Font Size: a A A

New Designs Of The Content Extraction Signature Scheme

Posted on:2020-08-29Degree:MasterType:Thesis
Country:ChinaCandidate:Z X TangFull Text:PDF
GTID:2428330620456728Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
The digital signature is one of core technologies to guarantee data security.It provides the verification of data integrity and authenticity.Although traditional digital signatures can satisfy fundamental requirements of data authenticity,but sometimes encumber the data owner from taking reasonable operations on data signed.The emerging of content extraction signatures resolves the problem.Compared to the traditional digital signatures,the biggest preponderance of content extraction signatures is in support of deleting operations.The new signature can be computed by the original data and corresponding signature without the secret key so that the authenticity of the data reserved can be verified simultaneously.Hence,the present ways to design content extraction signatures are not prolific enough,and the privacy problems remain to be unraveled out of the linkability produced by partial content extraction signatures.Directed at this,we display two new designs of the content extraction signature scheme:1.The batch signature is beneficial to improving the speed of signing and is similar to choose signatures as the content extraction signature while the content extraction signature can delete some information.Because of the complementarity in the function,commencing from the Waters signature scheme,we batch it,and then transform the batch scheme into the content extraction signature scheme.The mode of thought does proffer a general method for designing the content extraction signature,and a new design way is conceived.Centered on the Waters Scheme,our scheme designed enjoys the faster speed on verification and the smaller computation in overall.2.For the privacy leakage engendered by the linkability of content extraction signatures,We combine the ring signature and the content extraction signature,and propound the content extraction signature based on the architecture of magnifying glass(MGCES).Applying the blueprint labored above,We batch the ring signature,and convert it into the content extraction signature.Therefore,we endow our new scheme with unlinkability to offset the risk spawned from leaking privacy.
Keywords/Search Tags:Digital signature, Content extraction signature, batch signature, ring signature
PDF Full Text Request
Related items