透過您的圖書館登入
IP:18.118.171.20
  • 學位論文

具最佳簽章者匿名性的有效指定驗證者之環簽章法

An Efficient Strong Designated-Verifier Ring Signature Scheme Providing Maximal Signer’s Anonymity

指導教授 : 黃心嘉

摘要


近幾年為了保護簽章者的匿名性,有許多關於擁有指定驗證者的環簽章法的研究陸續被提出。在這些研究中,只有黃和鄭的簽章法提供了對指定驗證者以外的人,簽章者最大的匿名性。此簽章法也提供了真正簽章者能證明環簽章是由自己簽署這特性,但是為了這特性導致較繁重的計算量。所以為了改善其效能和保留黃和鄭的簽章法的特性,我們提出一個新的具有指定驗證者的環簽章法。這新的環簽章法不僅減少計算量,也擁有和黃和鄭的簽章法特性。另外,提出的簽章法也擁有簽章者坦白此特性並且其簽章長度較短。然而,訊息有可能透露出一些關於真實簽章者的秘密資訊。所以,我們提出一個新的具指定驗證者的環簽密文法。此提出的方法對於指定驗證者以外的任何人提供了最大的真正簽章者的匿名保護。相較於其他的環簽密文法,我們的方法提供較強的簽章者匿名保護並且所要加密的訊息長度不設限。

並列摘要


Many ring signature schemes with designated verifiers are proposed to protect signers’ identity privacy recently. Among those schemes, only Hwang and Cheng proposed their scheme to provide 1-out-of-infinite signer anonymity for anyone except designated verifiers. Moreover, to protect signers’ benefit, their scheme provides the signer admission. However, their signer admission cause the heavy computation cost to keep 1-out-of-infinite signer anonymity. To improve their performance with the same 1-out-of-infinite signer anonymity, our efficient ring signature scheme with strong designated verifier is proposed. Our scheme also reduces the size of the ring signature with strong designated verifiers and also provides the signer admission with the same 1-out-of-infinite signer anonymity. Since messages may reveal some sensitive information about the actual signer, our ring signcryption scheme with strong designated verifiers is proposed to 1-out-of-infinite signer anonymity for anyone, except the designated verifiers. Being compared with the other ring signcryption schemes, our scheme provides strongest signer anonymity to protect signers’ privacy. Our scheme is also free from the message length restriction while the other schemes are not.

參考文獻


[3] F. Zhang and K. Kim, “ID-Based Blind Signature and Ring Signature from Pairings,” Advance in Cryptology-ASIACRYPT 2002, LNCS 2501, Berlin: Springer-Verlag, 2002, pp. 629-637.
[4] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes,” Advance in Croptology-Crypto’84, LNCS 196, New-York: Springer-Verlag, 1985, pp. 47-53.
[6] E. Bresson, J. Stern, and M. Szydlo “Threshold Ring Signatures and Applications to Ad-hoc Groups,” Advances in Cryptology-CRYPTO’02, LNCS 2442, Berlin: Springer-Verlag, 2002, pp. 465-480.
[8] H. Wang, S. Han, C. Deng, and F. Zhang, “Cryptanalysis and Improvement of a Ring Signature Based on ElGamal Signature,” WCSE’09, WRI World Congress on Software Engineering, 2009, Vol. 3, pp. 397-401, May 2009.
[10] S. Saeednia , S. Kremer and O. Markowitch, “An Efficient Strong Designated Verifier Signature Scheme,” Information Security and Cryptology-INCISC 2003, LNCS 2971, Berlin: Springer-Verlag, 2003, pp. 40-54.

延伸閱讀