Publications-Theses

Article View/Open

Publication Export

Google ScholarTM

NCCU Library

Citation Infomation

Related Publications in TAIR

題名 免憑證代理簽名及其代理盲簽名擴張
Certificateless proxy signature and its extension to blind signature
作者 陳力瑋
貢獻者 左瑞麟
陳力瑋
關鍵詞 免憑證簽章系統
代理簽章系統
盲簽章系統
Certificateless signature
Proxy signature
Blind signature
日期 2010
上傳時間 4-Sep-2013 17:06:31 (UTC+8)
摘要 在傳統的公開金鑰簽章系統中,用戶的公鑰需要一個可信第三方(Trusted Third Party-TTP)發給憑證來保證其可靠性。其後Shamir提出基於使用者身分的簽名機制(ID-Based Signature) 儘管不需要憑證,但此種系統的概念中,TTP仍然扮演著強大的角色,隨之而來的是金鑰託管(Key Escrow)的問題。而在2003年時提出的免憑證簽章系統Certificateless Signature Scheme(CL-S)概念中,不僅不需要憑證也同時解決了Key Escrow的問題。本篇文章便是基於CL-S的概念下,發展出一套免憑證的可代理簽章系統(CL-Proxy Signature)。並且可利用簡單的方式使我們的系統擴張成為一個支援盲簽名(Blind Signature)的免憑證代理盲簽章系統。
Traditional public key cryptosystem (PKC) requires a Trusted-Third-Party(TTP) for the management of certificates of users’ public keys. To solve this problem, Shamir introduced the concept of ID based signature scheme. Although the ID based signature scheme doesn`t require the certificate management, TTP still plays an important role here. In addition, ID-based schemes have the key escrow problem. In 2003, a certificateless signature scheme has been introduced. In a certificateless signature scheme, certificates are not required on one hand and can solve the key escrow problem on the other hand. In this paper, based on the concept of certificateless, we introduce a certificateless proxy signature scheme. A remarkable feature of our scheme is that it can be extended into a certificateless proxy blind signature.
參考文獻 S. Al-Riyami, K. Paterson, “Certificateless public key cryptography”, In Proceedings of Cryptology-Asia-Crypt 2003, Springer-Verlag, LNCS, Vol. 2894, 2003, pp.452-473.
[2] M. H. Au, J. Chen, Joseph K. Liu, Y. Mu, Duncan S. Wong, and G. Yang, “Malicious KGC attacks in certificateless cryptography”, In Proceedings of ASIACCS’07, 2007 , pp.302–311.
[3] D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing”, In Proceedings of CRYPTO’01, Springer-Verlag, LNCS Vol. 2139, 2001, pp.213-229.
[4] D. Boneh, B. Lynn, H. Shacham, “Short signatures from the Weil pairing", In Proceedings of Cryptology Asia-Crypt’01, Springer-Verlag, LNCS, Vol. 2248, 2001, pp. 514-532.
[5] D Chaum, “Blind signatures for untraceable payments”, In Proceedings of Cryptology-Crypto’82, Plenum Press, 1983, pp. 199-203.
[6] Z. Dong, H. Zheng, K. Chen and W. Kou, “ID-based proxy blind signature”, In Proceedings of the 18th International Conference on Advanced Information Networking and Application’04, 2004, pp. 380.
[7] W. Diffie, M. E. Hellman, “New directions in cryptography.” In Proceedings of IEEE Transactions on Information Theory, Vol. IT-22, No.6, Nov. 1976, pp. 644-654.
[8] N. Ferguson, “Single term off-line coins”, In Proceedings of Cryptology-Euro-Crypt’93, Springer-Verlag, LNCS Vol. 765, 1993, pp. 318-328.
[9] C. I. Fan, C. L. Lei, “Low-computation partially blind signatures for electronic cash”, IEICE Trans. Fundamentals, Vol. E-81-A, no. 5, May 1998, pp. 818-824.
[10] K. G. Paterson, “Id-based signatures from pairings on elliptic curves”, Electronics Letters, 2002, pp. 1025-1026.
[11] M. C. Gorantla, and A. Saxena, “An efficient certificateless Signature scheme”, In proceedings of CIS’05, LNAI, Vol. 3802(II), 2005, pp.110-116.
[12] B. C. Hu, D. S. Wong, Z. Zhang, and X. Deng, “Certificateless signature: a new security model and an improved generic construction”, Designs, Codes and Cryptography, Vol. 42(2), 2007, pp.109-126.
[13] C.Hu, Zhang Futai, Song Rushun, “Certificateless proxy signature Scheme with provable security”, Journal of Software, 2009, pp. 692-701.
[14] S. Hwang and C. Chen, “A new multi proxy signature scheme”, In Proceedings of IWCNS 2000, 2000, pp. 134-138
[15] X. Hong, K. Chen, “Secure key-insulated proxy signature scheme for mobile agent”, Innovative Computing Information and Control, 2007, pp. 513.
[16] X. Huang, Y. Mu, W. Susilo, D. S. Wong, and W. Wu, “Certificateless signature revisited”, In Proceedings of ACISP’07, Springer-Verlag, LNCS, Vol. 4586, 2007, pp.308-322.
[17] X. Huang, Y. Mu, W. Susilo, and Futai Zhang, “Short designated verifier proxy signature from pairings.”, In Proceedings of Embedded and Ubiquitous Computing, Springer-Verlag, LNCS, Vol. 3823, 2005, pp. 835-844.
[18] J. K. Liu, M. H. Au, and W. Susilo, “Self-generated certificate public key cryptography and certificateless signature/encryption scheme in the standard model”, In proceedings of ASIACCS’07, Springer-Verlag, 2007, pp.273–283.
[19] Kim, S., Park, S. and Won, D., "Proxy signatures, revisited", In Proceedings of International Conference on Information and Communications Security, Springer-Verlag,, LNCS 1334, 1997, pp. 223.
[20] M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures: Delegation of the power to sign messages”, IEICE Trans, 1996, pp. 1338-1354.
[21] N. P. Smart, “An identity based authenticated key agreement protocol based on the weil pairing”, Electronic Letters, 2002, pp. 630-632.
[22] A. Shamir, “Identity based cryptosystems and signature”, In Proceedings of Crypto’84, Springer-Verlag, LNCS, Vol. 196, 1985, pp. 47-53.
[23] B. Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition”, Wiley, 1996.
[24] Z. Shao, “Proxy signature scheme based on factoring”, Information Processing Letter, Vol. 85(3), 2003, pp. 137-143.
[25] C. P. Schnorr, “Efficient Identification and Signatures for Smart Cards”, In Proceedings of Cryptology: Crypto’89, Berlin, Springer-Verlag, LNCS, Vol. 435, 1990, pp. 339-351.
[26] R Lu, He D, Wang CJ. “Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings”, In Proceedings of the 8th ACIS Int’l Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. 2007. pp. 285−290.
[27] R. Rivest, A. Shamir, and L. Adelman, “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, Feb 1978, pp.120-126.
[28] B. Zhan, Q. Xu, “Certificateless proxy blind signature scheme from bilinear pairings”, Knowledge Discovery and Data Mining, 2009, pp. 573-576.
[29] NBS FIPSPUB 46, “Data Encryption Standard”, National Bureau of Standards, U.S. Department of Commerce, Jan. 1977.
[30] National Institute of Standards and Technology, “The advanced encryption standard”, http://csrc.nist.gov/aes/, 2000.
[31] T. ElGamal, “A public-key cryptosystem and a signature scheme based on d1iscrete logarithms”, In Proceedings of Cryptology-CRYPTO`84, Springer-Verlag, LNCS, Vol. 196, 1985, pp.10-18.
[32] X. Li, K. Chen, L. Sun, “Certificateless signature and proxy signature schemes from bilinear pairings”, Lithuanian Mathematical Journal, Vol. 45, 2005, pp. 76−83.
[33] X. Huang, W. Susilo, Y. Mu, “On the security of certificateless signature schemes”, In Proceedings of Asia-Crypt’03, Springer-Heidelberg, LNCS, Vol. 3810, 2005, pp. 13-25.
[34] L. Yi, G. Bai, G. Xiao, “Proxy multi-signature scheme: A new type of proxy signature scheme”, Electronics Letters, 2000, pp.527-528.
描述 碩士
國立政治大學
資訊科學學系
97753026
99
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0097753026
資料類型 thesis
dc.contributor.advisor 左瑞麟zh_TW
dc.contributor.author (Authors) 陳力瑋zh_TW
dc.creator (作者) 陳力瑋zh_TW
dc.date (日期) 2010en_US
dc.date.accessioned 4-Sep-2013 17:06:31 (UTC+8)-
dc.date.available 4-Sep-2013 17:06:31 (UTC+8)-
dc.date.issued (上傳時間) 4-Sep-2013 17:06:31 (UTC+8)-
dc.identifier (Other Identifiers) G0097753026en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/60242-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊科學學系zh_TW
dc.description (描述) 97753026zh_TW
dc.description (描述) 99zh_TW
dc.description.abstract (摘要) 在傳統的公開金鑰簽章系統中,用戶的公鑰需要一個可信第三方(Trusted Third Party-TTP)發給憑證來保證其可靠性。其後Shamir提出基於使用者身分的簽名機制(ID-Based Signature) 儘管不需要憑證,但此種系統的概念中,TTP仍然扮演著強大的角色,隨之而來的是金鑰託管(Key Escrow)的問題。而在2003年時提出的免憑證簽章系統Certificateless Signature Scheme(CL-S)概念中,不僅不需要憑證也同時解決了Key Escrow的問題。本篇文章便是基於CL-S的概念下,發展出一套免憑證的可代理簽章系統(CL-Proxy Signature)。並且可利用簡單的方式使我們的系統擴張成為一個支援盲簽名(Blind Signature)的免憑證代理盲簽章系統。zh_TW
dc.description.abstract (摘要) Traditional public key cryptosystem (PKC) requires a Trusted-Third-Party(TTP) for the management of certificates of users’ public keys. To solve this problem, Shamir introduced the concept of ID based signature scheme. Although the ID based signature scheme doesn`t require the certificate management, TTP still plays an important role here. In addition, ID-based schemes have the key escrow problem. In 2003, a certificateless signature scheme has been introduced. In a certificateless signature scheme, certificates are not required on one hand and can solve the key escrow problem on the other hand. In this paper, based on the concept of certificateless, we introduce a certificateless proxy signature scheme. A remarkable feature of our scheme is that it can be extended into a certificateless proxy blind signature.en_US
dc.description.tableofcontents 摘要 I
Abstract II
致謝 III
目錄 IV
圖目錄 VI
表目錄 VII
第一章 前言 1
第二章 相關研究 4
2.1 雙線性配對 4
a) 雙線性配對 (Bilinear Pairing) 4
b) 難問題假設 5
2.2 近代密碼學簡介 6
1. 對稱式金鑰密碼系統 (Symmetric Key Cryptosystem): 7
2. 非對稱式金鑰密碼系統(Asymmetric Key Cryptosystem): 8
2.3 數位簽章 10
2.4 PKI簽章系統 12
2.4.1 RSA密碼系統 12
2.4.2 ElGamal數位簽章法 13
2.4.3 Schnorr數位簽章法 14
2.4.4 PKI簽章系統下的缺點 15
2.5 ID-BASED 簽章系統 16
2.5.1 Shamir的ID-based Cryptosystem and Signature Schemes 16
2.6 CERTIFICATELESS 簽章系統 19
2.6.1 Certificateless Public Key Cryptography 19
2.6.2 Certificateless Public Key Signature 21
2.6.3 系統安全性 22
2.7 代理簽章法 24
2.7.1 Mambo等人的代理簽章法 26
2.8 盲簽章 28
2.8.1 D. Chaum的Blind Signature 29
第三章 研究方法與步驟 30
第四章 安全性分析與效能比較 36
4.1 安全性分析 36
4.2 效能比較 53
第五章 提案方式擴張至盲簽名 54
安全性 55
第六章 結論 56
參考文獻 57
zh_TW
dc.format.extent 1414184 bytes-
dc.format.mimetype application/pdf-
dc.language.iso en_US-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0097753026en_US
dc.subject (關鍵詞) 免憑證簽章系統zh_TW
dc.subject (關鍵詞) 代理簽章系統zh_TW
dc.subject (關鍵詞) 盲簽章系統zh_TW
dc.subject (關鍵詞) Certificateless signatureen_US
dc.subject (關鍵詞) Proxy signatureen_US
dc.subject (關鍵詞) Blind signatureen_US
dc.title (題名) 免憑證代理簽名及其代理盲簽名擴張zh_TW
dc.title (題名) Certificateless proxy signature and its extension to blind signatureen_US
dc.type (資料類型) thesisen
dc.relation.reference (參考文獻) S. Al-Riyami, K. Paterson, “Certificateless public key cryptography”, In Proceedings of Cryptology-Asia-Crypt 2003, Springer-Verlag, LNCS, Vol. 2894, 2003, pp.452-473.
[2] M. H. Au, J. Chen, Joseph K. Liu, Y. Mu, Duncan S. Wong, and G. Yang, “Malicious KGC attacks in certificateless cryptography”, In Proceedings of ASIACCS’07, 2007 , pp.302–311.
[3] D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing”, In Proceedings of CRYPTO’01, Springer-Verlag, LNCS Vol. 2139, 2001, pp.213-229.
[4] D. Boneh, B. Lynn, H. Shacham, “Short signatures from the Weil pairing", In Proceedings of Cryptology Asia-Crypt’01, Springer-Verlag, LNCS, Vol. 2248, 2001, pp. 514-532.
[5] D Chaum, “Blind signatures for untraceable payments”, In Proceedings of Cryptology-Crypto’82, Plenum Press, 1983, pp. 199-203.
[6] Z. Dong, H. Zheng, K. Chen and W. Kou, “ID-based proxy blind signature”, In Proceedings of the 18th International Conference on Advanced Information Networking and Application’04, 2004, pp. 380.
[7] W. Diffie, M. E. Hellman, “New directions in cryptography.” In Proceedings of IEEE Transactions on Information Theory, Vol. IT-22, No.6, Nov. 1976, pp. 644-654.
[8] N. Ferguson, “Single term off-line coins”, In Proceedings of Cryptology-Euro-Crypt’93, Springer-Verlag, LNCS Vol. 765, 1993, pp. 318-328.
[9] C. I. Fan, C. L. Lei, “Low-computation partially blind signatures for electronic cash”, IEICE Trans. Fundamentals, Vol. E-81-A, no. 5, May 1998, pp. 818-824.
[10] K. G. Paterson, “Id-based signatures from pairings on elliptic curves”, Electronics Letters, 2002, pp. 1025-1026.
[11] M. C. Gorantla, and A. Saxena, “An efficient certificateless Signature scheme”, In proceedings of CIS’05, LNAI, Vol. 3802(II), 2005, pp.110-116.
[12] B. C. Hu, D. S. Wong, Z. Zhang, and X. Deng, “Certificateless signature: a new security model and an improved generic construction”, Designs, Codes and Cryptography, Vol. 42(2), 2007, pp.109-126.
[13] C.Hu, Zhang Futai, Song Rushun, “Certificateless proxy signature Scheme with provable security”, Journal of Software, 2009, pp. 692-701.
[14] S. Hwang and C. Chen, “A new multi proxy signature scheme”, In Proceedings of IWCNS 2000, 2000, pp. 134-138
[15] X. Hong, K. Chen, “Secure key-insulated proxy signature scheme for mobile agent”, Innovative Computing Information and Control, 2007, pp. 513.
[16] X. Huang, Y. Mu, W. Susilo, D. S. Wong, and W. Wu, “Certificateless signature revisited”, In Proceedings of ACISP’07, Springer-Verlag, LNCS, Vol. 4586, 2007, pp.308-322.
[17] X. Huang, Y. Mu, W. Susilo, and Futai Zhang, “Short designated verifier proxy signature from pairings.”, In Proceedings of Embedded and Ubiquitous Computing, Springer-Verlag, LNCS, Vol. 3823, 2005, pp. 835-844.
[18] J. K. Liu, M. H. Au, and W. Susilo, “Self-generated certificate public key cryptography and certificateless signature/encryption scheme in the standard model”, In proceedings of ASIACCS’07, Springer-Verlag, 2007, pp.273–283.
[19] Kim, S., Park, S. and Won, D., "Proxy signatures, revisited", In Proceedings of International Conference on Information and Communications Security, Springer-Verlag,, LNCS 1334, 1997, pp. 223.
[20] M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures: Delegation of the power to sign messages”, IEICE Trans, 1996, pp. 1338-1354.
[21] N. P. Smart, “An identity based authenticated key agreement protocol based on the weil pairing”, Electronic Letters, 2002, pp. 630-632.
[22] A. Shamir, “Identity based cryptosystems and signature”, In Proceedings of Crypto’84, Springer-Verlag, LNCS, Vol. 196, 1985, pp. 47-53.
[23] B. Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition”, Wiley, 1996.
[24] Z. Shao, “Proxy signature scheme based on factoring”, Information Processing Letter, Vol. 85(3), 2003, pp. 137-143.
[25] C. P. Schnorr, “Efficient Identification and Signatures for Smart Cards”, In Proceedings of Cryptology: Crypto’89, Berlin, Springer-Verlag, LNCS, Vol. 435, 1990, pp. 339-351.
[26] R Lu, He D, Wang CJ. “Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings”, In Proceedings of the 8th ACIS Int’l Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. 2007. pp. 285−290.
[27] R. Rivest, A. Shamir, and L. Adelman, “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, Feb 1978, pp.120-126.
[28] B. Zhan, Q. Xu, “Certificateless proxy blind signature scheme from bilinear pairings”, Knowledge Discovery and Data Mining, 2009, pp. 573-576.
[29] NBS FIPSPUB 46, “Data Encryption Standard”, National Bureau of Standards, U.S. Department of Commerce, Jan. 1977.
[30] National Institute of Standards and Technology, “The advanced encryption standard”, http://csrc.nist.gov/aes/, 2000.
[31] T. ElGamal, “A public-key cryptosystem and a signature scheme based on d1iscrete logarithms”, In Proceedings of Cryptology-CRYPTO`84, Springer-Verlag, LNCS, Vol. 196, 1985, pp.10-18.
[32] X. Li, K. Chen, L. Sun, “Certificateless signature and proxy signature schemes from bilinear pairings”, Lithuanian Mathematical Journal, Vol. 45, 2005, pp. 76−83.
[33] X. Huang, W. Susilo, Y. Mu, “On the security of certificateless signature schemes”, In Proceedings of Asia-Crypt’03, Springer-Heidelberg, LNCS, Vol. 3810, 2005, pp. 13-25.
[34] L. Yi, G. Bai, G. Xiao, “Proxy multi-signature scheme: A new type of proxy signature scheme”, Electronics Letters, 2000, pp.527-528.
zh_TW