当前位置:主页 > 科技论文 > 网络通信论文 >

无双线性对的指定验证者代理签名方案研究

发布时间:2018-07-05 17:28

  本文选题:代理签名 + 指定验证者 ; 参考:《西安电子科技大学》2014年硕士论文


【摘要】:目前在信息安全领域中,数字签名是信息传输中必备的一项安全措施,它旨在保证数据的完整和可靠性,可以实现签名者的身份认证等。代理签名是数字签名的一种,它发生在当某个签名人因出差等原因不能亲自签名时,该签名人将他的签名权利委托给其他人的场合。近几年随着电子商务的蓬勃发展,代理签名的用途也越来越广,如电子现金、分布式共享系统以及电子竞标等。在一般的代理签名中,得到原始签名者和代理签名者公钥的任何人都可以验证代理签名的有效性。然而,当签名的消息涉及到比较敏感的信息时,原始签名者只希望自己指定的验证者能够验证签名的有效性,比如电子售书中的电子收据就是属于这种类型的签名,针对上面的场景,研究指定验证者代理签名就很有必要性。本文通过分析目前涌现出的指定验证者代理签名方案,发现以下一些问题:首先,大部分方案都是基于传统的公钥基础设施或者依赖基于身份的公钥密码系统,所以不能避免密钥托管和证书管理问题。第二,虽然有人使用无证书概念到指定验证者签名,但是那些方案基本都使用了双线性对,我们知道,双线性对的计算复杂度是点乘运算的二十倍左右,这样大大的降低了方案的效率。第三,经过统计大多数相关的方案都没有安全证明,这就不能保证方案的安全可行性。也就是说,目前几乎没有方案同时实现指定验证者代理签名的高效性和安全性。针对以上分析,本文首先简单介绍了代理签名的相关基础知识,包括椭圆曲线离散对数困难问题,可证明安全性理论,随机语言模型和指定验证者代理签名的相关理论。其次,对指定验证者代理签名发展现状进行分析,并国内外目前存在的相关方案进行纵向的对比,分析各个方案中的利弊,对比方案的计算复杂度和性能。最后我们为了避免上面发现的这些问题,提出了自己的新方案,一种基于随机预言模型的,含有指定验证者特性的,高效的代理签名方案。在该指定验证者代理签名中,通过使用椭圆曲线下的点乘来取代双线性对运算,并且借鉴无证书代理签名的思想来解决密钥托管问题和证书管理问题,并且,我们使用了挑战者攻击者之间的两场游戏来模拟伪造签名过程的方法,对方案的安全性做了证明,构造出一种新的代理签名方法,实现高效安全的代理签名。与现有的方案相比,本文的方案在计算复杂度和性能方面都具有优势,这使得本文的方案更适合于实际应用。
[Abstract]:At present, in the field of information security, digital signature is a necessary security measure in information transmission. It aims at ensuring the integrity and reliability of data, and can realize the identity authentication of the signer. Proxy signature is a kind of digital signature, which occurs when a signer cannot sign his signature in person because of a business trip, the signer entrusts his signature right to another person. In recent years, with the rapid development of electronic commerce, proxy signature is used more and more widely, such as electronic cash, distributed sharing system and electronic bidding. In a general proxy signature, anyone who obtains the public key of the original signer and the proxy signer can verify the validity of the proxy signature. However, when the signed message involves more sensitive information, the original signer only wants his designated verifier to be able to verify the validity of the signature, such as the electronic receipt in an electronic book, which belongs to this type of signature. For the above scenario, it is necessary to study the proxy signature of designated verifier. By analyzing the proxy signature schemes for designated verifiers, this paper finds the following problems: firstly, most of the schemes are based on traditional public key infrastructure or rely on identity-based public key cryptosystems. Therefore, key escrow and certificate management problems cannot be avoided. Second, although some people use the certification-free concept to sign by the designated verifier, the schemes basically use bilinear pairs, and we know that bilinear pairs are about 20 times more complex than point multiplication. This greatly reduces the efficiency of the scheme. Thirdly, most of the related schemes are not proved to be safe, which can not guarantee the safety feasibility of the scheme. That is to say, there are few schemes to implement the efficiency and security of proxy signature. For the above analysis, this paper first introduces the basic knowledge of proxy signature, including elliptic curve discrete logarithm problem, provable security theory, stochastic language model and proxy signature theory of designated verifier. Secondly, the status quo of proxy signature of designated verifier is analyzed, and the relative schemes are compared longitudinally. The advantages and disadvantages of each scheme are analyzed, and the computational complexity and performance of these schemes are compared. Finally, in order to avoid these problems, we propose our own new scheme, a new proxy signature scheme based on stochastic prophecy model, which contains the characteristics of the designated verifier. In the proxy signature of the designated verifier, the bilinear pair is replaced by the dot multiplication under the elliptic curve, and the key escrow problem and the certificate management problem are solved by using the idea of non-certificate proxy signature. We use two games between challenger attackers to simulate the process of forged signature. We prove the security of the scheme and construct a new proxy signature method to implement efficient and secure proxy signature. Compared with the existing schemes, the proposed scheme has advantages in computational complexity and performance, which makes the proposed scheme more suitable for practical application.
【学位授予单位】:西安电子科技大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TN918.91

【二级参考文献】

相关期刊论文 前2条

1 申军伟;杨晓元;梁中银;陈海滨;;一种新的无证书代理签名方案的分析与改进[J];计算机工程与应用;2010年08期

2 樊睿;王彩芬;蓝才会;左为平;;新的无证书的代理签名方案[J];计算机应用;2008年04期



本文编号:2101084

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/wltx/2101084.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户46fda***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com