跳到主要內容

臺灣博碩士論文加值系統

(44.192.92.49) 您好!臺灣時間:2023/06/08 06:49
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳龍獻
研究生(外文):Long-Sian Chen
論文名稱:匿名審稿機制
論文名稱(外文):Anonymous Papaer Review Scheme
指導教授:范俊逸范俊逸引用關係
指導教授(外文):Chun-I Fan
學位類別:碩士
校院名稱:國立中山大學
系所名稱:資訊工程學系研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:英文
論文頁數:62
中文關鍵詞:盲簽章指定驗證者簽章匿名通道密碼學匿名審稿
外文關鍵詞:Blind signaturesAnonymous paper reviewCryptographyAnonymous channelsUniversal designated-verifier signatures (UDVS)
相關次數:
  • 被引用被引用:0
  • 點閱點閱:318
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
有鑑於近來學術研究的蓬勃發展,許多研究成果刊登在期刊或是研究會議論文集上。然而這些文章經過特定專業領域人員利用審稿機制進行檢驗評定該研究成果。
而在檢驗的過程中,最重要的原則是在於整個審稿機制的過程中使得公平性獲得確保。但是在審稿的過程裡, 審稿的人員必須對於審稿的結果與相關的評論簽章以
表示對於該審視結果的負責,因此會造成審稿者的身份隱私因為簽章的行為而有所洩漏進而影響審稿者對於稿件的評定。 再者, 投稿者在進行投稿時,必
須透露自己的姓名給編輯者,也會間影響編輯者對於該篇論文最後接受與否的決定。造成前面問題最主要的原因是由於審稿者與投稿者的隱私或是匿名性沒有受到好的保護,導致審稿者與編輯者無法在不受干擾的情況下進行所有的審稿流程。
為了解決這些難題,我們將詳細分析在審稿機制中關於隱私的議題,並且提出一個方法能夠獨立於底層的密碼協定,使其達到在一個安全的審稿機制中需要的匿名性與其他相關重要的特性。
Due to the flush development of academic
research, a great deal research results have been published in
conference proceedings and journals. However, these articles need to
be inspected by some professionals in specific fields. It is the
most important that fairness must be guaranteed during the entire process of
reviewing. Nevertheless, the privacy of reviewers may be leaked out
because that the reviewers must sign their comments on the reviewed
papers. The leakage of the reviewers'' privacy may affect the
judgement of the reviewers on the papers. In addition, the authors of a paper
have to show their names to the editor of a conference proceedings or a journal when
submitting the paper, so that it may also affect the decision of the editor on this paper.
The major reason of the above problems is that the privacy or anonymity of the reviewers and
the authors is not protected well, such that the reviewers and the editor cannot perform the
reviewing processes without disturbance.
In order to cope with the problems, we deeply analyze the privacy issue in the paper review system and
then propose a generic idea, which is independent of the underlying cryptographic components, to
achieve the anonymity property and other key requirements in a secure paper
review scheme.
1 Introduction 7
1.1 Our Basic Idea . 11
1.2 Organization . . 12
2 Related Works 14
2.1 A Fair Anonymous Submission and Review System . . 14
2.2 Remarks on the Scheme . . 22
3 The Underlying Foundations of the Proposed Scheme 23
3.1 Partially Blind Signatures . 23
3.1.1 Abe’s RSA-Based Partially Blind Signature Scheme 26
3.2 Universal Designated-Verifier Signatures (UDVS) 27
3.2.1 An Efficient Extension of Standard Schnorr/RSA
Signatures into Universal Designated-Verifier Sig-
natures . . 30
3.3 Anonymous Channels . 35
4 The Proposed Anonymous Paper Review Scheme 38
4.1 The Requirements 38
4.2 Our Anonymous Paper Review Scheme 40
5 Security Analysis 50
6 Conclusions 56
1. M. Abe and E. Fujisaki, How to date blind signatures, Advances in Cryptology-ASIACRYPT''96, LNCS, 1163: 244-251, 1996.

2. M. Abe and T. Okamoto, Provably secure partially blind signatures, Advances in Cryptology CRYPTO 2000, LNCS, 1880: 271-286, 2000.

3. L. Bornmann and H. D. Daniel, Fairness and predictive validity of committee peer review,
FUTURA 19:7-19, 2004.

4. J. Camenisch and E. V. Herreweghen,
Design and implementation of the Idemix Anonymous
Credential System, Research Report RZ 3419, IBM Research Division , ACM Computer and Communication Security.

5. D. Chaum, Untraceable
electronic mail, return address, and digital pseudonyms, Communications of the ACM, 24(2) : 84-88, 1981.

6. C. I. Fan, Improved low-computation partially blind signatures," Applied Mathematics and Computation, 145: 853-867, 2003.

7. C. I. Fan and C. L. Lei,
Low-computation partially blind signatures for electronic cash, IEICE Transactions on Fundamentals of Electronics}, Communications and Computer Sciences}, E81A: 818-824, 1998.

8. C. I. Fan and C. L. Lei, A user efficient fair blind signature scheme for untraceable electronic
cash, Journal of Information Science and Engineering,
18: 47-58, 2002.

9. E. V. Herreweghen, Unidentifiability and accountability in electronic transactions, PhD Thesis, KULeuven, 2004.

10. M. Jakobsson, K. Sako and R. Impagliazzo,
Designated verifier proofs and their applications, Advances in cryptology-EUROCRYPT''96, LNCS, 1070:143-154, 1996.

11.G. R. Michael, F. S. Paul, and M. G. David,
Anonymous connections and onion routing,
IEEE Journal on Selected Areas in Communication, 16(4):482-493, 1998.

12. V. Naessens, L. Demuynck, and B. D. Decker,
A fair anonymous submission and review system, Communications and Multimedia Security, LNCS, 4237: 43-53, 2006.

13. W. Ogata, K. Kurosawa, K. Sako and K. Takatani,
Fault tolerant anonymous channel, Information and communications security, LNCS, 1334: 440-444,
1997.

14. C. Park, K. Itoh and K. Kurosawa,
Efficient anonymous channel and all/nothing election scheme, Workshop on the theory and application of cryptographic techniques on advances in cryptology,
ACM Portal, 248-259, 1994.

15. R. Steninfeld, L. Bull, H. Wang, and J. Piperzyk,
Universal designated-verifier signatures,
Advances in Cryptology ASIACRYPT 2003, LNCS, 2894: 523-542, 2003.

16. R. Steninfeld, H. Wang, and J. Piperzyk,
Efficient extension of standard {Schnorr} {RSA}
signatures into universal designated-verifier signatures, Public Key Cryptography-PKC 2004, LNCS, 2947: 86-100, 2004.

17. R. Zhang, J. Furukawa and H. Imai,
Short signature and universal designated verifier signature without random oracle,
Applied cryptography and network security, LNCS, 3531: 483-498, 2005.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊