環(huán)簽名方案的分析與改進
發(fā)布時間:2018-10-30 13:03
【摘要】:環(huán)簽名是在如何匿名泄露秘密的背景下提出的一種簽名技術(shù),它無需可信中心及簽名者群建立的過程,且對于驗證者來說簽名人是完全匿名的,故環(huán)簽名有時也被視為一種特殊的群簽名.環(huán)簽名在軍事、經(jīng)濟等許多方面都有著重要的應(yīng)用,如匿名泄露信息、電子投票系統(tǒng)、保護知識產(chǎn)權(quán)等.本文主要針對如下幾個問題展開研究工作. 1.對張躍宇等人提出的環(huán)簽名方案(也稱做ZLW方案)進行了研究,發(fā)現(xiàn)其存在多已知簽名的偽造性攻擊,針對這種攻擊方法,本文利用將哈希函數(shù)作用于隨機數(shù)列上的方法,提出了一種新的環(huán)簽名方案,分析結(jié)果表明新方案在更強的安全模型3下仍然是安全的. 2.對王玲玲等人提出的環(huán)簽名方案(也稱做WZM方案)進行了研究,發(fā)現(xiàn)原環(huán)簽名方案中驗證等式具有線性關(guān)系,故可以對其進行環(huán)成員改變攻擊,針對這種攻擊,本文利用將哈希函數(shù)作用于成員集上的方法,破壞了驗證等式的線性關(guān)系,從而提出了一種新的環(huán)簽名方案,分析結(jié)果表明新方案在安全模型3下仍然是安全的. 3.對基于環(huán)簽名的密碼學(xué)協(xié)議進行了研究,并分別提出了基于環(huán)簽名的匿名電子投票方案和電子現(xiàn)金支付協(xié)議.這些協(xié)議都繼承了環(huán)簽名的匿名性特征,從根本上保證了它們可以應(yīng)用于一些需要匿名性的特定環(huán)境.
[Abstract]:Ring signature is a kind of signature technology proposed under the background of how to leak secret anonymously. It does not need the process of establishing trusted center and signer group, and the signer is completely anonymous to verifier. Therefore, ring signature is sometimes regarded as a special group signature. Ring signature has important applications in military, economic and other fields, such as anonymous disclosure of information, electronic voting system, protection of intellectual property rights and so on. This paper focuses on the following issues. 1. In this paper, the ring signature scheme (also called ZLW scheme) proposed by Zhang Yueyu et al is studied, and it is found that there are many known signature forgery attacks. A new ring signature scheme is proposed. The analysis results show that the new scheme is still secure under the stronger security model 3. 2. The ring signature scheme proposed by Wang Lingling and others (also called WZM scheme) is studied. It is found that the verification equation in the original ring signature scheme has linear relation, so we can make ring member change attack on it, and aim at this kind of attack. In this paper, a new ring signature scheme is proposed by using the method that the hash function is applied on the member set, and the linear relation of the verification equation is broken. The analysis results show that the new scheme is still secure under the security model 3. 3. The cryptographic protocol based on ring signature is studied, and an anonymous electronic voting scheme based on ring signature and an electronic cash payment protocol are proposed respectively. These protocols all inherit the anonymous feature of ring signature and guarantee that they can be applied to some special environment which needs anonymity.
【學(xué)位授予單位】:黑龍江大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TN918.91
本文編號:2300087
[Abstract]:Ring signature is a kind of signature technology proposed under the background of how to leak secret anonymously. It does not need the process of establishing trusted center and signer group, and the signer is completely anonymous to verifier. Therefore, ring signature is sometimes regarded as a special group signature. Ring signature has important applications in military, economic and other fields, such as anonymous disclosure of information, electronic voting system, protection of intellectual property rights and so on. This paper focuses on the following issues. 1. In this paper, the ring signature scheme (also called ZLW scheme) proposed by Zhang Yueyu et al is studied, and it is found that there are many known signature forgery attacks. A new ring signature scheme is proposed. The analysis results show that the new scheme is still secure under the stronger security model 3. 2. The ring signature scheme proposed by Wang Lingling and others (also called WZM scheme) is studied. It is found that the verification equation in the original ring signature scheme has linear relation, so we can make ring member change attack on it, and aim at this kind of attack. In this paper, a new ring signature scheme is proposed by using the method that the hash function is applied on the member set, and the linear relation of the verification equation is broken. The analysis results show that the new scheme is still secure under the security model 3. 3. The cryptographic protocol based on ring signature is studied, and an anonymous electronic voting scheme based on ring signature and an electronic cash payment protocol are proposed respectively. These protocols all inherit the anonymous feature of ring signature and guarantee that they can be applied to some special environment which needs anonymity.
【學(xué)位授予單位】:黑龍江大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TN918.91
【參考文獻】
相關(guān)期刊論文 前6條
1 王繼林,張鍵紅,王育民;基于環(huán)簽名思想的一種類群簽名方案[J];電子學(xué)報;2004年03期
2 黃欣沂;張福泰;伍瑋;;一種基于身份的環(huán)簽密方案[J];電子學(xué)報;2006年02期
3 王玲玲;張國印;馬春光;;標(biāo)準(zhǔn)模型下基于雙線性對的前向安全環(huán)簽名方案[J];電子與信息學(xué)報;2009年02期
4 張國印;王玲玲;馬春光;;環(huán)簽名研究進展[J];通信學(xué)報;2007年05期
5 張躍宇;李暉;王育民;;標(biāo)準(zhǔn)模型下基于身份的環(huán)簽名方案[J];通信學(xué)報;2008年04期
6 陳愷,魏仕民,肖國鎮(zhèn);電子現(xiàn)金系統(tǒng)的研究與發(fā)展[J];西安電子科技大學(xué)學(xué)報;2000年04期
,本文編號:2300087
本文鏈接:http://sikaile.net/falvlunwen/zhishichanquanfa/2300087.html
最近更新
教材專著