跳到主要內容

臺灣博碩士論文加值系統

(35.153.100.128) 您好!臺灣時間:2022/01/19 02:55
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:黃工栓
研究生(外文):Huang Kung-Shuan
論文名稱:具時限的代理簽章系統
論文名稱(外文):Time Bounded Proxy Signature Scheme
指導教授:曾文貴曾文貴引用關係
學位類別:碩士
校院名稱:國立交通大學
系所名稱:資訊科學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:英文
論文頁數:54
中文關鍵詞:代理簽章代理簽章系統代理簽章者GQ 簽章系統具時限的
外文關鍵詞:proxy signatureproxy signature schemeproxy signerGQ signature schemetime bounded
相關次數:
  • 被引用被引用:0
  • 點閱點閱:140
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
原始簽章者可以利用代理簽章系統將他的簽章權限授權給一位合法的代理簽章者,在得到授權之後,代理簽章者便可以代為執行原始簽章者的簽章程序,並產生合法的代理簽章。在這篇論文中,我們首先提出一個根基於GQ簽章系統的代理簽章系統,這個系統符合了代理簽章系統所必須滿足的所有強條件要求,而且我們可以證明它的安全性。
我們提出了具有時間限制的代理簽章系統的概念,並進一步地提出一個具體的具時限的代理簽章系統,在這個系統裡所產生的代理秘密金鑰本身就具有代理簽章時間的限制。於是一位合法的代理簽章者只能在合法的時間內代為執行原始簽章者的簽章程序,在合法時間外所簽出來的代理簽章將被驗證程序檢查為不合法。

Proxy signature is a signature scheme that is designed to delegate the original signer’s signing capability to a designated proxy signer. Then the proxy signer creates a proxy signature on behalf of the original signer. In this thesis, we proposed a new proxy signature scheme that is based on the GQ signature scheme. The proposed scheme satisfies all strong condition requirements and was proved to be secure.
Furthermore, we introduced the concept of time bounded proxy signature schemes and proposed a concrete time bounded proxy signature scheme where generated proxy secret key has its inherently effective time periods. “Time Bounded” means that the proxy signer can only sign a message for periods permitted by the original signer. The proxy signatures created for other periods will be determined to be invalid. Our time bounded scheme also satisfies all strong condition requirements.

Chapter 1 Introduction............................1
Chapter 2 Background..............................6
2.1 Stages of a Proxy Signature Scheme........6
2.2 Classifications...........................7
2.3 Condition Requirements...................11
2.4 Guillou-Quisquater Signature Scheme......13
2.5 Mathematical Tools.......................15
Chapter 3 A GQ-based Proxy Signature Scheme......16
3.1 Our Basic Scheme.........................16
3.2 Security Proofs and Analysis.............19
3.3 Condition Discussions....................23
Chapter 4 Time Bounded Proxy Signature Schemes...28
4.1 Ideas of Time Restriction................29
4.2 Preliminary..............................30
4.3 Our Time Bounded Scheme..................31
4.4 Security Proof...........................36
4.5 Condition Discussions....................40
Chapter 5 Conclusions............................43
Bibliography.....................................45
Appendix.........................................47

[BR93] M. Bellare and P. Rogaway, “Random Oracles are Practical: a paradigm for designing efficient protocols,” In Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62-73, 1993.
[GMR88] S. Goldwasser, S. Micali, and R. Rivest, “A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks,” In SIAM Journal on Computing, vol. 17(2), pp.281-308, 1988.
[GQ88] L. Guillou and J. Quisquater. ”A “paradoxical” indentity-based signature scheme resulting from zero-knowledge.” In Proceedings of Advances in Cryptology—CRYPTO ’88, Lecture Notes in Computer Science, vol. 403, pp. 216-231, Springer-Verlag, 1990.
[IR01] G. Itkis and L. Reyzin, “Forward-Secure Signatures with Optimal Signing and Verifying,” In Proceedings of Advances in cryptology--CRYPTO 2001, Lecture Notes in Computer Science, vol. 2139, pp. 332-354, Springer-Verlag, 2001.
[KPW97] S. Kim, S. Park and D. Won, “Proxy signatures, revisited,” In Proceedings of International Conference on Information and Communication Security, Lecture Notes in Computer Science, vol. 1334, pp. 223-232, Springer-Verlag, 1997.
[LK99] B. Lee and K. Kim, “Strong Proxy Signatures,” In Proceedings of IEICE transaction on Fundamentals, vol. E82-A, No. 1, 1999.
[LKK01] B. Lee, H. Kim and K. Kim, “Strong Proxy Signature and its Applications,” In Proceedings of Symposium on Cryptography and Information Security, vol. 2/2, pp. 603-608, 2001.
[MUO96a] M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures for delegating signing operation,” In Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48-57, 1996.
[MUO96b] M. Mambo, K. Usuda, and E. Okamoto, “Proxy Signatures: Delegation of the Power to Sign Messages,” In Proceedings of IEICE Transaction on Fundamentals, vol. E79-A, no. 9, pp. 1338-1354, 1996.
[PH97] H. Petersen and P. Horster, “Self-Certified keys — concepts and applications,” In Proceedings of the 3rd International conference on Communications and Multimedia Security, pp. 102-116, Chapman & Hall, 1997.
[PS96] D. Pointcheval and J. Stern, “Security Proofs for Signature Schemes,” In Proceedings of Advances in Cryptology—EUROCRYPT ’96, Lecture Notes in Computer Science, vol. 1070, pp. 387-398, Springer-Verlag, 1996.
[Sha83] A. Shamir, “On the generation of cryptographically strong pseudorandom sequences,” In Proceedings of ACM Transactions on Computer Systems, vol. 1(1), pp. 38-44, 1983.
[UMUO96] K. Usuda, M. Mambo, T. Uyematsu, and E. Okamoto, “Proposal of an automatic signature scheme using a compiler,” In Proceedings of IEICE Transaction on Fundamentals, vol. E79-A, no.1, pp. 94-101, 1996
[Zha97] K. Zhang, “Threshold proxy signature schemes,” In Proceedings of 1st International Information Security Workshop, Lecture Notes in Computer Science, vol. 1396, Springer-Verlag, 1997.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top