跳到主要內容

臺灣博碩士論文加值系統

(23.20.20.52) 您好!臺灣時間:2022/01/24 19:42
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:鐘敏毓
研究生(外文):Minyu Chung
論文名稱:可恢復訊息之公平盲簽章方法之探討
論文名稱(外文):Message Recovery Fair Blind Signature Schemes
指導教授:洪國寶洪國寶引用關係
指導教授(外文):Gwoboa Horng
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊科學研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:中文
論文頁數:50
中文關鍵詞:公平盲簽章恢復訊息模糊傳送
外文關鍵詞:fair blind signaturemessage recoveryoblivious transfer
相關次數:
  • 被引用被引用:2
  • 點閱點閱:2831
  • 評分評分:
  • 下載下載:141
  • 收藏至我的研究室書目清單書目收藏:2
盲簽章可以應用在電子付款系統上,可提供無關聯性及匿名性。但這樣的性質卻有可能被罪犯來利用洗錢或是勒索,Lee和Kim所提出的訊息恢復公平盲簽章方法,能避免被罪犯利用盲簽章匿名性的問題,但Hsien,Ko和Chen卻找到了一個傳送者可以利用偽造revocation key 產生出無法追蹤的盲簽章,而沒有達到公平性的需求。本文除了提出了一個改善Lee-Kim方法中revocation key的驗證方法,使傳送者不能任意偽造revocation key達到公正性,也探討了其他相關的公平盲簽章法。
Blind signature could be use to electric payment system. It also could offer unrelated and anonymous properties. However this characteristic might be misapply by criminals for extorting or other purposes. The scheme, which mentioned by Lee and Kim, could help the fair blind signature to avoid the anonymous problem. Nevertheless Hsien, Ko and Chen found that user could make an untraceable blind signature by creating a pretend revocation key. This tricky fact causes the blind signature cannot reach the requirement of fairness. This paper mentions a scheme, which could improve the checking way of revocation key in Lee-Kim’s scheme, and also let user cannot create pretend revocation key to reach the fair requirement. Moreover, in this paper also shows the discussions of other fair blind signature schemes.
第一章 簡介
第二章 背景知識
第三章 相關研究
第四章 Lee-Kim之訊息恢復公正盲簽章方法
第五章 Lee-Kim之可訊息恢復公平盲簽章方法的改進
第六章 結論和未來展望
[1] A. Fiat and A. Shamir, “How to Prove yourself :Practical solutions to identification and signature problems,” Advance in Cryptology of Crypto’86, Lecture Notes in Computer Science, Springer-Verlag, pp.318-328.
[2] A. Juels, M. Ludy and R. Ostrovsky, ”Security of Blind Digitial Signatures,” Advance in Cryptology -Crypto’97, Lecture Notes in Computer Science, Springer-Verlag,pp.150-164, 1997.
[3] B. V. Solms and D. Naccache, “On Blind Signture and Perfect Crimes,” Computers and Security, Vol. 11, No. 6,pp. 581-583, 1992.
[4] C. I. Fan and C. L. Lei ,”A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash,” Proceedings of National Computer Symposium, Vol. 2, pp. C-89-C-94, 1997.
[5] D. Chaum, “Blind Signature for Untraceable Payments,” Advances in Cryptology-Crpto’82, Lecture Notes in Computer Science, Springer-Verlag, pp.199-203, 1982.
[6] D. Chaum, “Blinding for unanticipated signatures,” Advances in Crypatology-Eurocrypt’87, Lecture Notes in Computer Science, Springer-Verlag, pp.227-233, 1987.
[7] D. Chaum, A. Fiat and M. Naor, “Untraceable electronic cash,” Advances in Cryptology-Crypto’88, Lecture Notes in Computer Science, Vol .403, Springer-Verlag, pp.319-327, 1990.
[8] E. F. Brickell, P. Gemmell and D.Kravitz, “Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change,” Symposium of Distributed Algorithms, 1995.
[9] E. Mohammed, A. E. Emarah and Kh. Ei-Shennawy, “A Blind Signature Scheme Based on ElGamal Signature,”Radio Science Conference, 2000. 17th NRSC ''2000. Seventeenth National, pp:C25/1-C25/6, 2000.
[10] J. E. Hsien, P. W. Ko and C. Y. Chen, “Comments on Lee and Kim’s Message Recovery Fair Blind Signature Scheme,” Proceedings of the Tenth National Conference on Information Security, pp.123-125, 2000.
[11] J. L. Camenisch, J. M. Piveteau and M. A. Stadler, ”Blind siganture based on discrete logarithm problem,” Advances in Cryptology-Crypto’88, Lecture Notes in Computer Science, Springer-Verlag, pp.428-432, 1990.
[12] H. W. Lee and T. Y. Kim, “Message Recovery Fair Blind Signature,” Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC’99, pp.97-111, 1999.
[13] H. Wang and Y.Zhang, ”Untraceable Off-line Electronic Cash Flow in E-commerce,”
IEEE,pp.191-198, 2001
[14] K. Nyberg and R. A. Rueppel ,”Message Recovery for Signture Schemes Based on Discrete Logarithm Problem,” Advance in Cryptology-Eurocrypt’94, Lecture Notes in Computer Science, Springer-Verlag, pp.182-193
[15] L. Harn and H.Y. Lin, ”Non-intractive Oblivious Transfer,” Electronics Letters,Vol.26, NO.10, pp.635-636, May 1990.
[16] L. Harn and H.Y. Lin, “An Oblivious Transfer Protocol and Its Application for The Exchange Secrets,” Advances in Cryptology-Asiacrypto’91,pp.312-320.
[17] M. Bellare and S. Micali ,”Non-Interactive Oblivious Transfer and Applications,” Advances in Cryptology-Crypto’89,Lecture Notes in Computer Science, Vol. 435, Springer-Verlag,pp.547-557,1995.
[18] M. Stadler, J. M. Piveteau and J. Camenisch, “Fair blind Signature,” Advances in Cryptology-Eurocrypt’95, Lecture Notes in Computer Science, Springer-Verlag, pp.209-219, 1995.
[19] M. Rabin,”How to exchange Secrets by Oblivious Transfer,” Technical Reports TR81,1981.
[20] P. Berger, R. Peralta and T. Tedric, “A Probaby Secure Oblivious Transfer Protocol,” Advance in Cryptology-Eurocrypt’84, Lecture Notes in Computer Science, Springer-Verlag, pp.379-386, 1984.
[21] P. Horster, M. Michels and H. Petersen, “Meta-ElGamal Signature Schemes,” ACM Conference on Computer and Communications Security, pp.96-107, 1994.
[22] P. L. Yu and C.L.Lei,” An User Efficient Fair E-cash Scheme with Anonymous Certificates,” Proceedings of IEEE Region 10 International Conference, Vol.1, pp.74-77, 2001.
[23] S. Even, O.Goldreich and A. Lempel, ”A Randomized Protocol for Signing Contracts,” Advances in Cryptology-Crypto’82, Lecture Notes in Computer Science, Springer-Verlag, pp.205-210, 1982.
[24] W. B. Lee, K. C. Liao and Y. H. Hsiao, “The Security of User Efficient E-cash Scheme with Anonymous Certifcates,” Proceedings of the Twieth National Conference on Information Security, pp.247-252, 2002.
[25] “Proposed Federal Information Processing Standard for Digital Sigature Standard(DSS),” Federal Register, Vol.56, No.169, pp.42980-42982, Aug.30, 1991.
[26] “The Digital Signature Standard Proposed by NIST,” Commun. ACM, Vol.35 , No.7, pp.36-40, 1992.
[27] 張真誠、韓亮和賴溪松著, ”近代密碼學及其應用,” 松崗電腦圖書資料股份有限公司, 1999.
[28] 鐘敏毓和洪國寶, “Lee-Kim之可公正盲簽章法的改進,” Proceedings of the Tenth National Conference on Information Security, pp.69-75, 2002.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top