国产伦乱,一曲二曲欧美日韩,AV在线不卡免费在线不卡免费,搞91AV视频

當前位置:主頁 > 科技論文 > 信息工程論文 >

強指定驗證者簽名方案的研究

發(fā)布時間:2018-11-03 19:45
【摘要】:通常情況下,數(shù)字簽名具有公開可驗證性,即任何用戶都可以驗證數(shù)字簽名的合法性。但有的時候,簽名的消息可能會涉及一些簽名者的隱私信息(例如:醫(yī)療隱私和購物信息),如果這些消息的簽名被公開驗證,將會泄露了簽名者的隱私信息,從而對簽名者帶來不好的影響。指定驗證者簽名很好地解決了這個問題,由于在指定驗證者簽名中,簽名者(Alice)指定一個可信賴的驗證者(Bob)去驗證簽名的有效性,被指定的驗證者(Bob)不能向任何第三方證明簽名的有效性,也不能讓第三方相信這個簽名是由Alice生成的,因為被指定的驗證者(Bob)也可以生成該消息的一個合法簽名。為了避免中間人截取簽名信息,強指定驗證者簽名被提出來。它是指只有擁有指定驗證者的私鑰才能驗證簽名的正確性,并且被指定驗證者也可模擬生成一個與原始簽名具有相同分布的簽名副本。強指定驗證者簽名在保證簽名的認證性的基礎上,還保護簽名者的隱私。因此,強指定驗證者簽名在保護簽名者的隱私方面具有重要的作用。本文從簽名權的非授權性、異構下的強指定驗證者簽名、抵抗合謀攻擊的無證書指定驗證者代理簽名三個方面進行研究,并取得了如下三方面成果:1.針對Zhang J等人提出的非授權的強指定驗證者簽名方案不滿足非授權性和健壯性等缺陷,提出了一個改進的非授權的強指定驗證者簽名方案。提出的方案滿足健壯性和非授權性。2.受異構簽密思想的啟發(fā),提出了一個雙向的異構下強指定驗證者簽名方案,即基于公鑰基礎設施(PKI)和基于身份的公鑰密碼體制(IBC)兩套密碼系統(tǒng)之間的強指定驗證者簽名方案。提出的方案滿足指定驗證者的簽名方案的安全性要求,其中不包括非授權性。3.對劉曉紅等人提出的無證書代理簽名方案的安全性進行了分析,發(fā)現(xiàn)其易遭受惡意KGC攻擊、原始簽名人和KGC的合謀攻擊,以及代理簽名人和KGC的合謀攻擊。提出了一個改進無證書代理簽名方案,并結合強指定驗證者簽名的思想,提出了一個無證書強指定驗證者代理簽名方案。安全性分析表明,提出的方案能抵抗兩類敵手的攻擊與合謀攻擊,同時也滿足強指定驗證者簽名的安全性要求。
[Abstract]:In general, digital signature is publicly verifiable, that is, any user can verify the validity of digital signature. However, sometimes the signed message may involve some signer's privacy information (e.g., medical privacy and shopping information), and if the signature of these messages is publicly verified, it will reveal the signer's privacy information. This will bring bad influence to the signer. Specifying the verifier signature solves this problem well, because in the designated verifier signature, the signer (Alice) specifies a trusted verifier (Bob) to verify the validity of the signature. The designated verifier (Bob) cannot prove the validity of the signature to any third party or convince the third party that the signature was generated by Alice because the designated verifier (Bob) can also generate a legal signature of the message. In order to prevent the middleman from intercepting signature information, the strongly designated verifier signature is proposed. It means that only the private key of the designated verifier can verify the correctness of the signature, and the designated verifier can also simulate the generation of a copy of the signature with the same distribution as the original signature. The strongly specified verifier signature also protects the signer's privacy on the basis of the authentication of the signature. Therefore, strongly specified verifier signature plays an important role in protecting the signer's privacy. In this paper, the non-authorization of signature right, the signature of strong designated verifier under heterogeneity, and the proxy signature of non-certificated designated verifier who resist collusion attack are studied. The results are as follows: 1. An improved strongly designated verifier signature scheme proposed by Zhang J et al is proposed to solve the problem that the unauthorized strongly designated verifier signature scheme does not satisfy the requirements of non-authorization and robustness. The proposed scheme meets the requirements of robustness and non-authorization. 2. Inspired by the idea of heterogeneous signcryption, a bidirectional strongly specified verifier signature scheme is proposed. That is, a strong designated verifier signature scheme between (PKI) and (IBC), which is based on public key infrastructure (PKI) and identity-based public key cryptosystem (IBC). The proposed scheme meets the security requirements of the designated verifier signature scheme, which does not include unauthorized. 3. 3. This paper analyzes the security of the certificateless proxy signature scheme proposed by Liu Xiaohong et al. It is found that the scheme is vulnerable to malicious KGC attacks, collusion attacks between original signers and KGC, and collusion attacks between proxy signers and KGC. In this paper, an improved proxy signature scheme without certificates is proposed. Combining with the idea of strongly designated verifier signature, a proxy signature scheme with no certificate is proposed. The security analysis shows that the proposed scheme can resist two kinds of enemy attacks and collusion attacks, and it also meets the security requirements of strongly designated verifier signatures.
【學位授予單位】:西華大學
【學位級別】:碩士
【學位授予年份】:2017
【分類號】:TN918.91

【參考文獻】

相關期刊論文 前10條

1 杜紅珍;溫巧燕;;無證書強指定驗證者多重簽名[J];通信學報;2016年06期

2 葛麗霞;李哠;何明星;李亞榮;劉曉劍;;一個改進的無證書代理簽名方案[J];計算機工程與應用;2017年08期

3 劉唐;汪小芬;丁雪峰;;一個無證書強指定驗證者簽名方案的安全性分析與改進[J];計算機科學;2013年07期

4 崔濤;劉培玉;李鳳銀;;強不可否認的指定驗證者代理簽名方案[J];計算機應用研究;2011年12期

5 梁景玲;高德智;張云;葛榮亮;;基于無證書的具有指定驗證者的代理簽名方案[J];電子設計工程;2011年12期

6 王勇兵;張學亮;仇賓;;一種新的基于身份的代理簽名方案[J];計算機工程;2011年07期

7 廖永建;SUSILO Willy;陳抗生;;強指定驗證者簽名的不可授權性[J];浙江大學學報(工學版);2009年02期

8 明洋;王育民;;無隨機預言機下的指定驗證者代理簽名方案[J];電子與信息學報;2008年03期

9 ;Certificateless universal designated verifier signature schemes[J];The Journal of China Universities of Posts and Telecommunications;2007年03期

10 王波;王尚平;王曉峰;趙男;王娟;;基于身份的指定驗證者代理簽名方案[J];計算機應用研究;2007年07期



本文編號:2308813

資料下載
論文發(fā)表

本文鏈接:http://lk138.cn/kejilunwen/xinxigongchenglunwen/2308813.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權申明:資料由用戶38b20***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com
东丰县| 操逼吃奶骚逼被操| 日本系列二区| 亚洲aⅤ永久无码精品毛片| 日韩一区欧美小说| 大奶国产一区| 亚洲日韩一区二区三区四区五区六区| 国产影院一区二区| 噜噜噜亚洲天堂| 欧美日韩一区二区三区Wwww| 97视频在线免费| 日本久久国产免费| 日韩人妻无码精品午夜电影| 激情去av网站| 农村三级人妻日本三级| 亚洲欧美黄色成人网站在线观看| 亚州欧美一区二区| 91麻豆精品一起草| 日韩中文字幕无码电影| 精品北韩一区二区三区| 三年黄色性生活视频| 国产 欧美 日韩 中文 在线| 亚洲男人一本清| 日本一区二区高清美国不卡| 就要操日韩| 亚洲伦理久久| 欧美一区二区啊啊啊| 精品国产精品麻豆| 五一级内射视频网站| 九九成人黄色网| 国产欧美精品日韩在线久久| 91偷拍免费| 曰韩欧美成人在线看线| 麻豆 你懂的| 久久经典三级| 亚洲天堂精品久久久网站| 亚洲黄色影院w| 欧美日韩人妻精品区| 精品欧美日韩一区二区三区| 在线天堂一区二区三区| 91丁香五月天|