A Secure Threshold Paillier Proxy Signature Scheme
碩士 === 國立臺灣海洋大學 === 資訊工程學系 === 96 === In this thesis, a threshold Paillier proxy signature scheme is proposed. The additive homomorphism of the Paillier cryptosystem, together with the proxy mechanism and the threshold trust make it more convenient than other probabilistic cryptosystems in designing...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/84084357643690893338 |
id |
ndltd-TW-096NTOU5392006 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096NTOU53920062016-04-27T04:11:24Z http://ndltd.ncl.edu.tw/handle/84084357643690893338 A Secure Threshold Paillier Proxy Signature Scheme 一種安全的門檻式Paillier代理簽章機制 Jun-Hui Wu 吳俊輝 碩士 國立臺灣海洋大學 資訊工程學系 96 In this thesis, a threshold Paillier proxy signature scheme is proposed. The additive homomorphism of the Paillier cryptosystem, together with the proxy mechanism and the threshold trust make it more convenient than other probabilistic cryptosystems in designing electronic voting systems or electronic auction systems. In this thesis, this scheme is proven to be unforgeabile, proxy-protected, undeniabile, secret and signer-identi?able against chosen message attackers in the random oracle model. These security properties of this scheme are based on the computational composite residuosity assumption. Pei-Yih Ting 丁培毅 2008 學位論文 ; thesis 63 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣海洋大學 === 資訊工程學系 === 96 === In this thesis, a threshold Paillier proxy signature scheme is proposed. The additive homomorphism of the Paillier cryptosystem, together with the proxy mechanism and the threshold trust make it more convenient than other probabilistic cryptosystems in designing electronic voting systems or electronic auction systems. In this thesis, this scheme is proven to be unforgeabile, proxy-protected, undeniabile, secret and signer-identi?able against chosen message attackers in the random oracle model. These security properties of this scheme are based on the computational composite residuosity assumption.
|
author2 |
Pei-Yih Ting |
author_facet |
Pei-Yih Ting Jun-Hui Wu 吳俊輝 |
author |
Jun-Hui Wu 吳俊輝 |
spellingShingle |
Jun-Hui Wu 吳俊輝 A Secure Threshold Paillier Proxy Signature Scheme |
author_sort |
Jun-Hui Wu |
title |
A Secure Threshold Paillier Proxy Signature Scheme |
title_short |
A Secure Threshold Paillier Proxy Signature Scheme |
title_full |
A Secure Threshold Paillier Proxy Signature Scheme |
title_fullStr |
A Secure Threshold Paillier Proxy Signature Scheme |
title_full_unstemmed |
A Secure Threshold Paillier Proxy Signature Scheme |
title_sort |
secure threshold paillier proxy signature scheme |
publishDate |
2008 |
url |
http://ndltd.ncl.edu.tw/handle/84084357643690893338 |
work_keys_str_mv |
AT junhuiwu asecurethresholdpaillierproxysignaturescheme AT wújùnhuī asecurethresholdpaillierproxysignaturescheme AT junhuiwu yīzhǒngānquándeménkǎnshìpaillierdàilǐqiānzhāngjīzhì AT wújùnhuī yīzhǒngānquándeménkǎnshìpaillierdàilǐqiānzhāngjīzhì AT junhuiwu securethresholdpaillierproxysignaturescheme AT wújùnhuī securethresholdpaillierproxysignaturescheme |
_version_ |
1718248759452762112 |