(3.236.214.19) 您好!臺灣時間:2021/05/10 08:18
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:黃俊銘
研究生(外文):Jun- Ming Huang
論文名稱:可匿名否決之群體授權代理簽章機制
論文名稱(外文):Group-Authorized Proxy Signature subject to Anonymous Veto
指導教授:丁培毅丁培毅引用關係
指導教授(外文):Pei-Yih Ting
學位類別:碩士
校院名稱:國立臺灣海洋大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:中文
論文頁數:56
中文關鍵詞:多方安全計算協定匿名否決代理簽章零分享
外文關鍵詞:multi-party computation protocolanonymous vetoproxy signaturezero-sharing
相關次數:
  • 被引用被引用:1
  • 點閱點閱:121
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:17
  • 收藏至我的研究室書目清單書目收藏:0
在電子商務中常需要多人共同授權單一代表,例如董事會授權執行總裁簽署併購案。本論文中針對此問題提出了一個可匿名否決的群體授權代理簽章機制,整合提供匿名否決權的投票功能、分散式產生代理金鑰的功能、遠端傳遞代理金鑰的功能、不可偽造且可多次委託的代理簽章功能。本論文首先設計一個可證明安全的GQ代理簽章機制,再擴充 “零分享” 協定於 中,最後整合兩者有效地實現可群體授權的GQ代理簽章。此機制充分保護委託者和代理者,模組化的整合設計也比一般化的多方安全計算協定有較佳的執行效能和安全保障。
It is common that a group of people jointly decide and authorize somebody as a representative in some business/poitical occasions. For example, the board of directors of a company authorizes the chief executive officer to close a multi-billion acquisition deal. In this paper, we formalize the requirements and provide for the first time a protocol that integrates the functions of collective decisions subject to anonymous veto, distributed proxy key generation, secure transmission of proxy key, unforgeable proxy signature scheme where the original signer can delegate many times, and group-oriented delegation. In this thesis, first, a provably secure Guillou-Quisquater proxy signature scheme is presented, then the “zero-sharing” protocol is extended over a composite modulus multiplicative group, and finally the above two are seamlessly combined to realize the group-authorized GQ proxy signature. This joint mechanism not only consolidates many common requirements into one single convenient protocol, but also protects suitably the original authorizers and the proxy signer. The modular design provides simplified implementation with less communication overheads and better computation performance than a general secure multi-party computation protocol.
目錄

中文摘要………………………………………………………………..Ⅰ

英文摘要………………………………………………………………..Ⅱ

目錄..........................................................................................................Ⅲ

第一章 緒論...............................................................................................1
1.1 研就動機....................................................................................... .......5
1.2 研究成果........................................................................................ ......5
1.3 章節介紹......................................................................................... .....6

第二章 Guillou-Quisquater 數位簽章與代理簽章...............................7
2.1 簡介.......................................................................................................7
2.2 Guillou-Quisquater 數位簽章..............................................................7
2.3 Guillou-Quisquater 代理簽章..............................................................8

第三章 非交談式可驗證的 “零分享” 協定.........................................11
3.1 裡的 “零分享” 協定....................................................................11
3.2 裡的 “零分享” 協定..................................................................14

第四章 可匿名否決的群體授權GQ代理簽章....................................17
4.1 代理簽章流程.....................................................................................17
4.1.1 環境設定..............................................................................17
4.1.2 金鑰產生..............................................................................17
4.1.3 可匿名否決的群體委託授權..............................................18
4.1.4 代理密鑰驗證......................................................................19
4.1.5 代理簽章簽署......................................................................19
4.1.6 代理簽章驗證......................................................................19
4.2 討論.............................................................................................................20
4.2.1 一位授權者授權於一位代理者..........................................21
4.2.2 授權於多位代理者..............................................................22
4.2.3 部份授權者否決授權..........................................................23
4.2.4 部分授權的代理簽章..........................................................24
4.2.5 分析其他數位簽章機制......................................................27

第五章 安全性分析及證明.....................................................................30
5.1 GQ數位簽章及代理簽章機制...........................................................30
5.2 “零分享” 協定....................................................................................35
5.3 “可匿名否決的群體授權GQ代理簽章” .........................................43
5.4 安全性分析.........................................................................................46

第六章 結論與未來工作.........................................................................51
6.1 結論.....................................................................................................51
6.2 未來工作.............................................................................................52

參考文獻..................................................................................................54
[1] D. Boneh, “The decision Diffie-Hellman problem”, Proceedings of the Third International Symposium on Algorithmic Number Theory, pp. 425-439, 1998.
[2] D. Boneh and M. Franklin, “Efficient generation of shared RSA keys”, Advances of Cryptology – Crypto’97, pp.425-439, 1997.
[3] D. Chaum and T. P. Pedersen, “Wallet databases with observer”, Advances of Cryptology – Crypto’92, pp.89-10, 1992.
[4] A. Fiat and A. Shamir, “How to prove yourself: practical solution to identification and signature problems”, Advances in Cryptology – Crypto’86, pp.186-194, 1986.
[5] S. Goldwasser, S. Micali, and R. Rivest, “A digital signature scheme secure against adaptive chosen-message attacks”, SIAM Journal of Computing, pp. 281-308, 1988.
[6] L. C. Guillou and J.-J Quisquater, “A paradoxical identity-based signature scheme resulting from zero-knowledge”, Advances in Cryptology – Crypto’88, pp.216-23, 1988.
[7] S. J. Hwang and C-C Chen, “A new multi-proxy multi-signature scheme”, 2001 National Computer Symposium: Information Security, pp. 19-26, 2001.
[8] S.J. Hwang and Y. H. Lee, “Anonymous proxy signature schemes”, Communications of the CCISA, Vol.10, No. 3, pp. 90-101, 2004.
[9] S.J. Hwang and C.H. Shi, “The specifiable proxy signature”, National Computer Symposium, Taiwan, pp. 190-197, 1999.
[10] S.J. Hwang and C.H. Shi, “A proxy signature scheme without using one-way hash functions”, International Computer Symposium , Chiayi, Taiwan, pp. 60-64, 2000.
[11] S.J. Huang and C.H. Shi, “A simple multi-proxy signature scheme”, Proceedings of the 10th National Conference on Information Security, Taiwan, pp. 134-138, 2000.
[12] A. Kiayias and M. Yung, “Self-tallying elections and perfect ballot secrecy”, Public-Key Cryptography, pp. 141-158. 2002.
[13] A. Kiayias and M. Yung, “Non- interactive zero-sharing with applications to private distributed decision making”, Financial Cryptography 2003, pp. 303-32, 2003.
[14] S. Kim, S. Park, and D. Won, “Proxy signature, revisited”, Information and Communication Security, LNCS 1334, pp. 223-232, 1997.
[15] Y. H. Lee, “Anonymous proxy group-oriented signature scheme with undeniable agents”, Master Thesis of Department of Computer Science and Information Engineering, TamKang University, Taiwan, 2003.
[16] M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures for delegating signing operation”, Proc. 3rd ACM conference on Computer and Communications Security, CCS’96, pp. 48-57, 1996.
[17] D. Pointcheval and J. Stern, “Security proofs for signature schemes”, Advances in Cryptology – Eurocrypt’96, pp.387-398, 1992.
[18] D. Pointcheval and J. Stern, “Security arguments for digital signatures and blind signatures”, Journal of Cryptology, Vol. 13, No. 3, pp. 361-396, 2000.
[19] C. P. Schnorr, “Efficient signature generation by smart cards”, Journal of Cryptology, Vol. 4, No. 3, pp. 161-174, 1991.
[20] V. Shoup, “Practical threshold signatures”, Advances in Cryptology – Eurocrypt’00, pp. 207-220. 2000.
[21] K. Shum and K. V. Wei, “A strong proxy signature scheme with proxy signer privacy protection”, Proceedings of the IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE ’02), pp. 55-56, 2002.
[22] H.M. Sun, “ On proxy (multi-) signature schemes”, In Proceedings of the 2000 International Computer Symposium, workshop on Cryptology and Information Security, pp. 65-72, 2000.
[23] H.M. Sun and B.T. Hsieh, “Time-stamp proxy signatures with traceable receivers”, National Conference on Information Security, Taiwan, pp. 247-253, 1999.
[24] H.M. Sun and B.T. Hsieh, “Remark on two nonrepudiable proxy signature schemes”, Proceedings of the Ninth National Conference of Information Security, Taiwan, pp. 241-246, 1999.
[25] L. Yi, G. Bai and G. Xiao, “Proxy multi-signature scheme: A new type of proxy signature scheme”, Electronics Letters, Vol. 36, No. 6, pp. 527-528, 2000.
[26] K. Zhang, “Threshold proxy signature schemes”, 1997 Information Security Workshop, pp. 191-197, 1997.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔