Please use this identifier to cite or link to this item:
DC FieldValueLanguage
dc.contributorTzung-Her Chenen_US
dc.contributorKuen-Fang Jacken_US
dc.contributorHung-Min Sunen_US
dc.contributor.advisorGwoboa Horngen_US
dc.contributor.authorJi, Wen-Chengen_US
dc.identifier.citation[1] S. Al-Riyami and K. Paterson, Certificateless public key cryptography, ASIACRYPT, LNCS, Vol.2894, pp. 452-473, 2003. [2] D. Boneh and X. Boyen, Short Signatures without Random Oracles, EUROCRYPT, LNCS, Vol.3027, pp. 56-73, 2004. [3] D. Boneh, H. Shacham, and B. Lynn, Short signatures from the Weil pairing, Journal of Cryptology, Vol.17, no.4 , pp. 297-319, 2004. [4] D. Boneh, M. Franklin, Identity-Based Encryption from the Weil Pairing, AC, LNCS, Vol.2139, pp 213-229, 2001. [5] H. Chen, F. Zhang and R. Song, Certificateless proxy signature scheme with provable security. Journal of Software, Vol.20, no.3, pp.692-701, 2009. [6] P. Gutmann, PKI: It's not dead, just resting, IEEE Computer, Vol.35, no.8, pp. 41-49, 2002. [7] B.C. Hu, D. S. Wong, Z. Zhang, and X. Deng, Key Replacement Attack Against a Generic Construction of Certificateless Signature, ISP, LNCS, Vol.4058, pp.235-246, 2006. [8] N. Koblitz, Elliptic Curve Cryptosystem, Mathematics of Computation, Vol.48, no.177, pp.203-209, 1987. [9] J. Li, L. Xu and Y. Zhang, Provably Secure Certificate-based Proxy Signature Schemes, Journal of Computers, Vol.4, no.6, pp.444-452, 2009. [10] M. Mambo, K. Usuda and E. Okamoto. "Proxy Signatures: Delegation of the Power to Sign Message", IEICE Trans.Fundamentals, Vol.E79-A, no.9, pp. 1338-1354, 1996. [11] M. Mambo, K. Usuda and E. Okamoto. Proxy signatures for delegating signing operation. 3rd ACM Conference onComputer and Communications Security, pp.48-57, 1996. [12] V.S. Miller, Use of Elliptic Curve in Cryptography, AC, LNCS, Vol.218, pp. 417-426, 1986. [13] A. Shamir, Identity based cryptosystems and signature schemes, AC, LNCS, Vol.196, pp. 47-53, 1984. [14] H. Sun, An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers, Computer Communications,Vol.22, no.8, pp.717-722, 1999. [15] H. Sun, N.Y. Lee and T. Hwang, Threshold Proxy Signatures, IEE Proceedings-Computers and Digital Techniques, Vol.146, no.5, pp.259-263, 1999. [16] L. Zhang and F. Zhang, A new certificateless aggregate signature scheme, Computer Communication, Vol.32, no.6, pp.1079-1085, 2009. [17] W. Yap, S. Hang and B. Goi, An Efficient Certificateless Signature Scheme, CIS, LNCS, Vol.3802, pp.322-331, 2006. [18] Z. Zhang, D. Wong, J. Xu and D. Feng, Certificateless public-key signature: Security model and efficient construction, ACNS, LNCS, Vol.3989, pp293-308, 2006.en_US
dc.description.abstract在數位化的時代,代理簽章為一種新的數位簽章機制。在代理簽章中,有一個原始簽章者,可以授權本身的簽章能力給其他的代理人,這些被授權的代理人我們稱為代理簽章者。 本文我們提出一個有效率的免憑證代理簽章機制,將免憑證公開金鑰技術引進代理簽章中,原始簽章者除了可以將自己的簽章能力授權給代理簽章者,暫代自己的職務,更可以解決基於身分公開金鑰密碼系統所面臨的金鑰託管問題。我們提出的方法在假設CDH問題艱難於random oracle model下可以抵擋惡意的KGC與外部公鑰取代攻擊。zh_TW
dc.description.abstractProxy signature is a new signature technique, such that an original signer is able to delegate his ability of signing to a proxy known as a “proxy signer”. In this thesis, we propose a new certificateless proxy signature scheme. Our scheme is provably secure in the random oracle model against the malicious KGC and public key replacement attack under the hardness assumption of the CDH problem.en_US
dc.description.tableofcontents摘要 II Abstract III 致謝 IV 圖目錄 VI 表目錄 VII 一、 緒論 1 (一) 免憑證機制 1 (二) 代理簽章 3 (三) 論文架構 4 二、 基礎知識 5 (一) Bilinear pairing 5 (二) 免憑證代理簽章的機制以及代理簽章的特性 5 (三) CLPS的安全性model 8 三、 相關研究 11 (一) Chen等人的免憑證代理簽章機制 11 (二) Li等人的基於憑證的代理簽章機制 12 四、 新的免憑證代理簽章機制及其安全性分析 16 (一) 機制 16 (二) 可驗證性以及不可偽造性證明 21 (三) 可區分性 28 (四) 不可否認性 28 (五) 防止濫用證明 29 五、 討論與比較 30 六、 結論 32 參考文獻 33zh_TW
dc.subjectproxy signatureen_US
dc.subjectdigital signatureen_US
dc.subjectcertificateless public key cryptographyen_US
dc.titleAn Efficient Certificateless Proxy Signature Schemeen_US
dc.typeThesis and Dissertationzh_TW
item.openairetypeThesis and Dissertation-
item.fulltextno fulltext-
Appears in Collections:資訊科學與工程學系所
Show simple item record

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.