(100.26.179.251) 您好!臺灣時間:2021/04/14 07:16
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:孫荻雯
研究生(外文):Ti-Wen Sun
論文名稱:可抵擋入侵的代理簽章系統
論文名稱(外文):Intrusion-Resilient Proxy Signature Schemes
指導教授:曾文貴曾文貴引用關係
指導教授(外文):Wen-Guey Tzeng
學位類別:碩士
校院名稱:國立交通大學
系所名稱:資訊科學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2003
畢業學年度:91
語文別:英文
論文頁數:43
中文關鍵詞:代理簽章系統具時限的可抵擋入侵
外文關鍵詞:Proxy SignatureTime BoundedIntrusion-Resilient
相關次數:
  • 被引用被引用:1
  • 點閱點閱:179
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:14
  • 收藏至我的研究室書目清單書目收藏:0
我們提出一個可抵擋入侵的代理簽章系統。首先,我們設定一角色稱為Home Base,它的用途是與代理簽章者共享代理參數,演進及更新代理簽章者的金鑰。再者,原始簽章者產生一組代理參數,並把代理參數分成兩部分,一份傳給代理簽章者,另一份傳給Home Base。當代理簽章者和Home Base接收到各自的代理參數時,會驗證其有效性。若驗證的結果正確,就接受,否則就拒絕。若代理簽章者要代替原始簽章者簽署一份文件時,他必須先透過Home Base的幫忙去計算出正確的代理秘密金鑰,才可以作簽章的動作。之後,任意第三者都可以驗證其簽章的有效性。此外,我們提出兩個定理證明系統的安全性根基於Strong-RSA problem。第一個定理是證明攻擊者攻破任意個Home Base或代理簽章者,只要不是同時攻破這兩個角色,我們的系統都是安全的。第二個定理是證明攻擊者若同時攻破Home Base和代理簽章者,我們的系統仍可達到前向式安全的特性。

We proposed intrusion-resilient proxy signature schemes, which combine time bounded proxy signature schemes and signer-base intrusion-resilient signatures. First, we set up a home base that shares proxy parameters with the proxy signer, updates and refreshes the proxy signer’s key. Second, the original signer generates proxy parameters and then divides them into two parts. The first part of them is sent to the proxy signer and the second part is sent to the home base. The proxy signer and the home base check the validity of those parameters. If it is correct, they accept it; otherwise, they reject it. Before signing a message m, the proxy signer computes the proxy secret key with the home base’s help. After computing the proxy secret key, the signing and the verification stage are the same as those of time-bounded proxy signature schemes. We give two theorems to prove the security of our scheme by assuming hardness of the Strong-RSA problem.

摘要 i
Abstract ii
誌謝 iii
Contents iv
Chapter 1 Introduction 1
Chapter2 Background 4
2.1 Proxy Signature 4
2.2 Time Bounded Proxy Signature Schemes 7
2.3 Evolution of key-updating 10
2.4 Mathematical Tools 13
2.4.1 Strong-RSA Problem 13
2.4.2 Forking Lemma 14
2.4.3 Mesh Structure 15
Chapter 3 Intrusion-Resilient Proxy Signature Schemes 18
3.1 Our Basic Scheme 19
3.2 Security Analysis 25
3.2.1 Other Security Requirements 31
Chapter 4 Conclusions 33
Bibliography 34
Appendix 1 36
Appendix 2 40

[1] M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures for delegating signing operation,” In Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48-57, 1996.
[2] M. Mambo, K. Usuda, and E. Okamoto, “Proxy Signatures: Delegation of the Power to Sign Messages,” In Proceedings of IEICE Transaction on Fundamentals, vol. E79-A, no. 9, pp. 1338-1354, 1996.
[3] H. Petersen and P. Horster, “Self-Certified keys — concepts and applications,” In Proceedings of the 3rd International conference on Communications and Multimedia Security, pp. 102-116, Chapman & Hall, 1997.
[4] S. Kim, S. Park and D. Won, “Proxy signatures, revisited,” In Proceedings of International Conference on Information and Communication Security, Lecture Notes in Computer Science, vol. 1334, pp. 223-232, Springer-Verlag, 1997.
[5] B. Lee, H. Kim and K. Kim, “Strong Proxy Signature and its Applications,” In Proceedings of Symposium on Cryptography and Information Security, vol. 2/2, pp. 603-608, 2001.
[6] B. Lee, H. Kim and K. Kim, “Secure Mobile Agent Using Strong Non-designated Proxy Signature,” Australasian Conference on Information Security and Privacy 2001, Lecture Notes in Computer Science2119:474, 2001.
[7] G. Itkis and L. Reyzin, “Forward-Secure Signatures with Optimal Signing and Verifying,” In Proceedings of Advances in cryptology--CRYPTO 2001, Lecture Notes in Computer Science, vol. 2139, pp. 332-354, Springer-Verlag, 2001.
[8] K.-S. Huang and W.-G. Tzeng, “Time Bounded Proxy Signature Scheme,” National Chiao Tung University, Master Thesis, 2002.
[9] G. Itkis and L. Reyzin, “SiBIR: Signer-Base Intrusion-resilient signatures,” Advances in Cryptology — CRYPTO 2002, Lecture Notes in Computer Science 2442:499-514, 2002.
[10] W.-G. Tzeng and Z.-J. Tzeng, “Robust key-evolving public key encryption schemes,” Information and Communications Security, 4th International Conference, ICICS 2002, Lecture Notes in Computer Science 2513:61-72,2002.
[11] Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, and Moti Yung, “Key-insulated public key cryptosystems,” Advances in Cryptology — EUROCRYPT 2002, Lecture Notes in Computer Science 2332:65-82,2002.
[12] Mihir Bellare and Sara Miner, ”A forward-secure digital signature scheme,” In Michael Wiener, editor , Advances in Cryptology — CRYPTO 1999, volume 1666 of Lecture Notes in Computer Science, pages 431-448. Springer-Verlag, 15-19 August 1999. Revised version is available from http://www.cs.ucsd.edu/~mihir/.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔