跳到主要內容

臺灣博碩士論文加值系統

(3.236.68.118) 您好!臺灣時間:2021/08/04 20:58
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:黃皇達
研究生(外文):Huang-ta Huang
論文名稱:可證明安全且確實隱蔽來源的指定驗證者簽章協議基於隨機神諭模型
論文名稱(外文):A provably secure really source hiding designated verifier signature scheme based on random oracle model
指導教授:周志賢
指導教授(外文):Jue-sam Chou
學位類別:碩士
校院名稱:南華大學
系所名稱:資訊管理學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2009
畢業學年度:97
語文別:英文
論文頁數:30
中文關鍵詞:指定驗證者簽章安全的雜湊函數雙線性隨機神諭迪非赫爾曼問題
外文關鍵詞:Diffie-Hellman Problemrandom oraclebilinear pairingssecure hash functionsDVS
相關次數:
  • 被引用被引用:0
  • 點閱點閱:184
  • 評分評分:
  • 下載下載:28
  • 收藏至我的研究室書目清單書目收藏:0
  有許多被提出來的指定驗證者簽章協議,他們只提供只有被指定的驗證者能檢查簽章的正確性的基本安全要求,而且他們的協議無法確實隱藏簽章者的身分。因此,在這篇文章中,我們致力設計一個可證明安全性的指定驗證者簽章協定,不僅能達到在指定驗證者簽章協定內需要的安全性,而且能保護簽章者的身分並且使我們的協定適用於電子投票系統。
  A lot of designated verifier signature (DVS) schemes have been proposed. However, all of them only provide the basic security requirement that only the designated verifier can check the validity of the signature. They are either not secure enough or lacking source hiding. Hence, in this article, we design a provably secure DVS scheme. It not only can attain the basic security requirement but also hide the original signer''s identity which makes our scheme more suitable for the applications in an electronic voting system.
書名頁.......................................i
論文口試合格證明書...........................ii
著作財產權同意書.............................iii
論文指導教授推薦書...........................iv
誌謝.........................................v
中文摘要.....................................vi
英文摘要.....................................vii
目錄.........................................viii
表目錄.......................................x
圖目錄.......................................xi
    
Chapter 1 Introduction....................................1
 
Chapter 2 Preliminaries...................................5
 
Chapter 3 Review and attack on Kang et al.''s two protocols..............7
3.1 Review and attack on Kang et al.''s first protocol....7
3.2 Review and attack on second protocol..................9
 
Chapter 4 The proposed scheme............................12
 
Chapter 5 Security analysis..............................15
5.1 Correctness..........................................15
5.2 Anti-forgeability....................................15
5.3 Source hiding........................................20
5.4 Non-interactive......................................21
5.5 Deniable.............................................21
5.6 Resistance against Conditional Key Compromise Impersonation (KCI) attack...................21
 
Chapter 6 Comparisons and Discussions....................24
6.1 Efficiency comparison................................24
6.2 Security Comparisons.................................24
6.3 Why our scheme really possesses the source hiding property?................................................25
 
Chapter 7 Conclusion.....................................27
  References...............................................28

表目錄
Table 1 Efficiency features comparisons..................24
Table 2 Security features comparisons....................26

圖目錄
Figure 1 Kang et al.''s first protocol....................8
Figure 2 Attack on Kang et al.''s first protocol..........8
Figure 3 Kang et al.''s second protocol..................10
Figure 4 Attack on Kang et al.''s second protocol........11
Figure 5 Our proposed scheme.........................14
Figure 6 The input and output in algorithm B.............16
Figure 7 Overall structure of algorithm F of B............19
Figure 8 Signature forgery model.........................23
[1] M. Jakobsson, K. Sako, R. Impagliazzo,―Designated verifier proofs and their applications, ‖Advances in Cryptology — EUROCRYPT ''96, Lecture Notes in Computer Science, vol. 1070, Springer, Berlin, (1996), pp. 143–154.
 
[2] G. Wang ―An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures, ‖Cryptology ePrint Archive: Report 2003/243
 
[3] F. Laguillaumie and D. Vergnaud ―Multi-Designated Verifiers Signatures, ‖Lecture Notes in Computer Science, (2004) – Springer
 
[4] F. Laguillaumie and D. Vergnaud ―Designated Verifier Signatures: Anonymity and Efficient Construction from any Bilinear Map, ‖Proc. of SCN, (2004) – Springer
 
[5] S. Lal and V. Verma ―Identity Based Strong Designated Verifier Proxy Signature Schemes, ‖Cryptology ePrint Archive: Report 2006/394
 
[6] F. Laguillaumie, D. Vergnaud ―Multi-designated verifiers signatures: anonymity without encryption, ‖Information Processing Letters 102 (2007) 127–132
 
[7] S Lal and V Verma ―Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes, ‖Cryptology ePrint Archive: Report 2008/024
 
[8] H. Du and Q. Wen ―Attack on Kang et al.’s Identity-Based Strong Designated Verifier Signature Scheme, ‖Cryptology ePrint Archive: Report 2008/297
 
[9] J. Zhang and J. Mao ―A novel ID-based designated verifier signature scheme, ‖Information Sciences, Volume 178, Issue 3, 1 February (2008), Pages 766-773
 
[10] S.H. Seo, J.Y. Hwang, K.Y. Choi and D.H. Lee ―Identity-based universal 29 designated multi-verifiers signature schemes, ‖Computer Standards & Interfaces, Volume 30, Issue 5, July (2008), Pages 288-295
 
[11]K.A. Shim ―Rogue-key attacks on the multi-designated verifiers signature scheme, ‖Information Processing Letters 107 (2008) 83–86
 
[12]B. Wang, Z.X. Song ―A non-interactive deniable authentication scheme based on designated verifier proofs, ‖Information Sciences, Volume 179, Issue 6, 1 March (2009), Pages 858-865
 
[13]J.S. Lee, J.H. Chang ―Comment on Saeednia et al.''s strong designated verifier signature scheme, ‖Computer Standards & Interfaces, January (2009), Pages 258-260
 
[14] B. Kang, C. Boyd and E. Dawson ―Identity-based strong designated verifier signature schemes: Attacks and new construction, ‖Computers & Electrical Engineering, Volume 35, Issue 1, January (2009), Pages 49-53
 
[15] B. Kang, C. Boyd and Ed Dawson ―A novel identity-based strong designated verifier signature scheme, ‖Journal of Systems and Software, Volume 82, Issue 2, February (2009), Pages 270-273
 
[16] Y. Yu, C. Xu, X. Zhang and Y. Liao ―Designated verifier proxy signature scheme without random oracles, ‖Computers & Mathematics with Applications, Volume 57, Issue 8, April (2009), Pages 1352-1364
 
[17] F. Cao and Z. Cao ―An identity based universal designated verifier signature scheme secure in the standard model, ‖Journal of Systems and Software, Volume 82, Issue 4, April (2009), Pages 643-649
 
[18] S. B. Wilson, and A. Menezes, ―Authenticated Diffie-Hellman key agreement protocols, ‖Lecture Notes in Computer Science, 1999 - Springer
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top