跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.97) 您好!臺灣時間:2026/03/17 10:51
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:謝宇恆
研究生(外文):Yu-Heng Sie
論文名稱:基於離散對數問題的代理盲簽名方案之安全性提升
論文名稱(外文):Security Improvement of A Proxy Blind Signature Scheme Based on DLP
指導教授:洪國寶洪國寶引用關係
指導教授(外文):Gwo-boa Horng
口試委員:陳宗和賈坤芳
口試日期:2019-07-10
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊工程學系所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2019
畢業學年度:107
語文別:中文
論文頁數:28
中文關鍵詞:電子商務盲簽名代理簽名Schnorr Signature
外文關鍵詞:e-commerceblind signatureproxy signatureSchnorr Signature
相關次數:
  • 被引用被引用:0
  • 點閱點閱:185
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在現今網路日漸發達的世代,越來越多的物件邁向電子化,造就了電子商務的發達,其中常見的如電子發票、行動支付、電子投票 …… 等。這些應用使用了密碼學中的加密、解密以及數位簽章的功能來滿足其中的安全問題。而代理簽名與盲簽名兩者合併而成的代理盲簽名則適用於此類應用。其中[7]所提出的方案,雖然在和以往相關論文比較擁有相對低的運算,又能滿足代理盲簽名所應具備的安全條件,但我們在此篇驗證式中,在扮演著攻擊者的前提之下,嘗試針對完整文件的內容作更動,並以驗證式取得對應的假簽名發現仍成立,驗證者也無法辨識出此為更動過的完整文件。而本文以Schnorr Signature機制中的加密、解密以及驗證的方法修改原先流程中的式子,以原方案發現的文件去做攻擊嘗試,最後於修改後的驗證式中很難取得對應簽名,增加攻擊者攻擊的難度。
Nowadays, increasingly developed generation of the Internet, more and more objects are evolving into electronics, creating a developed e-commerce. Like electronic invoices, mobile payments, electronic voting, etc. These applications use encryption, decryption, and digital signatures in cryptography to satisfy security issues.
Proxy blind signatures, which combine the proxy signature and the blind signature, are suitable for such applications. The scheme proposed in the paper [7], although having relatively low computation compared with previous related papers, can satisfy the security conditions that should be possessed by proxy blind signatures. However, in the verification, we play an attacker, trying to make changes to the contents of the complete file, and obtaining the corresponding fake signature by verification, the verification still holds, and the verifier cannot recognize this difference. In this paper, the encryption, decryption and verification methods in the Schnorr Signature mechanism are used to modify, and the files found in the original scheme are used for attack attempts. Finally, it is difficult to obtain the corresponding signature in the modified verification formula, and the attack difficulty is increased.
中文摘要 i
Abstract ii
目錄 iv
表目錄 v
圖目錄 vi
一、緒論 1
1.1研究背景與動機 1
1.2 Proxy Blind Signature 2
二、使用機制 8
2.1 One-time Signature 8
2.2 Schnorr Signature 9
三、相關研究 10
3.1 方案流程介紹 10
3.2 嘗試攻擊 13
四、提出修改 14
4.1 系統初始 14
4.2 代理授權 15
4.3 盲簽名 16
4.4 取得簽名 17
4.5 驗證 17
4.6 問題解決 19
五、安全性 21
六、分析比較與討論 24
七、結論 26
參考文獻 27
[1] D. Chaum, “ Blind Signature System ” , Proceedings of Crypto 83, Plenum, pp.153, 1983.
[2] D. Chaum, “ Blind signature for untraceable payment ” , Advances in Cryptology, proceeding of Crypto 82, Springer-Verlag, New York, pp.199-203, 1983.
[3] M. Mambo, K. Usuda, E. Okamoto, “ Proxy signature delegation of the power to sign message ” , IEICE Transaction on Fundamentals, Vol. E79-A, No. 9, pp. 1338-1354, 1996.
[4] Z. W. Tan, Z. J. Liu, C. M. Tang, “ A proxy blind signature scheme based on DLP ” , Journal of Software, Vol. 14, No. 11, pp. 1931-1935, 2003.
[5] Q. S. Xue, Z. F. Cao, “ A new proxy blind signature scheme with warrant ” , IEEE Conference on Cybernetics and Intelligent Systems (CIS and RAM 2004), Singapore, pp. 1385-1390, 2004.
[6] X. Yang, Z. P. Yu, “ Efficient Proxy Blind Signature Scheme based on DLP ” , International Conference on Embedded Software and Systems (ICESS2008), 2008.
[7] A. N. Oo , N. Thein, “ DLP based proxy blind signature scheme with low-computation ”, Fifth International Joint Conference on INC and IDC, pp. 285-288, 2009.
[8] M. Mambo, K. Usuda, E. Okamoto, “ Proxy Signature for delegating signing operation ” , Proc. 3rd ACM Conference on Computer and communications Security, ACM Press, pp. 48-57, 1996.
[9] C. P. Schnorr, “ Efficient signature generation for smart cards ” , Journal of Cryptology, Vol. 4, pp. 161-174, 1991.
[10] Z. He, L. Ge, “ ID-Based Signature Under the Schnorr Signature ” , 2008 4th International Conference on Wireless Communication, Networking and Mobile Computer, Dalian, pp. 1-3, 2008.
[11] Long Zhang, Junhua Li, Lili Chen, Yajing Zhou, “ A undividable electronic cash scheme based on Schnorr digital signature ”, 2011 International Conference on Computer Science and Service System(CSSS), Nanjing, pp. 2951-2954, 2011.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊