Font Size: a A A

Research And Application On Identity-based Designated Verifier Signature Scheme

Posted on:2021-05-20Degree:MasterType:Thesis
Country:ChinaCandidate:L JiangFull Text:PDF
GTID:2428330629480604Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In the era of big data,the Internet of Things(IOT)has been developing rapidly,enabling the information and data to be transmitted efficiently and rapidly in the network.This has greatly promoted the progress of society and the change of lifestyle.However,it has also caused a series of information security problems.Digital signature,as an important cryptography technology,can prevent theft,forgery,modification,interception and replay attacks on information and data.Therefore,it is of great significance to studying the digital signature deeply.Ordinary digital signature can be verified by any legal user(public verifiability),then the designated verifier signature(DVS)is a signature with limited and controlled verification,so the signature can only be verified by the designated person,which somewhat solves the relationship between privacy and authentication.In addition,the signature features no transitivity.Designated verifier signature has been widely used in electronic voting,e-commerce,remote medical treatment,and other fields.The design of a new strong designated verifier signature scheme,a new strong designated verifier proxy signature scheme,and the application of the designated verifier proxy signature in the cloud medical scenario were investigated in the paper,with results shown as below:(1)An identity-based strong designated verifier signature was proposed.Firstly,the general algorithm and security requirements were given,and then the signature scheme was designed.Finally,the security and performance were analyzed.Through comparison,it was found that the effectiveness of the signature scheme is superior and meets the security requirements.(2)An identity-based strong designated verifier proxy signature scheme was proposed and the solution of generalized algorithm and security requirements were given.It was foundthis signature scheme performs well compared with the other schemes in the effectiveness and meets the safety requirements.(3)A provable and secure identity-based designated verifier proxy with message recovery was proposed to be applied to cloud medical diagnosis network scenario.The security problem of the scheme was attributed to the computational Diffie-Hellma problem,as the scheme had existential unforgeability against chosen-message attacks in the random oracle model.The performance analysis showed that the scheme is suitable for the application of telemedicine diagnosis network.
Keywords/Search Tags:Strong designated verifier signature, Proxy signature, Digital signature, ID-based, Bilinear pairing, Cloud medical
PDF Full Text Request
Related items