Research of Proxy Signature with Restricted Times of Delegation
碩士 === 國立中央大學 === 資訊工程學系 === 101 === Proxy signature, a type of digital signature, allows the original signer to authorize the proxy signer to sign documents on behalf of the original signer and this practical function becomes useful for many applications. However, unlimited delegation of signing c...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/43266249738941708431 |
id |
ndltd-TW-101NCU05392018 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-101NCU053920182015-10-13T22:06:55Z http://ndltd.ncl.edu.tw/handle/43266249738941708431 Research of Proxy Signature with Restricted Times of Delegation 具次數限制的代理簽章之研究 Jian-Hong Wang 王建鋐 碩士 國立中央大學 資訊工程學系 101 Proxy signature, a type of digital signature, allows the original signer to authorize the proxy signer to sign documents on behalf of the original signer and this practical function becomes useful for many applications. However, unlimited delegation of signing capability might lead to security concern. If a proxy signer generates inappropriate proxy signatures with bad intention during the delegation period, the original signer may suffer great losses. To address the aforementioned issue, Choi et al. proposed a modified Schnorr signature scheme with restricted signing capability and recently Hong et al. proposed a multiple-times proxy signature scheme based on the DSA scheme. In this paper, we point out that Choi et al.'s scheme fails to satisfy strong unforgeability of the ordinary proxy signature scheme. We also demonstrate a security flaw of Hong et al.'s scheme. In addition to pointing out the flaws of these schemes, we further improve Hong et al.'s method. And we think that his method is also applicable to Schnorr signature scheme. Hence, we propose Schnorr-based proxy signature scheme with restricted times of delegation by the improved Hong et al.'s method. The above schemes are based on the discrete logarithm problem. The related research based on the factoring large integer problem has not been proposed. Hence, in this thesis, we propose an RSA-based proxy signature with restricted times of delegation. In addition to satisfying all the basic security requirements, our scheme is more efficient than Hong et al.'s scheme in the signing and verification phases. Sung-Ming Yen 顏嵩銘 2013 學位論文 ; thesis 43 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中央大學 === 資訊工程學系 === 101 === Proxy signature, a type of digital signature, allows the original signer to authorize the proxy signer to sign documents on behalf of the original signer and this practical function becomes useful for many applications.
However, unlimited delegation of signing capability might lead to security concern. If a proxy signer generates inappropriate proxy signatures with bad intention during the delegation period, the original signer may suffer great losses. To address the aforementioned issue, Choi et al. proposed a modified Schnorr signature scheme with restricted signing capability and recently Hong et al. proposed a multiple-times proxy signature scheme based on the DSA scheme.
In this paper, we point out that Choi et al.'s scheme fails to satisfy strong unforgeability of the ordinary proxy signature scheme. We also demonstrate a security flaw of Hong et al.'s scheme. In addition to pointing out the flaws of these schemes, we further improve Hong et al.'s method. And we think that his method is also applicable to Schnorr signature scheme. Hence, we propose Schnorr-based proxy signature scheme with restricted times of delegation by the improved Hong et al.'s method.
The above schemes are based on the discrete logarithm problem. The related research based on the factoring large integer problem has not been proposed. Hence, in this thesis, we propose an RSA-based proxy signature with restricted times of delegation. In addition to satisfying all the basic security requirements, our scheme is more efficient than Hong et al.'s scheme in the signing and verification phases.
|
author2 |
Sung-Ming Yen |
author_facet |
Sung-Ming Yen Jian-Hong Wang 王建鋐 |
author |
Jian-Hong Wang 王建鋐 |
spellingShingle |
Jian-Hong Wang 王建鋐 Research of Proxy Signature with Restricted Times of Delegation |
author_sort |
Jian-Hong Wang |
title |
Research of Proxy Signature with Restricted Times of Delegation |
title_short |
Research of Proxy Signature with Restricted Times of Delegation |
title_full |
Research of Proxy Signature with Restricted Times of Delegation |
title_fullStr |
Research of Proxy Signature with Restricted Times of Delegation |
title_full_unstemmed |
Research of Proxy Signature with Restricted Times of Delegation |
title_sort |
research of proxy signature with restricted times of delegation |
publishDate |
2013 |
url |
http://ndltd.ncl.edu.tw/handle/43266249738941708431 |
work_keys_str_mv |
AT jianhongwang researchofproxysignaturewithrestrictedtimesofdelegation AT wángjiànhóng researchofproxysignaturewithrestrictedtimesofdelegation AT jianhongwang jùcìshùxiànzhìdedàilǐqiānzhāngzhīyánjiū AT wángjiànhóng jùcìshùxiànzhìdedàilǐqiānzhāngzhīyánjiū |
_version_ |
1718072824318394368 |