透過您的圖書館登入
IP:3.133.149.168
  • 學位論文

實用的匿名代理簽章

Practical anonymous proxy signature schemes

指導教授 : 黃心嘉

摘要


代理簽章的架構主要是由原始簽章者授權給代理簽章者,代替原始簽章者去簽署文件;於現實世界中,衍生保護代理簽章者的需求,因此匿名的代理簽章架構主要是為了保護代理簽章者的隱私權而產生。最早的代理簽章觀念,於1996年由日本學者所提出,陸續有許多相關的論文相繼產生。於2002年,Sum 及Wei提出了一套實用的代理簽章架構,採用匿名憑證中心的觀念,核發匿名憑證給代理簽章者,但該架構被證實並沒有符合不可偽造的特性。因此,我們期望可以發展出一套的匿名代理簽章架構,符合匿名簽章應包含的特性及實用性。為了達成該需求,將導入同時簽章法(Concurrent signatures)的特性於匿名簽章申請階段,並證明該架構的安全性。

並列摘要


Proxy signature schemes with anonymous proxy signers are called anonymous proxy signature schemes. Anonymous proxy signature schemes are used to protect proxy signers’ privacy. Among the proposed anonymous proxy signature schemes, Sum and Wei’s scheme is more practical than the other proposed scheme. However, their scheme does not satisfy strong unforgeability. Here, a new practical anonymous proxy signature scheme is first proposed with the help of concurrent signature schemes. In the new scheme, the anonymous names of proxy signers keep secret before use to protect proxy signers’ privacy.

參考文獻


[2] Hwang, Shin-Jia and Shi, Chi-Hwai, “A proxy signature scheme without using one-way hash functions,” 2000 International computer symposium, Chiayi, Taiwan, R.O.C., Dec. 6-8, pp. 60-64, 2000.
[5] Khanh Nguyen, “Asymmetric concurrent signatures,” Information and Communications Security Conference, ICICS 2005, Lecture Notes in Computer Science 3783, pp.181-193, Springer-Verlag, 2005.
[6] Li, Li-Hua, Tzeng, Shiang-Feng, and Hwang, Min-Shiang, “Generalization of proxy signature-based on discrete logarithms,” Computers & Security, Vol. 22, No. 3, pp. 245-255, 2003.
[8] Lee, Narn-Yih and Lee, Ming-Feng, “The security of a strong proxy signature scheme with proxy signer privacy protection,” Applied Mathematics and Computation, Vol. 161, pp. 807-812, 2005.
[11] Mehta, M. and Harn L. “Efficient one-time proxy signatures,” IEE Proc.-Commun., Vol. 152, No. 2, April 2005

延伸閱讀


國際替代計量