Research of Proxy Signature with Restricted Times of Delegation

碩士 === 國立中央大學 === 資訊工程學系 === 101 === Proxy signature, a type of digital signature, allows the original signer to authorize the proxy signer to sign documents on behalf of the original signer and this practical function becomes useful for many applications. However, unlimited delegation of signing c...

Full description

Bibliographic Details
Main Authors: Jian-Hong Wang, 王建鋐
Other Authors: Sung-Ming Yen
Format: Others
Language:en_US
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/43266249738941708431
id ndltd-TW-101NCU05392018
record_format oai_dc
spelling ndltd-TW-101NCU053920182015-10-13T22:06:55Z http://ndltd.ncl.edu.tw/handle/43266249738941708431 Research of Proxy Signature with Restricted Times of Delegation 具次數限制的代理簽章之研究 Jian-Hong Wang 王建鋐 碩士 國立中央大學 資訊工程學系 101 Proxy signature, a type of digital signature, allows the original signer to authorize the proxy signer to sign documents on behalf of the original signer and this practical function becomes useful for many applications. However, unlimited delegation of signing capability might lead to security concern. If a proxy signer generates inappropriate proxy signatures with bad intention during the delegation period, the original signer may suffer great losses. To address the aforementioned issue, Choi et al. proposed a modified Schnorr signature scheme with restricted signing capability and recently Hong et al. proposed a multiple-times proxy signature scheme based on the DSA scheme. In this paper, we point out that Choi et al.'s scheme fails to satisfy strong unforgeability of the ordinary proxy signature scheme. We also demonstrate a security flaw of Hong et al.'s scheme. In addition to pointing out the flaws of these schemes, we further improve Hong et al.'s method. And we think that his method is also applicable to Schnorr signature scheme. Hence, we propose Schnorr-based proxy signature scheme with restricted times of delegation by the improved Hong et al.'s method. The above schemes are based on the discrete logarithm problem. The related research based on the factoring large integer problem has not been proposed. Hence, in this thesis, we propose an RSA-based proxy signature with restricted times of delegation. In addition to satisfying all the basic security requirements, our scheme is more efficient than Hong et al.'s scheme in the signing and verification phases. Sung-Ming Yen 顏嵩銘 2013 學位論文 ; thesis 43 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立中央大學 === 資訊工程學系 === 101 === Proxy signature, a type of digital signature, allows the original signer to authorize the proxy signer to sign documents on behalf of the original signer and this practical function becomes useful for many applications. However, unlimited delegation of signing capability might lead to security concern. If a proxy signer generates inappropriate proxy signatures with bad intention during the delegation period, the original signer may suffer great losses. To address the aforementioned issue, Choi et al. proposed a modified Schnorr signature scheme with restricted signing capability and recently Hong et al. proposed a multiple-times proxy signature scheme based on the DSA scheme. In this paper, we point out that Choi et al.'s scheme fails to satisfy strong unforgeability of the ordinary proxy signature scheme. We also demonstrate a security flaw of Hong et al.'s scheme. In addition to pointing out the flaws of these schemes, we further improve Hong et al.'s method. And we think that his method is also applicable to Schnorr signature scheme. Hence, we propose Schnorr-based proxy signature scheme with restricted times of delegation by the improved Hong et al.'s method. The above schemes are based on the discrete logarithm problem. The related research based on the factoring large integer problem has not been proposed. Hence, in this thesis, we propose an RSA-based proxy signature with restricted times of delegation. In addition to satisfying all the basic security requirements, our scheme is more efficient than Hong et al.'s scheme in the signing and verification phases.
author2 Sung-Ming Yen
author_facet Sung-Ming Yen
Jian-Hong Wang
王建鋐
author Jian-Hong Wang
王建鋐
spellingShingle Jian-Hong Wang
王建鋐
Research of Proxy Signature with Restricted Times of Delegation
author_sort Jian-Hong Wang
title Research of Proxy Signature with Restricted Times of Delegation
title_short Research of Proxy Signature with Restricted Times of Delegation
title_full Research of Proxy Signature with Restricted Times of Delegation
title_fullStr Research of Proxy Signature with Restricted Times of Delegation
title_full_unstemmed Research of Proxy Signature with Restricted Times of Delegation
title_sort research of proxy signature with restricted times of delegation
publishDate 2013
url http://ndltd.ncl.edu.tw/handle/43266249738941708431
work_keys_str_mv AT jianhongwang researchofproxysignaturewithrestrictedtimesofdelegation
AT wángjiànhóng researchofproxysignaturewithrestrictedtimesofdelegation
AT jianhongwang jùcìshùxiànzhìdedàilǐqiānzhāngzhīyánjiū
AT wángjiànhóng jùcìshùxiànzhìdedàilǐqiānzhāngzhīyánjiū
_version_ 1718072824318394368