当前位置:主页 > 管理论文 > 移动网络论文 >

代理数字签名的关键技术研究

发布时间:2018-05-23 19:12

  本文选题:代理签名 + 前向安全 ; 参考:《昆明理工大学》2014年硕士论文


【摘要】:随着计算机技术和通信技术的飞速发展,人们已经逐渐步入了一个崭新的互联网时代。网上银行、电子政务、云计算、大数据等网络时代的产物正蓬勃发展。然而,在信息化革命不断推进的同时,网络安全隐患也越来越突出。那么,如何建立全面而有效的防护措施,如何开发出更加适应信息时代需求的数据安全模式是人们关心的焦点。数字签名作为密码学中的关键技术,在数据完整性、不可否认性、身份认证以及匿名性上等方面起着重要的作用,为网络通信提供了很好的安全机制。 1996年,代理签名体制首次被Manbo、Usuda和Okamoto提出。代理签名是一种具有授权机制的数字签名。在代理签名体制中,由于某种原因不能参加实际签名的原始人可以将他的数字签名权委托给代理人,让代理人代替原始签名人签署消息。代理签名已经被广泛运用于移动通信、电子商务、电子投票等方面。迄今为止,许多代理签名方案被相继提出,但一些已提出的方案仍然存在安全问题,因此,深入研究代理数字签名的关键理论和技术是有着非常重要的理论意义和应用价值。 本文主要研究了三种具有特殊性质的代理签名,从扩展代理签名安全性的角度提出自己的研究成果: 1.首先,对已有的可共享验证的(t,n)门限多代理多重签名方案进行了回顾。指出TYH方案不能抵抗伪造攻击和不真正具有可共享验证性,同时,也对WLD方案进行了安全性分析,指出他们的方案不具有私钥安全性。针对已有方案的安全缺陷,提出了一种新的可共享验证的门限多代理多重签名方案,并对方案的安全性进行了论证,结果表明,新方案的安全性受到RSA难题的保证,并且满足代理签名的各种安全性要求。 2.分析了Wang方案的安全缺陷,指出Wang方案不满足前向安全性质,针对数字签名私钥丢失后带来的严重后果,将前向安全数字签名体制和代理签名体制相结合,提出一种具有前向安全特性的代理签名,从而保证了私钥丢之前产生的代理签名是有效的。并论证了新方案的安全性。 3.分析了Tan的Schnorr型代理盲签名方案,发现Tan方案的一些缺陷。针对Tan方案的缺陷,并且结合盲签名的性质,提出一个改进的代理盲签名方案。改进的方案能够抵抗原始签名人和签名接收人的伪造攻击,而且具有强盲性和撤销代理权的特性。
[Abstract]:With the rapid development of computer technology and communication technology, people have entered a new Internet era. Online banking, e-government, cloud computing, big data and other products of the network era is booming. However, while the information revolution continues to advance, the hidden dangers of network security are becoming more and more prominent. Therefore, how to establish comprehensive and effective protection measures and how to develop a more suitable data security model to meet the needs of the information age is the focus of attention. As a key technology in cryptography, digital signature plays an important role in data integrity, non-repudiation, identity authentication and anonymity. It provides a good security mechanism for network communication. In 1996, the proxy signature system was first proposed by Manbo Usuda and Okamoto. Proxy signature is a digital signature with authorization mechanism. In the proxy signature system, the primitive person who can not participate in the actual signature for some reason can entrust his digital signature right to the agent and let the agent sign the message instead of the original signer. Proxy signature has been widely used in mobile communication, e-commerce, electronic voting and so on. So far, many proxy signature schemes have been proposed one after another, but some of the proposed schemes still have security problems. Therefore, it is very important to study the key theory and technology of proxy digital signature. In this paper, three kinds of proxy signatures with special properties are studied, and their research results are presented from the point of view of extending proxy signature security. 1. Firstly, the existing multi-proxy multi-signature schemes with shared verifiability are reviewed. It is pointed out that TYH schemes can not resist forgery attacks and can not be truly shared verifiably. At the same time, the security analysis of WLD schemes is carried out, and it is pointed out that their schemes do not have private key security. In view of the security defects of the existing schemes, a new threshold multi-agent multi-signature scheme is proposed, which can be shared and verified, and the security of the scheme is demonstrated. The results show that the security of the new scheme is guaranteed by the RSA problem. And meet the proxy signature security requirements. 2. This paper analyzes the security defects of Wang scheme, and points out that the Wang scheme does not satisfy the forward security property. In view of the serious consequences brought by the loss of the private key of digital signature, the forward secure digital signature scheme and the proxy signature scheme are combined. A proxy signature with forward security is proposed to ensure that the proxy signature generated before the loss of the private key is effective. The security of the new scheme is demonstrated. 3. The Schnorr proxy blind signature scheme of Tan is analyzed, and some defects of Tan scheme are found. Aiming at the defects of Tan scheme and combining the properties of blind signature, an improved proxy blind signature scheme is proposed. The improved scheme can resist the forgery attack of the original signer and the signature receiver, and has the characteristics of strong blindness and revocation of the proxy.
【学位授予单位】:昆明理工大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP393.08

【参考文献】

相关期刊论文 前10条

1 容晓峰;李增欣;郭晓雷;;密码服务系统研究综述[J];计算机安全;2010年03期

2 刘文远;佟凤;王宝文;王亚东;;一个新的可收回代理权的代理盲签名方案[J];电子与信息学报;2008年10期

3 傅建庆;陈健;范容;陈小平;平玲娣;;基于代理签名的移动通信网络匿名漫游认证协议[J];电子与信息学报;2011年01期

4 李继国,曹珍富;一个门限代理签名方案的改进[J];计算机研究与发展;2002年11期

5 李哠;何明星;;可收回代理权的公平盲代理盲签名方案[J];计算机工程;2006年13期

6 张晓敏;张建中;;一个改进的前向安全的代理签名方案[J];计算机工程;2007年21期

7 杨迎辉;孙艳蕊;袁喜凤;孙金青;;改进的门限多代理多重共享验证签名方案[J];计算机工程;2008年23期

8 覃征,闫焱,王立;特殊签名及其在电子商务中的应用[J];计算机应用研究;2003年06期

9 王亮;贾小珠;;基于离散对数的前向安全代理签名方案[J];青岛大学学报(自然科学版);2007年02期

10 王蜀洪,王贵林,鲍丰,王杰;对一个基于离散对数代理盲签名的密码分析(英文)[J];软件学报;2005年05期



本文编号:1925983

资料下载
论文发表

本文链接:https://www.wllwen.com/guanlilunwen/ydhl/1925983.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户0d51d***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com