Font Size: a A A

Research And Analysis Of Several Proxy Signature Schemes

Posted on:2020-04-16Degree:MasterType:Thesis
Country:ChinaCandidate:F F HuiFull Text:PDF
GTID:2428330623961600Subject:Mathematics
Abstract/Summary:PDF Full Text Request
Digital signature is an important research field of cryptography,and it is widely used in information security,communication,finance and electronic commerce.As a special form of digital signature,proxy signature can replace the original signer to exercise the rights of signature.However,this kind of scheme is vulnerable to various security threats in the stage of proxy authorization and proxy signature,which makes the original information suffer from a risk of being leaked or tampered.Therefore,it is an important significance to study the security and effectiveness of the scheme.This paper mainly studies forward secure proxy blind signature and certificateless proxy signature.The contents are as follows:1.A forward secure proxy blind signature scheme is analyzed and improved.It is found that there exists the problem of message owner's repudiation.In order to solve this security defect,an improved scheme is proposed.The new scheme embeds the private key of the message owner when the message is blinded in the proxy blind signature stage.Thus it can solve the security problems in the original scheme.2.A certificateless proxy signature scheme is analyzed and improved.Chen Hu's certificateless proxy signature scheme is analyzed by means of forgery attack.It is pointed out that the scheme can not resist public key replacement attack and malicious KGC attack,then a new improved scheme is proposed.The new scheme reduces a hash function in the system parameter setting stage.Meanwhile,the security of the scheme is guaranteed by strengthening the relationship between public and private key parameters in the proxy authorization and proxy signature stage.Thus the new scheme not only overcomes the security defects in the original scheme,but also improves the computational efficiency.3.A proxy electronic voting protocol is proposed.Firstly,by introducing blind factors into the proxy signature stage,a certificateless proxy blind signature scheme is presented.Then,using bit commitment technology,an electronic voting protocol based on certificateless proxy blind signature is designed.Finally,the protocol is verified to be correct and feasible.
Keywords/Search Tags:proxy signature, certificateless signature, blind signature, forward security, E-voting protocol
PDF Full Text Request
Related items