Two results on spontaneous anonymous group signatures.
Chan Kwok Leong. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2005. === Includes bibliographical references (leaves 72-78). === Abstracts in English and Chinese. === Chapter 1 --- Introduction --- p.1 === Chapter 2 --- Preliminaries --- p.4 === Chapter 2.1 --- Notation --- p.4 === Chapt...
Other Authors: | |
---|---|
Format: | Others |
Language: | English Chinese |
Published: |
2005
|
Subjects: | |
Online Access: | http://library.cuhk.edu.hk/record=b5892643 http://repository.lib.cuhk.edu.hk/en/item/cuhk-325409 |
Summary: | Chan Kwok Leong. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2005. === Includes bibliographical references (leaves 72-78). === Abstracts in English and Chinese. === Chapter 1 --- Introduction --- p.1 === Chapter 2 --- Preliminaries --- p.4 === Chapter 2.1 --- Notation --- p.4 === Chapter 2.2 --- Cryptographic Primitives --- p.5 === Chapter 2.2.1 --- Symmetric Key Cryptography --- p.5 === Chapter 2.2.2 --- Asymmetric Key Cryptosystem --- p.6 === Chapter 2.2.3 --- Secure Hash Function --- p.7 === Chapter 2.2.4 --- Digital Signature --- p.8 === Chapter 2.2.5 --- Digital Certificate and Public Key Infrastructure --- p.8 === Chapter 2.3 --- Provable Security and Security Model --- p.9 === Chapter 2.3.1 --- Mathematics Background --- p.9 === Chapter 2.3.2 --- One-Way Function --- p.10 === Chapter 2.3.3 --- Candidate One-way Functions --- p.12 === Chapter 2.4 --- Proof Systems --- p.15 === Chapter 2.4.1 --- Zero-knowledge Protocol --- p.15 === Chapter 2.4.2 --- Proof-of-Knowledge Protocol --- p.17 === Chapter 2.4.3 --- Honest-Verifier Zero-Knowledge (HVZK) Proof of Knowl- edge Protocols (PoKs) --- p.18 === Chapter 2.5 --- Security Model --- p.19 === Chapter 2.5.1 --- Random Oracle Model --- p.19 === Chapter 2.5.2 --- Generic group model (GGM) --- p.20 === Chapter 3 --- Signature Scheme --- p.21 === Chapter 3.1 --- Introduction --- p.21 === Chapter 3.2 --- Security Notation for Digital Signature --- p.23 === Chapter 3.3 --- Security Proof for Digital Signature --- p.24 === Chapter 3.3.1 --- Random Oracle Model for Signature Scheme --- p.24 === Chapter 3.3.2 --- Adaptive Chosen Message Attack --- p.24 === Chapter 3.4 --- Schnorr Identification and Schnorr Signature --- p.25 === Chapter 3.4.1 --- Schnorr's ROS assumption --- p.26 === Chapter 3.5 --- Blind Signature --- p.27 === Chapter 4 --- Spontaneous Anonymous Group (SAG) Signature --- p.30 === Chapter 4.1 --- Introduction --- p.30 === Chapter 4.2 --- Background --- p.30 === Chapter 4.2.1 --- Group Signature --- p.30 === Chapter 4.2.2 --- Threshold Signature --- p.31 === Chapter 4.3 --- SAG signatures --- p.33 === Chapter 4.4 --- Formal Definitions and Constructions --- p.35 === Chapter 4.4.1 --- Ring-type construction --- p.36 === Chapter 4.4.2 --- CDS-type construction --- p.36 === Chapter 4.5 --- Discussion --- p.37 === Chapter 5 --- Blind Spontaneous Anonymous Signature --- p.39 === Chapter 5.1 --- Introduction --- p.39 === Chapter 5.2 --- Definition --- p.40 === Chapter 5.2.1 --- Security Model --- p.41 === Chapter 5.2.2 --- Definitions of security notions --- p.41 === Chapter 5.3 --- Constructing blind SAG signatures --- p.43 === Chapter 5.3.1 --- Blind SAG signature: CDS-type [1] --- p.43 === Chapter 5.3.2 --- "Blind SAG signature: ring-type [2, 3]" --- p.44 === Chapter 5.4 --- Security Analysis --- p.44 === Chapter 5.4.1 --- Multi-key parallel one-more unforgeability of blind signature --- p.45 === Chapter 5.4.2 --- Security of our blind SAG signatures --- p.47 === Chapter 5.5 --- Discussion --- p.49 === Chapter 6 --- Linkable Spontaneous Anonymous Group Signature --- p.51 === Chapter 6.1 --- introduction --- p.51 === Chapter 6.2 --- Related work --- p.51 === Chapter 6.3 --- Basic Building Blocks --- p.52 === Chapter 6.3.1 --- Proving the Knowledge of Several Discrete Logarithms --- p.53 === Chapter 6.3.2 --- Proving the Knowledge of d Out of n Equalities of Discrete Logarithms --- p.55 === Chapter 6.4 --- Security Model --- p.57 === Chapter 6.4.1 --- Syntax --- p.57 === Chapter 6.4.2 --- Notions of Security --- p.59 === Chapter 6.5 --- Our Construction --- p.63 === Chapter 6.5.1 --- An Linkable Threshold SAG Signature Scheme --- p.63 === Chapter 6.5.2 --- Security --- p.65 === Chapter 6.5.3 --- Discussions --- p.67 === Chapter 7 --- Conclusion --- p.70 === Bibliography --- p.72 |
---|