透過您的圖書館登入
IP:3.21.34.0
  • 學位論文

具有強指定驗證者匿名性的環簽章法

A Ring Signature Scheme with Anonymous Strong-Designated Verifiers

指導教授 : 黃心嘉

摘要


具有指定驗證者的環簽章提供了簽章者的強匿名性,隱藏了環中可能是簽章者的集合,另一方面具有指定驗證者模糊性的指定驗證者簽章法只有提供指定驗證者匿名性的保護。論文提出一個具有匿名性的強指定驗證者的環簽章,並且同時提供了真實簽章者及真實驗證者的匿名性,在另外一方面,該環簽章法也提供了事後澄清的協定。換句話說,真實的簽章者能夠說服任意的第三方證明它就是真正的簽章者。此外在這方法仍然滿足正確性、不可偽造性、對指定驗證者的簽章者模糊性性、不可以轉移性和強指定驗證者特性。在研究過程中,針對Lee和Chang跟Chang和Hwang的兩套環簽章法,發現有環簽章合併的問題,為了解決這合併環簽章問題,針對這兩個環簽章法,也提出簡易的改善法。

並列摘要


The ring signature scheme with designated verifiers provides the strong anonymity for the actual signer, hidden in the ring which is a set of possible signers. On the other hand, the ambiguous strong designated verifier signature scheme provides only the ambiguity protection for the designated verifier. This thesis proposes a ring signature scheme with anonymous strong-designated verifiers to provide anonymity both for actual signer and actual designated verifier. On the other hand, the ring signature scheme has to provide the disavowability. In other words, the actual signer still able to conceive some trusted party that he/she is actually the signer. Moreover, the scheme still satisfies correctness, unforgeability, signer ambiguity for the designated verifier, non-transferability, and strong specified verifiers. During our research, the ring signature merge problem is found for Lee and Chang’s and Chang and Hwang’s ring signature schemes. To overcome this ring signature merge problem, a simple improvement is also proposed for those two schemes.

參考文獻


[9] B. Wang, “A Non-Delegatable Identity-Based Strong Designated Verifier Signature Scheme,” IACR Cryptology ePrint Archive: Report 2008/507, 2008.
[11] F. Y. Yang, and C. M. Liao, “A Provably Secure and Efficient Strong Designated Verifier Signature Scheme,” International Journal of Network Security, Vol. 10, No. 3, pp. 220-224, May 2010.
[12] Z. Xiao, B. Yang, and S. Li, “Certificateless Strong Designated Verifier Signature Scheme,” 2010 2nd International Conference on e-Business and Information System Security (EBISS), Wuhan, China, May 22-23, 2010, pp. 1-5.
[2] Y. Desmedt, C. Goutier, and S. Bengio, “Special Uses and Abuses of the Fiat-Shamir Passport Protocol (extended abstract),”Advances in Cryptology -CRYPTO ’87, LNCS 293, New York: Springer-Verlag, 1988, pp. 21-39.
[10] B. Kang C. Boyd, and E. Dawson, “ A Novel Identity-Based Strong Designated Verifier Signature Scheme,” Journal of Systems and Software, Vol. 82, Issue 2, pp. 270–273, Feb. 2009.

延伸閱讀