Publications-Theses
Article View/Open
Publication Export
-
Google ScholarTM
NCCU Library
Citation Infomation
Related Publications in TAIR
題名 免憑證代理簽名及其代理盲簽名擴張
Certificateless proxy signature and its extension to blind signature作者 陳力瑋 貢獻者 左瑞麟
陳力瑋關鍵詞 免憑證簽章系統
代理簽章系統
盲簽章系統
Certificateless signature
Proxy signature
Blind signature日期 2010 上傳時間 4-Sep-2013 17:06:31 (UTC+8) 摘要 在傳統的公開金鑰簽章系統中,用戶的公鑰需要一個可信第三方(Trusted Third Party-TTP)發給憑證來保證其可靠性。其後Shamir提出基於使用者身分的簽名機制(ID-Based Signature) 儘管不需要憑證,但此種系統的概念中,TTP仍然扮演著強大的角色,隨之而來的是金鑰託管(Key Escrow)的問題。而在2003年時提出的免憑證簽章系統Certificateless Signature Scheme(CL-S)概念中,不僅不需要憑證也同時解決了Key Escrow的問題。本篇文章便是基於CL-S的概念下,發展出一套免憑證的可代理簽章系統(CL-Proxy Signature)。並且可利用簡單的方式使我們的系統擴張成為一個支援盲簽名(Blind Signature)的免憑證代理盲簽章系統。
Traditional public key cryptosystem (PKC) requires a Trusted-Third-Party(TTP) for the management of certificates of users’ public keys. To solve this problem, Shamir introduced the concept of ID based signature scheme. Although the ID based signature scheme doesn`t require the certificate management, TTP still plays an important role here. In addition, ID-based schemes have the key escrow problem. In 2003, a certificateless signature scheme has been introduced. In a certificateless signature scheme, certificates are not required on one hand and can solve the key escrow problem on the other hand. In this paper, based on the concept of certificateless, we introduce a certificateless proxy signature scheme. A remarkable feature of our scheme is that it can be extended into a certificateless proxy blind signature.參考文獻 S. Al-Riyami, K. Paterson, “Certificateless public key cryptography”, In Proceedings of Cryptology-Asia-Crypt 2003, Springer-Verlag, LNCS, Vol. 2894, 2003, pp.452-473.[2] M. H. Au, J. Chen, Joseph K. Liu, Y. Mu, Duncan S. Wong, and G. Yang, “Malicious KGC attacks in certificateless cryptography”, In Proceedings of ASIACCS’07, 2007 , pp.302–311.[3] D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing”, In Proceedings of CRYPTO’01, Springer-Verlag, LNCS Vol. 2139, 2001, pp.213-229.[4] D. Boneh, B. Lynn, H. Shacham, “Short signatures from the Weil pairing", In Proceedings of Cryptology Asia-Crypt’01, Springer-Verlag, LNCS, Vol. 2248, 2001, pp. 514-532.[5] D Chaum, “Blind signatures for untraceable payments”, In Proceedings of Cryptology-Crypto’82, Plenum Press, 1983, pp. 199-203.[6] Z. Dong, H. Zheng, K. Chen and W. Kou, “ID-based proxy blind signature”, In Proceedings of the 18th International Conference on Advanced Information Networking and Application’04, 2004, pp. 380. [7] W. Diffie, M. E. Hellman, “New directions in cryptography.” In Proceedings of IEEE Transactions on Information Theory, Vol. IT-22, No.6, Nov. 1976, pp. 644-654.[8] N. Ferguson, “Single term off-line coins”, In Proceedings of Cryptology-Euro-Crypt’93, Springer-Verlag, LNCS Vol. 765, 1993, pp. 318-328.[9] C. I. Fan, C. L. Lei, “Low-computation partially blind signatures for electronic cash”, IEICE Trans. Fundamentals, Vol. E-81-A, no. 5, May 1998, pp. 818-824. [10] K. G. Paterson, “Id-based signatures from pairings on elliptic curves”, Electronics Letters, 2002, pp. 1025-1026. [11] M. C. Gorantla, and A. Saxena, “An efficient certificateless Signature scheme”, In proceedings of CIS’05, LNAI, Vol. 3802(II), 2005, pp.110-116.[12] B. C. Hu, D. S. Wong, Z. Zhang, and X. Deng, “Certificateless signature: a new security model and an improved generic construction”, Designs, Codes and Cryptography, Vol. 42(2), 2007, pp.109-126.[13] C.Hu, Zhang Futai, Song Rushun, “Certificateless proxy signature Scheme with provable security”, Journal of Software, 2009, pp. 692-701.[14] S. Hwang and C. Chen, “A new multi proxy signature scheme”, In Proceedings of IWCNS 2000, 2000, pp. 134-138[15] X. Hong, K. Chen, “Secure key-insulated proxy signature scheme for mobile agent”, Innovative Computing Information and Control, 2007, pp. 513. [16] X. Huang, Y. Mu, W. Susilo, D. S. Wong, and W. Wu, “Certificateless signature revisited”, In Proceedings of ACISP’07, Springer-Verlag, LNCS, Vol. 4586, 2007, pp.308-322.[17] X. Huang, Y. Mu, W. Susilo, and Futai Zhang, “Short designated verifier proxy signature from pairings.”, In Proceedings of Embedded and Ubiquitous Computing, Springer-Verlag, LNCS, Vol. 3823, 2005, pp. 835-844.[18] J. K. Liu, M. H. Au, and W. Susilo, “Self-generated certificate public key cryptography and certificateless signature/encryption scheme in the standard model”, In proceedings of ASIACCS’07, Springer-Verlag, 2007, pp.273–283.[19] Kim, S., Park, S. and Won, D., "Proxy signatures, revisited", In Proceedings of International Conference on Information and Communications Security, Springer-Verlag,, LNCS 1334, 1997, pp. 223.[20] M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures: Delegation of the power to sign messages”, IEICE Trans, 1996, pp. 1338-1354.[21] N. P. Smart, “An identity based authenticated key agreement protocol based on the weil pairing”, Electronic Letters, 2002, pp. 630-632.[22] A. Shamir, “Identity based cryptosystems and signature”, In Proceedings of Crypto’84, Springer-Verlag, LNCS, Vol. 196, 1985, pp. 47-53.[23] B. Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition”, Wiley, 1996.[24] Z. Shao, “Proxy signature scheme based on factoring”, Information Processing Letter, Vol. 85(3), 2003, pp. 137-143.[25] C. P. Schnorr, “Efficient Identification and Signatures for Smart Cards”, In Proceedings of Cryptology: Crypto’89, Berlin, Springer-Verlag, LNCS, Vol. 435, 1990, pp. 339-351.[26] R Lu, He D, Wang CJ. “Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings”, In Proceedings of the 8th ACIS Int’l Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. 2007. pp. 285−290.[27] R. Rivest, A. Shamir, and L. Adelman, “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, Feb 1978, pp.120-126.[28] B. Zhan, Q. Xu, “Certificateless proxy blind signature scheme from bilinear pairings”, Knowledge Discovery and Data Mining, 2009, pp. 573-576. [29] NBS FIPSPUB 46, “Data Encryption Standard”, National Bureau of Standards, U.S. Department of Commerce, Jan. 1977.[30] National Institute of Standards and Technology, “The advanced encryption standard”, http://csrc.nist.gov/aes/, 2000.[31] T. ElGamal, “A public-key cryptosystem and a signature scheme based on d1iscrete logarithms”, In Proceedings of Cryptology-CRYPTO`84, Springer-Verlag, LNCS, Vol. 196, 1985, pp.10-18.[32] X. Li, K. Chen, L. Sun, “Certificateless signature and proxy signature schemes from bilinear pairings”, Lithuanian Mathematical Journal, Vol. 45, 2005, pp. 76−83. [33] X. Huang, W. Susilo, Y. Mu, “On the security of certificateless signature schemes”, In Proceedings of Asia-Crypt’03, Springer-Heidelberg, LNCS, Vol. 3810, 2005, pp. 13-25. [34] L. Yi, G. Bai, G. Xiao, “Proxy multi-signature scheme: A new type of proxy signature scheme”, Electronics Letters, 2000, pp.527-528. 描述 碩士
國立政治大學
資訊科學學系
97753026
99資料來源 http://thesis.lib.nccu.edu.tw/record/#G0097753026 資料類型 thesis dc.contributor.advisor 左瑞麟 zh_TW dc.contributor.author (Authors) 陳力瑋 zh_TW dc.creator (作者) 陳力瑋 zh_TW dc.date (日期) 2010 en_US dc.date.accessioned 4-Sep-2013 17:06:31 (UTC+8) - dc.date.available 4-Sep-2013 17:06:31 (UTC+8) - dc.date.issued (上傳時間) 4-Sep-2013 17:06:31 (UTC+8) - dc.identifier (Other Identifiers) G0097753026 en_US dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/60242 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 資訊科學學系 zh_TW dc.description (描述) 97753026 zh_TW dc.description (描述) 99 zh_TW dc.description.abstract (摘要) 在傳統的公開金鑰簽章系統中,用戶的公鑰需要一個可信第三方(Trusted Third Party-TTP)發給憑證來保證其可靠性。其後Shamir提出基於使用者身分的簽名機制(ID-Based Signature) 儘管不需要憑證,但此種系統的概念中,TTP仍然扮演著強大的角色,隨之而來的是金鑰託管(Key Escrow)的問題。而在2003年時提出的免憑證簽章系統Certificateless Signature Scheme(CL-S)概念中,不僅不需要憑證也同時解決了Key Escrow的問題。本篇文章便是基於CL-S的概念下,發展出一套免憑證的可代理簽章系統(CL-Proxy Signature)。並且可利用簡單的方式使我們的系統擴張成為一個支援盲簽名(Blind Signature)的免憑證代理盲簽章系統。 zh_TW dc.description.abstract (摘要) Traditional public key cryptosystem (PKC) requires a Trusted-Third-Party(TTP) for the management of certificates of users’ public keys. To solve this problem, Shamir introduced the concept of ID based signature scheme. Although the ID based signature scheme doesn`t require the certificate management, TTP still plays an important role here. In addition, ID-based schemes have the key escrow problem. In 2003, a certificateless signature scheme has been introduced. In a certificateless signature scheme, certificates are not required on one hand and can solve the key escrow problem on the other hand. In this paper, based on the concept of certificateless, we introduce a certificateless proxy signature scheme. A remarkable feature of our scheme is that it can be extended into a certificateless proxy blind signature. en_US dc.description.tableofcontents 摘要 IAbstract II致謝 III目錄 IV圖目錄 VI表目錄 VII第一章 前言 1第二章 相關研究 42.1 雙線性配對 4a) 雙線性配對 (Bilinear Pairing) 4b) 難問題假設 52.2 近代密碼學簡介 61. 對稱式金鑰密碼系統 (Symmetric Key Cryptosystem): 72. 非對稱式金鑰密碼系統(Asymmetric Key Cryptosystem): 82.3 數位簽章 102.4 PKI簽章系統 122.4.1 RSA密碼系統 122.4.2 ElGamal數位簽章法 132.4.3 Schnorr數位簽章法 142.4.4 PKI簽章系統下的缺點 152.5 ID-BASED 簽章系統 162.5.1 Shamir的ID-based Cryptosystem and Signature Schemes 162.6 CERTIFICATELESS 簽章系統 192.6.1 Certificateless Public Key Cryptography 192.6.2 Certificateless Public Key Signature 212.6.3 系統安全性 222.7 代理簽章法 242.7.1 Mambo等人的代理簽章法 262.8 盲簽章 282.8.1 D. Chaum的Blind Signature 29第三章 研究方法與步驟 30第四章 安全性分析與效能比較 364.1 安全性分析 364.2 效能比較 53第五章 提案方式擴張至盲簽名 54安全性 55第六章 結論 56參考文獻 57 zh_TW dc.format.extent 1414184 bytes - dc.format.mimetype application/pdf - dc.language.iso en_US - dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0097753026 en_US dc.subject (關鍵詞) 免憑證簽章系統 zh_TW dc.subject (關鍵詞) 代理簽章系統 zh_TW dc.subject (關鍵詞) 盲簽章系統 zh_TW dc.subject (關鍵詞) Certificateless signature en_US dc.subject (關鍵詞) Proxy signature en_US dc.subject (關鍵詞) Blind signature en_US dc.title (題名) 免憑證代理簽名及其代理盲簽名擴張 zh_TW dc.title (題名) Certificateless proxy signature and its extension to blind signature en_US dc.type (資料類型) thesis en dc.relation.reference (參考文獻) S. Al-Riyami, K. Paterson, “Certificateless public key cryptography”, In Proceedings of Cryptology-Asia-Crypt 2003, Springer-Verlag, LNCS, Vol. 2894, 2003, pp.452-473.[2] M. H. Au, J. Chen, Joseph K. Liu, Y. Mu, Duncan S. Wong, and G. Yang, “Malicious KGC attacks in certificateless cryptography”, In Proceedings of ASIACCS’07, 2007 , pp.302–311.[3] D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing”, In Proceedings of CRYPTO’01, Springer-Verlag, LNCS Vol. 2139, 2001, pp.213-229.[4] D. Boneh, B. Lynn, H. Shacham, “Short signatures from the Weil pairing", In Proceedings of Cryptology Asia-Crypt’01, Springer-Verlag, LNCS, Vol. 2248, 2001, pp. 514-532.[5] D Chaum, “Blind signatures for untraceable payments”, In Proceedings of Cryptology-Crypto’82, Plenum Press, 1983, pp. 199-203.[6] Z. Dong, H. Zheng, K. Chen and W. Kou, “ID-based proxy blind signature”, In Proceedings of the 18th International Conference on Advanced Information Networking and Application’04, 2004, pp. 380. [7] W. Diffie, M. E. Hellman, “New directions in cryptography.” In Proceedings of IEEE Transactions on Information Theory, Vol. IT-22, No.6, Nov. 1976, pp. 644-654.[8] N. Ferguson, “Single term off-line coins”, In Proceedings of Cryptology-Euro-Crypt’93, Springer-Verlag, LNCS Vol. 765, 1993, pp. 318-328.[9] C. I. Fan, C. L. Lei, “Low-computation partially blind signatures for electronic cash”, IEICE Trans. Fundamentals, Vol. E-81-A, no. 5, May 1998, pp. 818-824. [10] K. G. Paterson, “Id-based signatures from pairings on elliptic curves”, Electronics Letters, 2002, pp. 1025-1026. [11] M. C. Gorantla, and A. Saxena, “An efficient certificateless Signature scheme”, In proceedings of CIS’05, LNAI, Vol. 3802(II), 2005, pp.110-116.[12] B. C. Hu, D. S. Wong, Z. Zhang, and X. Deng, “Certificateless signature: a new security model and an improved generic construction”, Designs, Codes and Cryptography, Vol. 42(2), 2007, pp.109-126.[13] C.Hu, Zhang Futai, Song Rushun, “Certificateless proxy signature Scheme with provable security”, Journal of Software, 2009, pp. 692-701.[14] S. Hwang and C. Chen, “A new multi proxy signature scheme”, In Proceedings of IWCNS 2000, 2000, pp. 134-138[15] X. Hong, K. Chen, “Secure key-insulated proxy signature scheme for mobile agent”, Innovative Computing Information and Control, 2007, pp. 513. [16] X. Huang, Y. Mu, W. Susilo, D. S. Wong, and W. Wu, “Certificateless signature revisited”, In Proceedings of ACISP’07, Springer-Verlag, LNCS, Vol. 4586, 2007, pp.308-322.[17] X. Huang, Y. Mu, W. Susilo, and Futai Zhang, “Short designated verifier proxy signature from pairings.”, In Proceedings of Embedded and Ubiquitous Computing, Springer-Verlag, LNCS, Vol. 3823, 2005, pp. 835-844.[18] J. K. Liu, M. H. Au, and W. Susilo, “Self-generated certificate public key cryptography and certificateless signature/encryption scheme in the standard model”, In proceedings of ASIACCS’07, Springer-Verlag, 2007, pp.273–283.[19] Kim, S., Park, S. and Won, D., "Proxy signatures, revisited", In Proceedings of International Conference on Information and Communications Security, Springer-Verlag,, LNCS 1334, 1997, pp. 223.[20] M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures: Delegation of the power to sign messages”, IEICE Trans, 1996, pp. 1338-1354.[21] N. P. Smart, “An identity based authenticated key agreement protocol based on the weil pairing”, Electronic Letters, 2002, pp. 630-632.[22] A. Shamir, “Identity based cryptosystems and signature”, In Proceedings of Crypto’84, Springer-Verlag, LNCS, Vol. 196, 1985, pp. 47-53.[23] B. Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition”, Wiley, 1996.[24] Z. Shao, “Proxy signature scheme based on factoring”, Information Processing Letter, Vol. 85(3), 2003, pp. 137-143.[25] C. P. Schnorr, “Efficient Identification and Signatures for Smart Cards”, In Proceedings of Cryptology: Crypto’89, Berlin, Springer-Verlag, LNCS, Vol. 435, 1990, pp. 339-351.[26] R Lu, He D, Wang CJ. “Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings”, In Proceedings of the 8th ACIS Int’l Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. 2007. pp. 285−290.[27] R. Rivest, A. Shamir, and L. Adelman, “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, Feb 1978, pp.120-126.[28] B. Zhan, Q. Xu, “Certificateless proxy blind signature scheme from bilinear pairings”, Knowledge Discovery and Data Mining, 2009, pp. 573-576. [29] NBS FIPSPUB 46, “Data Encryption Standard”, National Bureau of Standards, U.S. Department of Commerce, Jan. 1977.[30] National Institute of Standards and Technology, “The advanced encryption standard”, http://csrc.nist.gov/aes/, 2000.[31] T. ElGamal, “A public-key cryptosystem and a signature scheme based on d1iscrete logarithms”, In Proceedings of Cryptology-CRYPTO`84, Springer-Verlag, LNCS, Vol. 196, 1985, pp.10-18.[32] X. Li, K. Chen, L. Sun, “Certificateless signature and proxy signature schemes from bilinear pairings”, Lithuanian Mathematical Journal, Vol. 45, 2005, pp. 76−83. [33] X. Huang, W. Susilo, Y. Mu, “On the security of certificateless signature schemes”, In Proceedings of Asia-Crypt’03, Springer-Heidelberg, LNCS, Vol. 3810, 2005, pp. 13-25. [34] L. Yi, G. Bai, G. Xiao, “Proxy multi-signature scheme: A new type of proxy signature scheme”, Electronics Letters, 2000, pp.527-528. zh_TW