to ensure data integrity,authentication and non-repudiation and it is widely applied in the field of information security. The traditional digital signature can be verified publicly, while this will lead the leakage of the signer’s identity. Designated verifier signature is the solution of protecting the signer’s privacy. In the designated verifier signature, the signer not only can produce the valid signature, but also can specify a verifier to make the same valid digital signature. In this way, any third party will not be able to judge the legitimacy of the signature. Although the designated verifier signature discards the undeniability of digital signature, it can guarantee the confidentiality of the identity of the signer. The concrete achievements of this paper are about the design and implementation of designated verifier signature and they are presented as follows:1. Through the analysis of the existing designated verifier signature schemes, this thesis divides them into three categories according to the method of the existing scheme’ structure, and this thesis also analyzes the non-delegatability of the schemes.2. This thesis extends the Schnorr signature scheme to a certificateless strong designated verifier signature scheme which not only guarantees the unforgeability,non-transferability, source hidding and non-delegatability of designated verifier signature, but also can be proved to be resistant to the two common types of attack model in certificateless cryptography scheme. Meanwhile, this thesis also shows the performance comparison and security comparison among the proposed strong designated verifier signature scheme and the other existing schemes, indicating the performance and security of this scheme are higher than the existing schemes.3. This thesis points out that Lei’s strong designated verifier ring signature scheme does not satisfy the basic properties of designated verifier signature through analysis and presents the corresponding method of delegatability attack. In order to avoid the delegatability attack, this thesis reconstructs a strong designated verifier ring signature scheme. In addition, for purpose of the confidentiality of signature, this thesis also constructs on a strong designated verifier ring signcryption scheme on the basis of the signature scheme.4. This thesis analyzes and discusses that the designated verifier signature plays arole in the actual application, especially cloud audit system and the e-Health.
Keywords/Search Tags:designated verifier signature, non-delegatability, certificateless cryptography, ring signature
PDF Full Text Request
Related items