A Secure Threshold Paillier Proxy Signature Scheme

碩士 === 國立臺灣海洋大學 === 資訊工程學系 === 96 === In this thesis, a threshold Paillier proxy signature scheme is proposed. The additive homomorphism of the Paillier cryptosystem, together with the proxy mechanism and the threshold trust make it more convenient than other probabilistic cryptosystems in designing...

Full description

Bibliographic Details
Main Authors: Jun-Hui Wu, 吳俊輝
Other Authors: Pei-Yih Ting
Format: Others
Language:en_US
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/84084357643690893338
id ndltd-TW-096NTOU5392006
record_format oai_dc
spelling ndltd-TW-096NTOU53920062016-04-27T04:11:24Z http://ndltd.ncl.edu.tw/handle/84084357643690893338 A Secure Threshold Paillier Proxy Signature Scheme 一種安全的門檻式Paillier代理簽章機制 Jun-Hui Wu 吳俊輝 碩士 國立臺灣海洋大學 資訊工程學系 96 In this thesis, a threshold Paillier proxy signature scheme is proposed. The additive homomorphism of the Paillier cryptosystem, together with the proxy mechanism and the threshold trust make it more convenient than other probabilistic cryptosystems in designing electronic voting systems or electronic auction systems. In this thesis, this scheme is proven to be unforgeabile, proxy-protected, undeniabile, secret and signer-identi?able against chosen message attackers in the random oracle model. These security properties of this scheme are based on the computational composite residuosity assumption. Pei-Yih Ting 丁培毅 2008 學位論文 ; thesis 63 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立臺灣海洋大學 === 資訊工程學系 === 96 === In this thesis, a threshold Paillier proxy signature scheme is proposed. The additive homomorphism of the Paillier cryptosystem, together with the proxy mechanism and the threshold trust make it more convenient than other probabilistic cryptosystems in designing electronic voting systems or electronic auction systems. In this thesis, this scheme is proven to be unforgeabile, proxy-protected, undeniabile, secret and signer-identi?able against chosen message attackers in the random oracle model. These security properties of this scheme are based on the computational composite residuosity assumption.
author2 Pei-Yih Ting
author_facet Pei-Yih Ting
Jun-Hui Wu
吳俊輝
author Jun-Hui Wu
吳俊輝
spellingShingle Jun-Hui Wu
吳俊輝
A Secure Threshold Paillier Proxy Signature Scheme
author_sort Jun-Hui Wu
title A Secure Threshold Paillier Proxy Signature Scheme
title_short A Secure Threshold Paillier Proxy Signature Scheme
title_full A Secure Threshold Paillier Proxy Signature Scheme
title_fullStr A Secure Threshold Paillier Proxy Signature Scheme
title_full_unstemmed A Secure Threshold Paillier Proxy Signature Scheme
title_sort secure threshold paillier proxy signature scheme
publishDate 2008
url http://ndltd.ncl.edu.tw/handle/84084357643690893338
work_keys_str_mv AT junhuiwu asecurethresholdpaillierproxysignaturescheme
AT wújùnhuī asecurethresholdpaillierproxysignaturescheme
AT junhuiwu yīzhǒngānquándeménkǎnshìpaillierdàilǐqiānzhāngjīzhì
AT wújùnhuī yīzhǒngānquándeménkǎnshìpaillierdàilǐqiānzhāngjīzhì
AT junhuiwu securethresholdpaillierproxysignaturescheme
AT wújùnhuī securethresholdpaillierproxysignaturescheme
_version_ 1718248759452762112