跳到主要內容

臺灣博碩士論文加值系統

(75.101.211.110) 您好!臺灣時間:2022/01/26 13:00
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:黃正心
研究生(外文):Cheng-Hsin Huang
論文名稱:擁有撤銷機制的前進式群體簽章系統
論文名稱(外文):A Forward Group Signature Scheme with Revocation Mechanism
指導教授:曾文貴曾文貴引用關係
指導教授(外文):Wen-Guey Tzeng
學位類別:碩士
校院名稱:國立交通大學
系所名稱:資訊科學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:中文
論文頁數:59
中文關鍵詞:群體簽章系統前進式簽章系統廢止標記廢止機制
外文關鍵詞:Group signature schemeForward signature schemeRevocation tokenRevocation mechanism
相關次數:
  • 被引用被引用:2
  • 點閱點閱:132
  • 評分評分:
  • 下載下載:16
  • 收藏至我的研究室書目清單書目收藏:0
群體簽章系統允許群體中任何的成員,以匿名性和無連結性的方式,以此群體的身份去作簽名。在有爭議時,只有群體管理者有能力去公開簽名者的身份。當一個群體的成員因為某些原因如調職或被公司開除而離開的時候,群體管理者必須要執行某種機制來廢止這個成員代替群體簽名的能力。
在這篇論文中,我們考慮在一個群體中廢止成員代替群體簽名能力的問題,提出一個簡單的廢止(撤銷)機制。而我們的群體簽章系統擁有較短的群體簽章大小及較快速的簽名程序。在強RSA假設和DDH假設之下,我們也證明提出的群體簽章系統及廢止機制是安全的。

A group signature scheme allows any group member to sign on
behalf of the group in an anonymous and unlinkable way. In case of dispute, only the group manager has ability to open the identity of a group member. When a member of the group leaves for some reasons such as promotion in position or being fired by his company, the group manager should take some action to revoke this member.
In this thesis, we consider the problem of revocation in a group signature scheme and propose a simple revocation mechanism. Our group signature scheme has shorter signature size and a faster signing procedure. We also prove that our group signature scheme and revocation mechanism are secure under the strong RSA assumption and the DDH assumption.

中文摘要 ................................................ i
英文摘要 ................................................ ii
誌謝 .................................................... iii
目錄 .................................................... iv
第一章 引言 ............................................. 1
第一節 研究動機 ..................................... 1
第二節 研究重點與成果 ............................... 3
第三節 各章節簡介 ................................... 3
第二章 群體簽章系統的相關研究及系統模型 ................. 5
第一節 群體簽章相關研究及應用 ....................... 5
第二節 前進式群體簽章系統模型及特性 ................. 9
第三章 基礎知識和原理 ................................... 13
第一節 以數論為基礎的假設 ........................... 13
第二節 零知識互動式證明系統及知識簽章 ............... 16
第四章 擁有廢止(撤銷)機制的前進式群體簽章協定 ......... 21
第一節 參數定義 ..................................... 21
第二節 前進式群體簽章協定 ........................... 22
第五章 安全性證明及分析 ................................. 32
第一節 安全性證明 ................................... 32
第二節 系統分析與比較 ............................... 48
第六章 結論與未來研究方向 ............................... 52
參考文獻 ................................................ 54
附錄 .................................................... 58

[1] G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, \A practical and provably secure coalition-resistant group signature scheme," In Proceedings of Advances in Cryptology - Crypto 2000, vol. 1880 of LNCS, pp. 255-270, Springer-Verlag,
2000.
[2] G. Ateniese and G. Tsudik, \Some open issues and new directions in group signature," In Proceedings of Financial Cryptography 1999, vol. 1648 of LNCS, pp. 196-211, Springer-Verlag, 1999.
[3] G. Ateniese and G. Tsudik, \Quasi-effcient revocation of group signatures," To Appear in Financial Cryptography 2002, 2002.
[4] N. Baric and B. Pfitzman, \Collision-free accumulators and fail-stop signature schemes without trees," In Proceedings of Advances in Cryptology - Eurocrypt 1997, vol. 1233 of LNCS, pp. 480-494, Springer-Verlag, 1997.
[5] M. Bellare and P. Rogaway, \Random oracles are Practical:A paradigm for designing effcient protocols," In Proceedings of the First ACM Conference on Computer and Communcations Security, 1993.
[6] D. Boneh, \The decision Diffie-Hellman problem," In Proceedings of the Third Algorithmic Number Theory Symposium, vol. 1423 of LNCS, pp. 48-63, Springer-Verlag, 1998.
[7] E. Bresson and J. Stern, \Ecent revocation in group signatures," In Proceedings of Public Key Cryptography 2001, vol. 1992 of LNCS, pp. 190-206, Springer-Verlag, 2001.
[8] J. Camenisch, \Ecient and generalized group gignatures," In Proceedings of Advances in Cryptology - Eurocrypt 1997, vol. 1233 of LNCS, pp. 465-479, Springer-Verlag, 1997.
[9] J. Camenisch and M. Michels, \A group signature scheme based on an RSAvariant," Technical Report RS-98-27, BRICS, Departement of Computer Science, University of Aarhus, 1998.
[10] J. Camenisch and M. Stadler, \Ecient group signature schemes for large groups," In Proceedings of Advances in Cryptology - Crypto 1997, vol. 1296 of LNCS, pp. 410-424, Springer-Verlag, 1997.
[11] D. Chaum and E. van Heyst, \Group signatures," In Proceedings of Advances in Cryptology - Eurocrypt 1991, vol. 547 of LNCS, pp. 257-265, Springer-Verlag, 1991.
[12] L. Chen and T. Pedersen, \New group signature schemes," In Proceedings of Advances in Cryptology - Eurocrypt 1994, vol. 950 of LNCS, pp. 171-181, Springer-Verlag, 1995.
[13] R. Carmer, I. Damgard and J. B. Nielsen \Multiparty computation from threshold homomorphic encryption," In Proceedings of Advances in Cryptology - Eurocrypt 2001, vol. 2045 of LNCS, pp. 280-300, Springer-Verlag, 2001.
[14] W. Die and M. E. Hellman, \New directions in cryptography," IEEE Transactions on Information Theory, vol. IT-22, no 6, pp. 644-654, 1976.
[15] U. Feige, A. Fiat and A. Shamir, \Zero knowledge proofs of identity," In Journal of Cryptology, vol. 1, no. 2, pp. 77-94, 1988.
[16] E. Fujisaki and T. Okamoto, \Statistical zero-knowledge protocols to prove modular polynomial relations," In Proceedings of Advances Cryptology - Crypto 1997, vol. 1294 of LNCS, pp. 16-30, Springer-Verlag, 1997.
[17] L. C. Guillou and J. J. Quisquater, \A "paradoxical" identity-based signature scheme resulting from zero-knowledge," In Proceedings of Advances Cryptology - Crypto 1988, vol. 403 of LNCS, pp. 216-231, Springer-Verlag, 1988.
[18] G. Itkis and L. Reyzin. \Forward-secure signatures with optimal signing and verifying," In Proceedings of Advances in Cryptology - Crypto 2001, vol. 2139 of LNCS, pp. 332-354, Springer-Verlag, 2001.
[19] H. J. Kim, J. I. Lim and D. H. Lee, \Ecient and secure member deletion in group signature schemes," In Proceedings of the Third International Conference on Information Security and Cryptology, vol. 2015 of LNCS, pp. 150-161, Springer-Verlag, 2001.
[20] A. Lysyanskaya and Z. Ramzan, \Group blind digital signatures: A scalable solution to electronic cash," In Proceedings of Financial Cryptography 1998, vol. 1465 of LNCS, pp. 184-197, Springer-Verlag, 1998.
[21] C. Popescu \An ecient group blind signature scheme based on the strong RSA assumption," Romanian Journal of Information Science and Technology, vol. 3, no 4, pp. 365-374, 2000.
[22] R. Rivest, A. Shamir and L. Adleman \A method for obtaining digital signatures and public key cryptosystems," Communication of ACM, vol. 21, no. 2, pp. 120-126, 1978.
[23] C. P. Schnorr \Ecient signature generation by smart cards," In Journal of Cryptology, vol. 4, no 3, pp. 161-174, 1991.
[24] D. Song \Practical forward-secure group signature schemes," In Proceedings of the Eighth ACM Symposium on Computer and Communication Security, 2001.
[25] O. Goldreich \Foundations of cryptography:basic tools," Cambridge University Press, Mississauga, Canada, 2001.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top