Please use this identifier to cite or link to this item:
標題: 公平盲簽章於網路招標系統投標驗標作業的應用與實作
An Application and Implementation of Fair Blind Signature Embedded Bidding Process in Web-Based Auction System
作者: 羅青寅
Luo, Ching-Yin
關鍵字: Blind Signature;盲簽章;Fair Blind Signature;Cryptography;Web-based auction;公平盲簽章;密碼學;網路招標系統
出版社: 電機工程學系所
引用: [1]林上傑、林康司,「JSP 2.0技術手冊」,碁峰資訊,台北,2004。 [2]趙光正、薛琇文,「UML精華第二版 標準物件模型語言概述」,碁峰資訊,台北,2000。 [3]行政院公共工程委員會,「政府採購法相關資料彙編」,行政院公共工程委員會,台北,1998,pp1-5,1-6,4-28,4-29,4-30,4-55,6-2。 [4]陳柏岳、林秀峰,「一個植基於解離散對數困難度的新公平盲簽章」,碩士論文,逢甲大學資訊工程研究所,台中,2004。 [5]陳俊良、黃景彰,「網際網路上的工程競標通訊協定」,第八屆全國資訊安全會議論文集,高雄,1997,pp. 187-195。 [6]陳金鈴、詹進科,「一種前瞻性網路競標協定」,碩士論文,國立中興大學應用數學系研究所,台中,1999。 [7]黃俊南、陳志瀅,「一個同時具有盲簽章與弱不可否認簽章之特性的整合性多人數位簽章技術及一個多主辦單位的網際網路工程競標系統」,碩士論文,逢甲大學電子工程所研究所,台中,2002。 [8]李廣凱、曹偉駿,「安全且有效率之政府電子化採購機制研究」,碩士論文,大葉大學資訊管理學系,彰化,2003。 [9]行政院公共工程委員會,政府採購領投標系統:。 [10]自由時報A1、A3版,2006年1月6日。 [11]H. Deshmukh, J. Malavia, and M. Scarpino, SCWCD Exam Study Kit Second Edition: Java Web Component Developer Certification, Manning Publications, Greenwich, CT, 2005. [12]A.J. Menezes, P.C. van Oorschot and S.A. Vanstone “Handbook of Applied Cryptography,” CRC Press, Boca Raton, p:p.73, 1997. [13]D. Chaum,“Blind Signature for untraceable payment,” Advances in Cryptology Crypto’82, pp.199-203, 1983. [14]J.L. Carmenisch, J.M. Piveteau and M.A. Stadler, “Blind Signature Bases on the Discrete Logarithm Problem,” Advances in Cryptology: Eurocrypt’94, Perugia, Italy, pp.428-432, 1994. [15]E. Mohammed, A. E. Emarah, and K.E. Shennawy,“A Blind Signatures Scheme Based on ElGamal Signature,”17th National Radio Science Conference, pp. C.25, 2000. [16]M. Abe and J. Camenisch, “Partially Blind Signature Schemes,” Proceedings of the 1997 Symposium on Cryptography and Information Security, SCIS97-33D,1997. [17]W.S. Juang and C.L. Lei,“Blind threshold signatures based on discrete logarithm,” Proc. Second Asian Computing Science Conference on Networking and Security, LNCS 1179, Springer, New York, pp.172-181,1996. [18]W.S. Juang and C.L. Lei,“Partially Blind Threshold Signatures Based on Discrete Logarithm,”Computer Communications, vol.22, no.1, pp.73-86,1999. [19]M. Stadler, J.M. Piveteau and J. Camenisch,“Fair Blind Signatures,”Advances in Cryptology:Eurocrypt’95, pp.209-219, 1995. [20]H.W. Lee and T.Y. Kim,“Fair Blind Signature with Message Recovery Based on Oblivious Transfer Protocol,” Journal of KISS (A) (Computer Systems and Theory), vol.26, no.4, pp.455-463, 1999. [21]C. I. Fan and C.L. Lei,“An User Efficient Fair E-Cash Scheme for Untraceable Electronic,”Journal of Information Science and Engineering,accepted, 2000. [22]P.L. Yu and C.L. Lei,”An User Efficient Fair E-cash Scheme with Anonymous Certificates,”Electrical and Electronic Technology, 2001. TENCON. Proceedings of IEEE Region 10 International Conference, Vol.1,74-77,2001. [23]W.B. Lee, K.C. Liao and Y.H. Hsiao,“The Security of User Efficient E-cash Scheme with Anonymous Certificates,”ISC2002 pp.247-250, 2002. [24]G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik., “A Practical and Provably Secure Coalition-Resistant Group Signature Scheme,”In Advances in Cryptology - CRYPTO 2000. volume 1880 of LNCS, pages 255-270,Springer Verlag, 2000. [25]Certicom Corp.: [26]Sun Microsystems, Inc.: [27]Sun Microsystems, Inc., Java Language: [28]Object Management Group, Inc., UML: [29]Wikipedia,the free encyclopedia, Model-view-controller: [30]Wikipedia,the free encyclopedia, Secure electronic transaction:
隨著網際網路的蓬勃發展,各種電子商務與網路交易也漸趨頻繁,而相對的,資訊安全的概念也日益重要且受到重視。目前已有許多密碼學理論運用在實際作業上,用以達到資訊安全的需求,例如RSA演算法以及橢圓函數密碼學(Elliptic Curve Cryptography;ECC)。盲簽章(Blind Signature)理論自1982年Chaum提出後,陸續有許多學者提出改良與應用。而為改善盲簽章可能存在的缺失,Stadler等人亦於1995提出新公平盲簽章(Fair Blind Signature)的概念,而後雖有許多理論針對公平盲簽章做改良,但相較於RSA與ECC,公平盲簽章被應用於實際作業仍算少數。適切的理論運用於適切的作業,不僅能增加系統的安全性,更能增進系統的效能。盲簽章理論被提出後,主要提及可運於無記名投票、電子競標及電子現金等系統。所以我們利用其特性,將他應用於網路招標系統的投標驗標作業,並進行實作。在廠商投標時對其投標文件作簽章,並於驗標時對投標文件及簽章作驗證,以證明其有參與投標。僅以公平盲簽章本身的特性,即可達到網路招標系統投標驗標作業的多項安全需求,並驗證了公平盲簽章理論於實際系統應用的可行性,提供了一個簡單可行的投標驗標作業。

Cryptography theories have been applied to many web-applications as the solutions to reach the level of security in demand. Blind Signature Theory was introduced in 1982. After that many other experts together introduced a new concept, which is called Fair Blind Signature to improve the weakness of the Blind Signature Theory. Although many enhancements were made after Fair Blind Signature Theory's first introduction, its applications are still rare. However, we believe that Blind Signature Theory can substantially improve the system security and performance if it applies to a suitable application such as anonymous poll system, e-auction and e-cash etc. Therefore, We propose and implement a web-based auction system in which we applied the blind signature theory. We build a web-based auction system that can be achieved by purely applying Blind Signature Theory. The result of the implementation shows that blind signature theory is feasible and could easily applied to a web-based auction system.
其他識別: U0005-2606200711510400
Appears in Collections:電機工程學系所

Show full item record

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.