(3.235.191.87) 您好!臺灣時間:2021/05/14 22:31
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:張鎮驛
研究生(外文):Chen-Yi Chang
論文名稱:授權導向式數位簽章方法與其應用之研究
論文名稱(外文):A Study of Delegation-oriented Digital Signature Scheme and Its Application
指導教授:李維斌李維斌引用關係
指導教授(外文):Wei-Bin Lee
學位類別:碩士
校院名稱:逢甲大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2001
畢業學年度:89
語文別:中文
論文頁數:61
中文關鍵詞:密碼學數位簽章離散對數資訊安全電子拍賣
外文關鍵詞:CryptographyDigital signatureDiscrete logarithmInformation securityElectronic auction
相關次數:
  • 被引用被引用:0
  • 點閱點閱:148
  • 評分評分:
  • 下載下載:25
  • 收藏至我的研究室書目清單書目收藏:1
本論文中,我們將介紹一個關於授權導向式數位簽章的新觀念。授權導向式數位簽章允許一個簽署者代表某個權力授與單位來做簽署的動作。在本論文裡,我們將對於群體簽章與代理簽章的概念與方法做一個大概的描述,除此之外,更進一步地證明此兩種數位簽章即是授權導向式數位簽章。藉由把焦點放在授權這個特性上,我們將可以很清楚的發現到一個重要的關係:一個擁有多重代理關係的代理簽章,它在效果上便等價於一個擁有可信任機關的群體簽章。基於這個重要的關係,一些原本存在於群體簽章或代理簽章的缺點,將可以藉由將這兩種簽章方法轉化成一種相同的形式而克服。除此之外,我們將更進一步提出其相關應用,也就是利用此一簽章特性在網際網路的環境下建構一個安全且實用的電子拍賣模式。

In this thesis, we will introduce the concept of delegation-oriented digital signature, a technique, which enables the signer to make signatures on behalf of some other entities, (Usually, the granting authorization). We will survey group and proxy signatures and further demonstrate the delegation-oriented property of each. We will also reveal the parallelism between a proxy signature scheme, multiple proxies and a group signature scheme with a trusted authority. Based on the significant relationships, some existing disadvantages in the group or proxy signature will be overcome by converting these two signature schemes into a common format. In addition, the related application for constructing secure and practical electronic auction over a network will be proposed.

Chapter 1 Introduction
1.1Motivation
1.2Thesis Organization
Chapter 2 Review of Proxy Signature and Group Signature
2.1 Proxy Signature
2.1.1 Our Proxy-protected Proxy Signature
2.1.1.1 Review of Mambo-Usuda-Okamoto Scheme
2.1.1.2 Our Proposed Scheme
2.1.1.3 Efficiency Discussion
2.1.1.4 Security Discussion
2.1.1.5 Remarks
2.2 Group Signature
Chapter 3 Delegation-oriented Signatures
3.1 Delegation-oriented Signature
3.2 Group and Proxy Signature are Both Delegation-oriented Signature
3.3 Reducible Relation between Group and Proxy Signature
3.3.1 Properties of Group Signature and Proxy Signature
3.3.2 Reducible Relation
3.4 Examples
3.4.1 Example — Enhanced Proxy Signature
3.4.2 Other Examples
Chapter 4 Application: Secure and Practical Electronic Auction over a Network
4.1 Motivation
4.2 Related Work
4.2.1 Basic Requirement for Electronic Auction
4.2.2 Delegation Concept
4.3 Our Proposed Electronic Auction Model
4.3.1 Architecture of the Proposed Electronic Auction
4.3.2 Phases in Our Proposed Model
4.4 Method 1 for the Proposed Electronic Auction Model
4.4.1 Auction Preparation
4.4.2 Bidding
4.4.3 Open the Bids and Declaring the Winning Bidder
4.4.4 Example of ElGamal Digital Signature Scheme
4.4.5 Anonymous Service
4.5 Method 2 for the Proposed Electronic Auction Model
4.5.1 Bidding
4.5.2 Identified Service
4.6 Analysis
4.6.1 Reasons for Applying Proxy Signature Scheme
4.6.2 Security Analysis
4.6.3 Convertible Property
4.6.4 Comparisons between Method 1 and Method 2
4.7 Remarks
Chapter 5 Conclusions and Future Researches
References
誌謝
Vita

1ANDERSON, R.: “Why cryptosystems fail,” Communications of ACM, Vol. 37, 1994, pp. 32-40.
2Bid.Com Auction Center: “http://www.bid.com”
3CHAUM, D., and VAN HEYST, E.: “Group signatures,” Pre-proceeding of Eurocrypt’91, Brighton, UK, 8-11 April 1991, pp. 257-265.
4CHEN, L., and PEDERSEN, T.P.: “New group signature schemes,” Pre-proceeding of Eurocrypt’94, Perugia, Italy, 9-12 May 1994, pp. 163-173
5CHEN, J. J. R. and LIU, Y.: “A traceable group signature scheme,” Mathematical and Computer Modeling, Vol. 31, 2000, pp. 147-160.
6Dealdeal Auction Center: “http://www.dealdeal.com”
7DIFFIE, W. and HELLMAN, M.E.: “New directions in
cryptography,” IEEE Transactions on Information Theory, Nov. 1976, v. IT-22, n. 6, pp. 644-654.
8E-Bay Auction Center: “http://www.ebay.com”
9ELGAMAL, T.: “A public key cryptosystem and signature scheme based on the discrete logarithms,” IEEE Trans. on Information Theory, 1985, IT-31, (4), pp. 469-472.
10First Auction Center: “http://www.firstauction.com”
11FRANKLIN, MATTHEW K. and REITER, MICHAEL K.: “The design and implementation of a secure auction service,” IEEE Transactions on Software Engineering, Vol.22, No.5, May 1996, pp. 302-312.
12HARN, L.: “Group-oriented (t, n) threshold digital signature scheme and digital multisignature,” IEE Proceedings-Computer and Digital Techniques, September 1994, Vol. 141, No. 5, pp. 307-313.
13HARN, L., and XU, Y.: “Design of generalised ElGamal type digital signature scheme based on discrete logarithm,” Electronics Letters, 1994, 30, (24), pp. 2025-2026.
14HWANG, S. J. and SHI, C. H.: “Specifiable proxy signature schemes,” National Computer Symposium 99’, Taiwan, 1999, pp. C-190 — C-198.
15KIKUCHI, H., HAKAVY, M. and TYGAR, D.: “Multi-round anonymous auction protocols,” IEICE Trans. INF. & SYST., 1999, Vol. E82-D, No. 4, April, pp.769-777.
16KIM, S., PARK, S. and WON, D.: “Proxy signatures, revisited,” ICICS’97, Lecture Notes in Computer Science 1334, Springer-Verlag, 1997, pp. 223-232.
17LEE, W.B., and CHANG, C.C.: “Efficient group signature scheme based on the discrete logarithm,” IEE Proceedings Computers and Digital Techniques, 1998, 145, (1), pp. 15-18.
18LEE, N. Y., HWANG, T. and WANG C. H.: “On Zhang’s nonrepudiable proxy signature schemes,” ACISP’98, Lecture Notes in Computer Science 1438, Springer-Verlag, 1998, pp. 415-422.
19LEE, W. B. and CHANG, C. Y.: “Efficient proxy-protected proxy signature scheme based on discrete logarithm,” Proceedings of 10th Conference on Information Security, Hualien, Taiwan, R. O .C., May 2000, pp. 4-7.
20LEE, W. B. and CHANG, C. Y.: “Delegation-oriented Signature Schemes,” submitted to IEEE Transactions on Consumer Electronics.
21MAMBO, M., OKAMOTO, E. and USUDA, K.: “Proxy signatures for delegating signing operation,” 3rd ACM Conf. on Computer and Communication Security, 1996, pp. 48-57.
22MAMBO, M., OKAMOTO, E.: “Delegation of the power to sign messages,” IEICE Trans. Fundamentals, 1996, Vol. E79-A, No. 9, Sep., 11 pages.
23NEUMAN, B. C. and MEDVINSKY, G.: “ Requirements for network payment: the netcheque perspective,” Proceedings of IEEE COMPCON’95, 1995, pp. 32-36.
24Onsale Auction Center: “http://www.onsale.com”
25PARK, S., KIM, S. and WON D.: “ID-based group signature,” Electronics Letters, Vol. 33, No. 19, 11 Sept. 1997, pp. 1616 —1617.
26PETERSEN, H. and HORSTER, P.: “Self-certified keys - concepts and applications,” Proc. 3rd Conference on Communications and Multimedia Security, Sep., 1997, pp. 102-116.
27RIVEST, R.: “The MD5 message-digest algorithm,” Request for Comments 1321, April 1992.
28RSA Laboratories’ Frequently Asked Questions About Today’s Cryptography: “http://www.rsasecurity.com/rsalabs/faq/”
29SCHNEIER, B.: “Applied Cryptography,” John Wiley & Sons, 2nd ed., 1996.
30SUBRAMANIAN, S.: “Design and verification of a secure electronic auction protocol,” IEEE Symposium on Reliable Distributed Systems, Proceedings. Seventeenth, 1998, pp. 204 —210.
31SUN, H. M.: “An efficient nonrepudiable threshold proxy signature scheme with known signers,” Computer Communications, Vol. 22, 1999, pp. 717-722.
32SUN, H. M.: “Convertible proxy signature scheme,” National Computer Symposium 99’, Taiwan R.O.C., 1999, pp. C-186 — C-189.
33SUN, H. M., LEE, N. Y. and HWANG, T.: “Threshold proxy signatures,” IEE Proceedings-Computers and Digital Techniques, Volume: 146, No. 5, Sept. 1999, pp. 259 —263.
34TSENG, Y. M. and JAN, J. K.: “A novel ID-based group signature,” Information Sciences, Vol. 120, Issue: 1-4, Nov. 1999, pp. 131-141.
35Ubid Auction Center: “http://www.ubid.com”
36YI, L., BAI, G. and XIAO, G.: “Proxy multi-signature scheme: a new type of proxy signature scheme,” Electronics Letters, Volume: 36, No. 6, 16 March 2000, pp. 527 —528.
37ZAuction Auction Center: “http://www.zauction.com”
38ZHANG, K.: “Threshold proxy signature schemes,” 1997 Information Security Workshop, Japan, Sep. 1997, pp. 191-197.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top