跳到主要內容

臺灣博碩士論文加值系統

(44.222.64.76) 您好!臺灣時間:2024/06/14 09:04
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:林皇志
研究生(外文):Lin, Huang-Jhih
論文名稱:可註銷之免憑證暗門可淨化數位簽章方法
論文名稱(外文):Revocable Certificateless Trapdoor Sanitizable Signature Scheme
指導教授:林韓禹
指導教授(外文):Lin, Han-Yu
口試委員:吳宗杉林韓禹丁培毅
口試委員(外文):Wu, Tzong-SunLin, Han-YuTing, Pei-Yih
口試日期:2023-01-09
學位類別:碩士
校院名稱:國立臺灣海洋大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2023
畢業學年度:111
語文別:中文
論文頁數:45
中文關鍵詞:免憑證公鑰系統可淨化數位簽章可撤銷暗門問責性
外文關鍵詞:Certificateless Public Key CryptosystemSanitizable SignatureRevocableTrapdoorAccountability
相關次數:
  • 被引用被引用:0
  • 點閱點閱:70
  • 評分評分:
  • 下載下載:8
  • 收藏至我的研究室書目清單書目收藏:0
可淨化數位簽章允許一位預先決定的淨化者將簽署訊息中帶有的敏感資訊進行修改,並且在修改後不會影響到原簽章的有效性,這對於保障電子病歷中的隱私資訊有極大的實務效益。問責性 (Accountability) 是可淨化數位簽章中一項重要安全特性,表示在爭議發生時,簽署者可以提出證據證明訊息並非自己所為。2010 年,暗門可淨化數位簽章被提出,在其方法中,淨化者需要從簽署者獲得暗門才能執行淨化,換句話說,簽署者可以藉由暗門使任何實體擁有淨化的權力,然而亦將犧牲問責性特性。2013 年,具問責性的暗門可淨化簽章被提出,此方法利用 Chameleon Hash 來達成問責性的安全需求。本篇論文中,藉由免憑證公鑰系統來解決金鑰託管問題,也提出了撤銷機制來限制簽署者的能力,並且結合了具問責性暗門可淨化數位簽章的優點,提出了基於免憑證公鑰系統之可註銷暗門可淨化數位簽章方法。在安全性分析部分,本篇論文正規的證明了所提的方法在基於計算上的 Diffie-Hellman 難題假設能夠抵抗攻擊者的適應性選擇訊息攻擊,具有存在性不可偽造的安全性。
Sanitizable Signature Scheme (SSS) allows a predetermined sanitizer to modify a signed document containing sensitive information, while the modification will not affect the validity of the original signature. It is an essential mechanism for protecting the private information in electronic medical records. Accountability is an important security requirement for the sanitizable signature such that a signer can provide the evidence to prove that the message has been modified by the sanitizer in case of a dispute. In 2010, Trapdoor Sanitizable Signature (TSS) scheme was first proposed. In such a scheme, the sanitizer needs to obtain the trapdoor from the signer in order to perform the sanitization process. In other words, the signer can authenticate any parties with the power of sanitization through the trapdoor but at the expense of losing accountability property. In 2013, to achieve the accountability property, an Accountable Trapdoor Sanitizable Signature (ATSS) was introduced with a new construction from Chameleon Hash. In this thesis, we utilize certificateless public key cryptosystem (CL-PKC) to solve the key escrow problem and take the signer revocation mechanism into account to limit the signing capability of signers as well. Combining the advantages of ATSS, we propose a Revocable Certificateless Trapdoor Sanitizable Signature Scheme. In the security analyses, we formally proved that the proposed scheme could resist adaptive chosen-message attacks based on the computational Diffie-Hellman assumption and achieve the existential unforgeability.
摘要 I
Abstract II
誌謝 III
目次 IV
圖目次 V
表目次 VI
第一章 緒論 1
第一節 研究背景 1
第二節 研究動機 2
第三節 研究貢獻 4
第四節 論文架構 4
第二章 背景知識 5
第一節 安全性概念和計算上的難題 5
第二節 相關研究 6
第三章 本篇論文之方法 19
第一節 系統模型及參與者 19
第二節 演算法定義 20
第三節 方法建構 22
第四節 問責性延伸 28
第四章 安全性證明與比較 31
第一節 安全性模型 31
第二節 效率比較 39
第五章 結論與未來研究 41
參考文獻 42
林韓禹、丁培毅、吳宗杉、王冠翔和陳伊萍,「植基於免憑證公鑰系統之可淨化數位簽章方法」,全國計算機會議,台灣,第 307-312 頁,民國 106 年 12 月。
United States of America Department of Health and Human Services, “Standards for privacy of individually identifiable health information: Final rule, Federal Register,” Vol. 67, No. 157, Aug. 2002.
S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” Proceeding of International conference on the theory and application of cryptology and information security, Springer, Berlin, Heidelberg, pp. 452-473, Nov. 2003.
G. Ateniese, D. H. Chou, B. D. Medeiros and G. Tsudik, “Sanitizable signatures,” Proceeding of European Symposium on Research in Computer Security, Springer, Berlin, pp. 159-177, Sep. 2005.
G. Ateniese and B. de Medeiros, “Identity-based chameleon hash and applications,” Proceeding of International Conference on Financial Cryptography, Springer, Berlin, Heidelberg, pp. 164-180, Feb. 2004.
P. S. L. M. Barreto and M. Naehrig, “Pairing-friendly elliptic curves of prime order,” Proceeding of the 12th International Workshop on Selected Areas in Cryptography, Kingston, Canada, pp. 319-331, Aug. 2005.
D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” Proceeding of Annual international cryptology conference, Springer, Berlin, Heidelberg, pp. 213-229, Aug. 2001.
A. Bossuat and X. Bultel, “Unlinkable and invisible γ-sanitizable signatures,” Proceeding of International Conference on Applied Cryptography and Network Security, Springer, Cham, pp. 251-283, Jun. 2021.
L. Deng, B. Ning and Y. Jiang, “A lightweight certificateless aggregation signature scheme with provably security in the standard model,” IEEE Systems Journal, Vol. 14, No. 3, pp. 4242-4251, Sep. 2020.
R.H. Deng and Y. Yang, “A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications,” ACM Transactions on Multimedia Computing, Communications, and Applications, Vol. 5, No. 4, pp. 1-20, Oct. 2009.
W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 644-654, Nov. 1976.
T. Izu, N. Kunihiro, K. Ohta, M. Sano and M. Takenaka, “Sanitizable and deletable signature,” Proceeding of International Workshop on Information Security Applications, pp. 130-144, Sep. 2008.
T. Izu, N. Kunihiro, K. Ohta, M. Takenaka and T. Yoshioka, “A sanitizable signature scheme with aggregation,” Proceeding of International Conference on Information Security Practice and Experience, Vol. 4464, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 51-64, May 2007.
T. Izu, N. Kanaya, M. Takenaka and T. Yoshioka, “PIATS: A partially sanitizable signature scheme,” Proceeding of International Conference on Information and Communications Security, Springer, Berlin, Heidelberg, pp. 72-83, Dec. 2005.
M. Klonowski and A. Lauks, “Extended sanitizable signatures,” Proceeding of International Conference on Information Security and Cryptology, Springer, Berlin, Heidelberg, pp. 343-355, Nov. 2006.
N. Koblitz, A. Menezes and S. Vanstone, “The state of elliptic curve cryp-tography,” Designs, Codes and Cryptography, Vol. 19, No. 2/3, pp. 173-193, Mar. 2000.
H. Krawczyk and T. Rabin, “Chameleon signatures,” Proceeding of the Network and Distributed Systems Security Symposium (NDSS 2000), San Diego, California, pp. 143-154, Feb. 2000.
J. Lai, X. Ding and Y. Wu, “Accountable trapdoor sanitizable signatures,” Proceeding of International Conference on Information Security Practice and Experience, Springer, Berlin, Heidelberg, pp. 117-131, May 2013.
A. J. Menezes, P. C. van Oorschot and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.
V. S. Miller, “The Weil pairing, and its efficient calculation,” Journal of Cryptology, Vol. 17, No. 4, pp. 235-261, Sep. 2004.
K. Miyazaki, G. Hanaoka and H. Imai, “Digitally signed document sanitizing scheme based on bilinear maps,” Proceeding of the 2006 ACM Symposium on Information, computer and communications security, pp. 343-354, Mar. 2006.
K. Miyazaki, G. Hanaoka and H. Imai, “Invisibly sanitizable digital signature scheme,” Proceeding of IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. 91, No. 1, pp. 392-402, Jan. 2008.
K. Miyazaki, M. Iwamura, M. Matsumoto, T. Sasaki, R. Yoshiura, H. Tezuka, S. Tezuka and J. Imai, “Digitally signed document sanitizing scheme with disclosure condition control,” Proceeding of IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. 88, No. 1, pp. 239-246, Jan. 2005.
K. Miyazaki, S. Susaki, M. Iwamura, T. Matsumoto, R. Sasaki and H. Yoshiura, “Digital documents sanitizing problem,” IEICE Technical Report, ISEC 2003-20, pp. 61-67, 2003.
K. Samelin, H. C. Pöhls, A. Bilzhause, J. Posegga and H. D. Meer, “Redactable signatures for independent removal of structure and content,” Proceeding of International Conference on Information Security Practice and Experience, Springer, Berlin, Heidelberg, pp. 17-33, Apr. 2012.
A. Shamir, “Identity-based cryptosystems and signature schemes,” Proceeding of Workshop on the theory and application of cryptographic techniques, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 47-53, Aug. 1984.
R. Steinfeld, L. Bull and Y. Zheng, “Content extraction signatures,” Proceeding of International Conference on Information Security and Cryptology, Springer, Berlin, Heidelberg, pp. 285-304, Dec. 2002.
Y. Sun, F. Zhang and L. Shen, “A revocable certificateless signature scheme,” Journal of Computers, Vol. 9, No. 8, pp. 1843-1850, Aug. 2014.
Y. M. Tseng and T. T. Tsai, “Efficient revocable ID-based encryption with a public channel,” The Computer Journal, Vol. 55, No. 4, pp. 475-486, Apr. 2012.
G. K. Verma and B. B. Singh, “Efficient identity-based blind message recovery signature scheme from pairings,” IET Information Security, Vol. 12, No. 2, pp. 150-156, Mar. 2018.
D. H. Yum, J. W. Seo and P. J. Lee, “Trapdoor sanitizable signatures made easy,” Proceeding of International Conference on Applied Cryptography and Network Security, Springer, Berlin, Heidelberg, pp. 53-68, Jun. 2010.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top