跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.171) 您好!臺灣時間:2026/04/09 08:17
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:鄭凱霖
研究生(外文):Kai-Lin Jeng
論文名稱:確保使用者隱私、合法權利之高效率數位簽章設計
論文名稱(外文):An Efficient Proxy Blind Signature Scheme with the Discrete Logarithm-based Trapdoor Hash
指導教授:賴義鵬賴義鵬引用關係
指導教授(外文):Yeu-Pong Lai
學位類別:碩士
校院名稱:國防大學中正理工學院
系所名稱:資訊科學研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:64
中文關鍵詞:代理簽章盲簽章代理盲簽章後門雜湊函數離散對數
外文關鍵詞:Proxy SignatureBlind SignatureProxy Blind SignatureTrapdoor hashDiscrete logarithm
相關次數:
  • 被引用被引用:0
  • 點閱點閱:194
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:3
數位簽章 (digital signature)是電腦網路通訊雙方互信的基礎,也是電子商
務能否普及的最重要關鍵。數位簽章的應用環境和方式變化繁多。雖然近年來
國內外的專家和學者已經發展了許多不同類型的簽章技術以因應不同的應用環
境需求;然而隨著網路通訊活動的方式和結構愈來愈複雜,有愈來愈多的應用
系統會需要各種不同類型的簽章技術的支援,例如具有匿名性及不可追踨性的
盲簽章,及由可授權可信賴第三人,代為行使數位文件簽署的代理簽章。
代理盲簽章結合了盲簽章與代理簽章的雙重優點,因而可適用於某些電子
商務環境的應用之上,在2002年Tan等首先提出基於離散對數及楕圓曲線離散對
數困難度的代理盲簽章機制,然而這兩個代理盲簽章機制都被證明有被偽造簽
章及追踨使用者的缺點。之後雖然也有許多學者提出各種不同技術的代理盲簽
章機制,然而這些代理盲簽章系統都需要大量的系統運算及繁複的資訊交換流
程,如果在執行大量數位文件簽署的情形下恐怕會因過高的運算負擔使整個系
統的效能及安全性降低。
在本論文中我們改進Mehta與Harn的代理簽章而設計出新式高效率代理盲
簽章,新的代理盲簽章不但符合所有代理盲簽章的安全需求,還擁有系統運算
量低、執行流程精簡、有效限制代理權力以及在發生內部爭議時快速判斷是誰
違反協定等優點,相較於先前的代理盲簽章,我們的研究成果更能夠提昇代理
盲簽章系統安全性及運算效能,讓代理盲簽章技術更符合未來電子投票系統或
電子商務環境需求。
The proxy blind signature scheme becomes important because of its application
in e-commerce with the advantages of the proxy signature scheme and the blind
signature scheme. Many researchers proposed useful proxy blind signature schemes
in these years. Tan et al. proposed two proxy blind signature schemes based on
discrete logarithm problem and ecliptic curve discrete logarithm problem respectively.
Lal and Awasthi pointed out that Tan et al.’s schemes were subject to forgery attacks
on the signature receiver’s side. Then proposed their own secure proxy blind
signature scheme to mend the drawback in Tan et al.’s schemes they pointed out.
Recently, Wang et al. also proposed a secure efficient proxy blind signature scheme
based on discrete logarithm problem to overcome the pointed out drawbacks in Tan et
al.’s schemes. Compared with existing proxy blind signature schemes, Wang et al.’s
scheme is more efficient. After our analyses, we found that most of proxy blind
signature schemes are based on blind signature. In order to achieve unforgeability and
unlinkability properties, these proxy blind signature systems need to implement many
times of information interchange to complete a signature. Therefore, the efficiency of
these proxy blind signature schemes is limited. In this thesis, we propose a novel
proxy blind signature scheme based on Mehta and Harn’s one-time proxy signature
scheme. In the proposed scheme, the requesters only need to implement the
information interchange once. It is shown that the proposed scheme satisfies all
important security requirements, and is more efficient.
誌謝...........................................................................................................................ii
摘要..........................................................................................................................iii
ABSTRACT............................................................................................................. iv
目錄........................................................................................................................... v
表目錄.....................................................................................................................vii
圖目錄....................................................................................................................viii
第一章 緒論............................................................................................................. 1
1.1 研究背景與動機......................................................................................... 1
1.2 研究目的..................................................................................................... 5
1.3 論文架構..................................................................................................... 6
第二章 文獻研究與回顧......................................................................................... 7
2.1 盲簽章(Blind Signature)........................................................................... 10
2.1.1 D.Chaum 的盲簽章系統................................................................. 12
2.1.2 M. Stadler 等人的公平盲簽章........................................................ 14
2.1.3 P.L. Yu 與 C. L. Lei 的高效率公平盲簽章.................................. 15
2.1.4 Chen等的電子投票系統.................................................................. 18
2.1.4.1 系統架構與流程........................................................................... 20
2.1.4.2 安全性分析及改進建議............................................................... 25
2.2 代理簽章................................................................................................... 28
2.2.1 Mambo等的代理簽章...................................................................... 32
2.2.2 Sun與Hsieh的代理簽章................................................................... 33
2.2.3 Yen等的代理簽章............................................................................ 34
vi
2.3 代理盲簽章............................................................................................... 35
2.3.1 Tan等的代理盲簽章......................................................................... 36
2.3.2 Lal與Awasthi的代理盲簽章............................................................ 38
2.3.3 Wang等的代理盲簽章..................................................................... 40
第三章 Mehta與Harn的高效率代理簽章系統.................................................... 44
3.1 系統設定階段........................................................................................... 46
3.2 代理授權階段........................................................................................... 47
3.3 文件簽署階段........................................................................................... 48
3.4 簽章驗證階段........................................................................................... 49
第四章 新式代理盲簽章系統.............................................................................. 51
4.1 系統設定階段........................................................................................... 51
4.2 代理授權階段........................................................................................... 52
4.3 文件簽署階段............................................................................................ 53
4.4 簽章驗證階段........................................................................................... 55
4.5 安全性與效率分析................................................................................... 56
第五章 結論與未來研究方向.............................................................................. 60
5.1 結論........................................................................................................... 60
5.2 未來研究方面........................................................................................... 60
參考文獻................................................................................................................. 61
自傳......................................................................................................................... 64
[1.] William Stallings, Cryptography and Network Security: Principles and Practice, Third Edition, Prentice Hall, August 2002.
[2.] 曾育民, “數位簽章之類型及應用”, 資訊安全通訊 Vol.7 No.3, pp. 59-67,
2001.
[3.] T. ElGamal, “A Public-Key Cryptysystem and Signature Scheme Based on Discrete Logrithms”, IEEE Transactions on Information Theory, Vol. IT-31, No.4, pp. 469-472, 1985.
[4.] R. L. Revest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, Communications of ACM, Vol. 21, pp. 120-126, February 1978.
[5.] Chen Yu-Yi, Jan, Jinn-Ke, Chen Chin-Ling, “The design of a secure anonymous Internet voting system”, Computers and Security Volume: 23, Issue: 4, pp. 330-337, June 2004.
[6.] Chen Yu-Yi, Jan, Jinn-Ke, Chen, Chin-Ling, “Design of a fair proxy raffle protocol on the Internet”, Computer Standards & Interfaces Volume: 27, Issue: 4,April 2005, pp. 415-422.
[7.] Carlo Blundo, Stelvio Cimato, “A Platform for Secure E-Gambling”, International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2, 2004. p. 768.
[8.] D. Chaum, “Blind signatures for untraceable payments”, Advances in Cryptology: Proceedings Crypto’82, New York: Plenum Press, pp. 199-203, 1983.
[9.] M. Stadler, J.M. Piveteau and J. Camenisch, “Fair Blind Signatures,” Advances in Cryptology :Eurocrypt’95, pp.209-219, 1995.
[10.] J. L. Camenisch, J. M. Piveteau, M. A. Stadler, “Blind signatures based on the discrete logarithm problem”, Advances in Cryptology: Eurocrypt’94, Perugia, Italy, pp.428-432, 1994.
[11.] P. Horster, M. Michels, H. Petersen, “Efficient blind signature schemes based on the discrete logarithm problem”, Technical Report TR-94-6, University of Technology Chemnitz-Zwichau, 4 pages, June 1994.
[12.] E. Mohammed, A. E. Emarah, and K. El-Shennawy, “A blind signatures scheme based on ElGamal signature“, in IEEE/AFCEA EUROCOMM 2000 Information Systems for Enhanced Public Safety and Security, pp. 51-53, 2000.
[13.] Fan Chun-I, “Improved low-computation partially blind signatures“, Applied Mathematics and Computation 145 (2003), pp.853-867.
[14.] P.L. Yu and C.L. Lei, ” User Efficient Fair Blind Signatures”, Journal of Information Science and Engineering, accepted, 2000.
[15.] Masahiro Mambo, Keisuke Usuda and Eiji Okamoto, “Proxy signatures for delegating signing operation”, Proceeding 3rd ACM Conference. on Computer and Communications Security, ACM Press, pp. 48-57 , March 1996.
[16.] M. Mehta and L. Harn, “Efficient one-time proxy signatures”, IEE Proceedings of Communication. Vol. 152, no. 2, pp. 129-133, April 2005.
[17.] H.M. Sun and B.T. Hsieh, “Remarks on two non-repudiable proxy signature schemes”, In Proceedings of the 9th National Conference on Information Security, pp.241–246, 1999.
[18.] S.M. Yen, C.P. Hung, and Y.Y. Lee, “ Remark on Some Proxy Signature Scheme”, In Proceedings of the 2000 International Computer Symposium, workshop on Cryptology and Information Security, Chiayi, Taiwan, pp.54-60, December 2000.
[19.] Zuowen Tan, Zhuojun Liu, and Chunming Tang, “Digital proxy blind signature schemes based on DLP and ECDLP”, MM Research Preprints, MMRC, AMSS, Academia, Sinica, Beijing (2002), NO.21, pp. 212-217, December 2002
[20.] Sunder Lal and Amit K Awasthi, “Proxy Blind Signature Scheme”, Cryptology ePrint Archive, Report 2003/072, April 2003.
[21.] Sunder Lal and Amit K Awasthi, “Proxy Blind Signature Scheme”, Transaction On Cryptology, Volume 2- Issue 1, pp.5-11, January 2005.
[22.] Shaobin Wang, Fan Hong, and Ghohua Gui, “Secure Efficient Proxy Blind Signature Schemes Based DLP”, Proceedings of the Seventh IEEE International Conference on E-Commerce Technology (CEC’05), pp. 452-455, July 2005.
[23.] http://en.wikipedia.org/wiki/Man_in_the_middle_attack.
[24.] Gritzalis, Dimitris A. “Principles and requirements for a secure e-voting system”. Computers and Security Volume: 21, Issue: 6, pp. 539-556, October 2002.
[25.] Adi Shamir and Yael Tauman, “Improved online/offline signature schemes”, CRYPTO 2001, LNCS 2139, pp. 355-367, August 2001.
[26.] D.Chaum and E. van Heyst, “Group Signature”, In Andances in Cryptology –EUROCRYPT’ 91, Vol. 547 of LNCS, pp. 257-265, pringer – Verlag, 1991
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top