Font Size: a A A

Research On Two Provable Secure Short Signature Schemes And Their Applications

Posted on:2020-01-06Degree:MasterType:Thesis
Country:ChinaCandidate:Z S ChenFull Text:PDF
GTID:2428330590452490Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the development of wireless network technology and Internet of things technology,the problem of weak computing power and limited bandwidth exists in the application environment,which is a great challenge for the further application of digital signature technology.The short signature scheme,due to its own characteristics,has a signature length of half that of a normal signature,and is well suited for environments with limited computing power and bandwidth limitation,and can improve storage efficiency and transmission efficiency.This paper focuses on the analysis and research of digital signature and proxy signature without certificate on the basis of short signature.The specific research results are as follows:1.In view of the problem of public-key substitution attack in traditional certificateless digital signature schemes,the traditional definition of certificateless signature is improved,and a new certificateless short signature scheme is proposed based on the new definition of certificateless digital signature.Then the scheme is proved to be unforgeable under the Inv-CDH problem and the random oracle model.Finally,the efficiency of the program is analyzed and compared with the code implementation.2.In order to be suitable for applications with weak computing power and limited transmission capacity,a short proxy signature scheme based on bilinear mapping is proposed.Then the scheme is proved to be unforgeable based on the computational Diffie-Hellman problem and the k-collision attack algorithm under random oracle model.Finally,the efficiency of the program is analyzed and compared with the code implementation.3.This paper analyzes the information security access protocol of the voltage monitoring device in the power wireless APN virtual private network,and points out the shortcomings of the key agreement protocol and the data encryption transmission protocol.Then the protocol is improved based on the new certificateless short signature scheme,which effectively realizes the source reliability authentication and message integrity protection of the protocol packets.
Keywords/Search Tags:provable security, bilinear pair, random oracle model, short signature, certificateless signature, proxy signature
PDF Full Text Request
Related items