Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/19678
標題: 有效率的免憑證代理簽章機制
An Efficient Certificateless Proxy Signature Scheme
作者: 紀汶承
Ji, Wen-Cheng
關鍵字: proxy signature;代理簽章;digital signature;certificateless public key cryptography;數位簽章;免憑證公開金鑰加密系統
出版社: 資訊科學與工程學系所
引用: [1] S. Al-Riyami and K. Paterson, Certificateless public key cryptography, ASIACRYPT, LNCS, Vol.2894, pp. 452-473, 2003. [2] D. Boneh and X. Boyen, Short Signatures without Random Oracles, EUROCRYPT, LNCS, Vol.3027, pp. 56-73, 2004. [3] D. Boneh, H. Shacham, and B. Lynn, Short signatures from the Weil pairing, Journal of Cryptology, Vol.17, no.4 , pp. 297-319, 2004. [4] D. Boneh, M. Franklin, Identity-Based Encryption from the Weil Pairing, AC, LNCS, Vol.2139, pp 213-229, 2001. [5] H. Chen, F. Zhang and R. Song, Certificateless proxy signature scheme with provable security. Journal of Software, Vol.20, no.3, pp.692-701, 2009. [6] P. Gutmann, PKI: It's not dead, just resting, IEEE Computer, Vol.35, no.8, pp. 41-49, 2002. [7] B.C. Hu, D. S. Wong, Z. Zhang, and X. Deng, Key Replacement Attack Against a Generic Construction of Certificateless Signature, ISP, LNCS, Vol.4058, pp.235-246, 2006. [8] N. Koblitz, Elliptic Curve Cryptosystem, Mathematics of Computation, Vol.48, no.177, pp.203-209, 1987. [9] J. Li, L. Xu and Y. Zhang, Provably Secure Certificate-based Proxy Signature Schemes, Journal of Computers, Vol.4, no.6, pp.444-452, 2009. [10] M. Mambo, K. Usuda and E. Okamoto. "Proxy Signatures: Delegation of the Power to Sign Message", IEICE Trans.Fundamentals, Vol.E79-A, no.9, pp. 1338-1354, 1996. [11] M. Mambo, K. Usuda and E. Okamoto. Proxy signatures for delegating signing operation. 3rd ACM Conference onComputer and Communications Security, pp.48-57, 1996. [12] V.S. Miller, Use of Elliptic Curve in Cryptography, AC, LNCS, Vol.218, pp. 417-426, 1986. [13] A. Shamir, Identity based cryptosystems and signature schemes, AC, LNCS, Vol.196, pp. 47-53, 1984. [14] H. Sun, An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers, Computer Communications,Vol.22, no.8, pp.717-722, 1999. [15] H. Sun, N.Y. Lee and T. Hwang, Threshold Proxy Signatures, IEE Proceedings-Computers and Digital Techniques, Vol.146, no.5, pp.259-263, 1999. [16] L. Zhang and F. Zhang, A new certificateless aggregate signature scheme, Computer Communication, Vol.32, no.6, pp.1079-1085, 2009. [17] W. Yap, S. Hang and B. Goi, An Efficient Certificateless Signature Scheme, CIS, LNCS, Vol.3802, pp.322-331, 2006. [18] Z. Zhang, D. Wong, J. Xu and D. Feng, Certificateless public-key signature: Security model and efficient construction, ACNS, LNCS, Vol.3989, pp293-308, 2006.
摘要: 
在數位化的時代,代理簽章為一種新的數位簽章機制。在代理簽章中,有一個原始簽章者,可以授權本身的簽章能力給其他的代理人,這些被授權的代理人我們稱為代理簽章者。
本文我們提出一個有效率的免憑證代理簽章機制,將免憑證公開金鑰技術引進代理簽章中,原始簽章者除了可以將自己的簽章能力授權給代理簽章者,暫代自己的職務,更可以解決基於身分公開金鑰密碼系統所面臨的金鑰託管問題。我們提出的方法在假設CDH問題艱難於random oracle model下可以抵擋惡意的KGC與外部公鑰取代攻擊。

Proxy signature is a new signature technique, such that an original signer is able to delegate his ability of signing to a proxy known as a “proxy signer”.
In this thesis, we propose a new certificateless proxy signature scheme. Our scheme is provably secure in the random oracle model against the malicious KGC and public key replacement attack under the hardness assumption of the CDH problem.
URI: http://hdl.handle.net/11455/19678
其他識別: U0005-0907201012002200
Appears in Collections:資訊科學與工程學系所

Show full item record
 

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.