Font Size: a A A

Application Research Of Partially Blind Signature On PET

Posted on:2022-12-03Degree:MasterType:Thesis
Country:ChinaCandidate:M Y ChenFull Text:PDF
GTID:2518306764467234Subject:Automation Technology
Abstract/Summary:PDF Full Text Request
With the popularity of Io T devices,people can interact with a wide variety of devices through the Internet of Things.However,Io T devices may exchange a large amount of sensitive information in various ways,resulting in various privacy threats and leaks.Privacy-enhancing technologies(PET)refer to technologies or frameworks that protect privacy in various fields.When the protection content is the privacy of the Internet of Things,the requirements for designing a PET scheme are: high computational efficiency,high security,the algorithm has a good hardware support environment and follows three design concepts: data control,privacy policy,anonymization/pseudonymization.Among them,data control refers to users decide to what data can be shared.Partial blind signature,as a hot technology in electronic cash and other fields,allows signers to embed public information negotiated with users in the signature in advance.Therefore,partially blind signatures just meet the idea of data control.However,as a PET scheme to protect the privacy of the Internet of Things,the current partial blind signature scheme cannot fully meet the requirements.Aiming at the current situation of lack of Io T privacy protection schemes in the field of partial blind signatures,this paper analyzes the feasibility of improving partial blind signatures into PET schemes for protecting Io T privacy,and proposes two certificateless partial blind signatures for protecting Io T privacy.The schemes in this paper adopt the method of embedding privacy policy in public information and replacing user identity with device identification and satisfies the PET design concept of protecting the privacy of the Internet of Things.The schemes are implemented based on the national secret algorithms SM2 and SM9 respectively.The security and computational efficiency of the schemes are obtained through theoretical analysis and design experiments,the two schemes fully meet the requirements of the PET scheme for protecting the privacy of the Internet of Things.The main research contents and results of this paper are as follows:1.In view of the lack of a privacy protection scheme for the Internet of Things in the field of partial blind signatures,this paper analyzes the feasibility of improving the partial blind signature to a PET scheme that protects the privacy of the Internet of Things.2.A certificateless partial blind signature scheme for protecting Io T privacy is proposed.The scheme is improved on the basis of the existing blind signature scheme and is implemented based on SM2.Under the random oracle model,the security proof is given.Compared with similar partial blind signature schemes based on elliptic curve,theoretical analysis shows that this scheme has higher computational efficiency.3.A new certificateless partial blind signature scheme for protecting Io T privacy is proposed.The scheme is implemented based on SM9 and has partial blindness and unforgeability.Theoretical analysis and experimental results show that the scheme has higher computational efficiency.
Keywords/Search Tags:PET, Partially Blind Signature, SM2, SM9, Certificateless Signature
PDF Full Text Request
Related items