無(wú)雙線性對(duì)的指定驗(yàn)證者代理簽名方案研究
發(fā)布時(shí)間:2018-07-05 17:28
本文選題:代理簽名 + 指定驗(yàn)證者; 參考:《西安電子科技大學(xué)》2014年碩士論文
【摘要】:目前在信息安全領(lǐng)域中,數(shù)字簽名是信息傳輸中必備的一項(xiàng)安全措施,它旨在保證數(shù)據(jù)的完整和可靠性,可以實(shí)現(xiàn)簽名者的身份認(rèn)證等。代理簽名是數(shù)字簽名的一種,它發(fā)生在當(dāng)某個(gè)簽名人因出差等原因不能親自簽名時(shí),該簽名人將他的簽名權(quán)利委托給其他人的場(chǎng)合。近幾年隨著電子商務(wù)的蓬勃發(fā)展,代理簽名的用途也越來(lái)越廣,如電子現(xiàn)金、分布式共享系統(tǒng)以及電子競(jìng)標(biāo)等。在一般的代理簽名中,得到原始簽名者和代理簽名者公鑰的任何人都可以驗(yàn)證代理簽名的有效性。然而,當(dāng)簽名的消息涉及到比較敏感的信息時(shí),原始簽名者只希望自己指定的驗(yàn)證者能夠驗(yàn)證簽名的有效性,比如電子售書(shū)中的電子收據(jù)就是屬于這種類(lèi)型的簽名,針對(duì)上面的場(chǎng)景,研究指定驗(yàn)證者代理簽名就很有必要性。本文通過(guò)分析目前涌現(xiàn)出的指定驗(yàn)證者代理簽名方案,發(fā)現(xiàn)以下一些問(wèn)題:首先,大部分方案都是基于傳統(tǒng)的公鑰基礎(chǔ)設(shè)施或者依賴(lài)基于身份的公鑰密碼系統(tǒng),所以不能避免密鑰托管和證書(shū)管理問(wèn)題。第二,雖然有人使用無(wú)證書(shū)概念到指定驗(yàn)證者簽名,但是那些方案基本都使用了雙線性對(duì),我們知道,雙線性對(duì)的計(jì)算復(fù)雜度是點(diǎn)乘運(yùn)算的二十倍左右,這樣大大的降低了方案的效率。第三,經(jīng)過(guò)統(tǒng)計(jì)大多數(shù)相關(guān)的方案都沒(méi)有安全證明,這就不能保證方案的安全可行性。也就是說(shuō),目前幾乎沒(méi)有方案同時(shí)實(shí)現(xiàn)指定驗(yàn)證者代理簽名的高效性和安全性。針對(duì)以上分析,本文首先簡(jiǎn)單介紹了代理簽名的相關(guān)基礎(chǔ)知識(shí),包括橢圓曲線離散對(duì)數(shù)困難問(wèn)題,可證明安全性理論,隨機(jī)語(yǔ)言模型和指定驗(yàn)證者代理簽名的相關(guān)理論。其次,對(duì)指定驗(yàn)證者代理簽名發(fā)展現(xiàn)狀進(jìn)行分析,并國(guó)內(nèi)外目前存在的相關(guān)方案進(jìn)行縱向的對(duì)比,分析各個(gè)方案中的利弊,對(duì)比方案的計(jì)算復(fù)雜度和性能。最后我們?yōu)榱吮苊馍厦姘l(fā)現(xiàn)的這些問(wèn)題,提出了自己的新方案,一種基于隨機(jī)預(yù)言模型的,含有指定驗(yàn)證者特性的,高效的代理簽名方案。在該指定驗(yàn)證者代理簽名中,通過(guò)使用橢圓曲線下的點(diǎn)乘來(lái)取代雙線性對(duì)運(yùn)算,并且借鑒無(wú)證書(shū)代理簽名的思想來(lái)解決密鑰托管問(wèn)題和證書(shū)管理問(wèn)題,并且,我們使用了挑戰(zhàn)者攻擊者之間的兩場(chǎng)游戲來(lái)模擬偽造簽名過(guò)程的方法,對(duì)方案的安全性做了證明,構(gòu)造出一種新的代理簽名方法,實(shí)現(xiàn)高效安全的代理簽名。與現(xiàn)有的方案相比,本文的方案在計(jì)算復(fù)雜度和性能方面都具有優(yōu)勢(shì),這使得本文的方案更適合于實(shí)際應(yīng)用。
[Abstract]:At present, in the field of information security, digital signature is a necessary security measure in information transmission. It aims at ensuring the integrity and reliability of data, and can realize the identity authentication of the signer. Proxy signature is a kind of digital signature, which occurs when a signer cannot sign his signature in person because of a business trip, the signer entrusts his signature right to another person. In recent years, with the rapid development of electronic commerce, proxy signature is used more and more widely, such as electronic cash, distributed sharing system and electronic bidding. In a general proxy signature, anyone who obtains the public key of the original signer and the proxy signer can verify the validity of the proxy signature. However, when the signed message involves more sensitive information, the original signer only wants his designated verifier to be able to verify the validity of the signature, such as the electronic receipt in an electronic book, which belongs to this type of signature. For the above scenario, it is necessary to study the proxy signature of designated verifier. By analyzing the proxy signature schemes for designated verifiers, this paper finds the following problems: firstly, most of the schemes are based on traditional public key infrastructure or rely on identity-based public key cryptosystems. Therefore, key escrow and certificate management problems cannot be avoided. Second, although some people use the certification-free concept to sign by the designated verifier, the schemes basically use bilinear pairs, and we know that bilinear pairs are about 20 times more complex than point multiplication. This greatly reduces the efficiency of the scheme. Thirdly, most of the related schemes are not proved to be safe, which can not guarantee the safety feasibility of the scheme. That is to say, there are few schemes to implement the efficiency and security of proxy signature. For the above analysis, this paper first introduces the basic knowledge of proxy signature, including elliptic curve discrete logarithm problem, provable security theory, stochastic language model and proxy signature theory of designated verifier. Secondly, the status quo of proxy signature of designated verifier is analyzed, and the relative schemes are compared longitudinally. The advantages and disadvantages of each scheme are analyzed, and the computational complexity and performance of these schemes are compared. Finally, in order to avoid these problems, we propose our own new scheme, a new proxy signature scheme based on stochastic prophecy model, which contains the characteristics of the designated verifier. In the proxy signature of the designated verifier, the bilinear pair is replaced by the dot multiplication under the elliptic curve, and the key escrow problem and the certificate management problem are solved by using the idea of non-certificate proxy signature. We use two games between challenger attackers to simulate the process of forged signature. We prove the security of the scheme and construct a new proxy signature method to implement efficient and secure proxy signature. Compared with the existing schemes, the proposed scheme has advantages in computational complexity and performance, which makes the proposed scheme more suitable for practical application.
【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類(lèi)號(hào)】:TN918.91
【二級(jí)參考文獻(xiàn)】
相關(guān)期刊論文 前2條
1 申軍偉;楊曉元;梁中銀;陳海濱;;一種新的無(wú)證書(shū)代理簽名方案的分析與改進(jìn)[J];計(jì)算機(jī)工程與應(yīng)用;2010年08期
2 樊睿;王彩芬;藍(lán)才會(huì);左為平;;新的無(wú)證書(shū)的代理簽名方案[J];計(jì)算機(jī)應(yīng)用;2008年04期
,本文編號(hào):2101084
本文鏈接:http://sikaile.net/kejilunwen/wltx/2101084.html
最近更新
教材專(zhuān)著