盲签名与环签名的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字签名技术作为保证信息完整性和身份认证的重要工具,已成为信息安全的一个重要机制。在现实应用中,为适应不同环境的需要,产生了许多特种签名方案,如:群签名、环签名、盲签名、代理签名、门限签名等。其中盲签名,由于它能够保障签名申请者的匿名性,所以在电子现金和电子选举中有广泛的应用前景。而环签名解决了对签名者完全匿名性的问题,也取得了广泛的应用。
     本文首先对密码学知识进行了简单介绍,包括:数字签名的基础知识,盲签名与环签名的研究背景、发展状况与现实意义。此外,叙述了密码学及数论的相关知识。
     其次,作者在阅读大量国内外文献的基础上,在盲签名与环签名方面做了一些有益的探索和尝试,主要取得了以下研究成果:
     1、给出了一个完全盲签名方案,此方案是基于ELGmanl盲签名体制。
     2、把代理签名和盲签名相结合,得到了一个代理盲签名方案。
     3、把盲签名和环签名相结合,得到了一个环盲签名方案。
     4、把前向安全特性和主密钥机制引入环签名,给出了一个前向安全环签名。
     5、介绍了电子商务的相关知识,并将盲签名方案具体应用到电子现金中,提出了一个基于失败---终止数字签名的离线电子系统和一个具有完全盲性和前向安全特性的电子现金系统方案。
     最后,简单介绍了环签名的应用及环签名的研究方向。
Digital signature technology to ensure information integrity and identity as an important tool for certification has become an important mechanism for information security.In real applications, to meet the needs of different environments, result in a number of special signature scheme. such as: group signature, ring signature, blind signature, proxy signature, threshold signatures. Blind signature, due to its ability to protect the anonymity of those who sign up for them, electronic cash and electronic elections have broad application prospects. The ring signature on the signer to solve completely anonymous in nature, also has been made a wide range of applications.
     In this paper, knowledge of cryptography has a brief introduction, including: the basic knowledge of digital signatures , the research background of blind signatures and ring signatures , development status and practical significance. In addition, describes the relevant knowledge of cryptography and elementary number theory.
     Secondly, the author read a large number domestic and foreign literature . In the blind signature and ring signature has done some useful explorations and attempts to achieve the following key findings:
     1、Give a completely blind signature scheme. This program is based on blind signature system ELGmanl.
     2、Combinating proxy signature with blind signature , give a proxy blind signature schemes.
     3、Give a blind ring signature scheme on blind signature and ring signature combination.
     4、Through introducing forward security and master key mechanism into ring signature,a forward security ring signature was obtained.
     5、Introduced the e-commerce knowledge, and blind signature schemes are specifically applicable to electronic cash. A digital signature based on the failure --- off-line electronic systems and a fully blind and prior security features of e-cash System program were given.
     Finally, a brief introduction of the ring signature applications and ring signature research.
引文
[1]Diffie W,Hellman ME.New directions in cryptography[J].IEEE Transactions on Information Theory.1976,IT—22(6):644—654
    [2][美]D.R.斯延森著.密码学——理论和实践[M].张文政译.成都:国防科学技术保密通信重点实验室,1997
    [3]Kim S,Rark S,Won D.proxy signatures:Revisited[A].ICICS’97,LNCS#1334[C] Springer—Verlag,223—232
    [4]Chaum D. Blind signature for untraceable payments[A].Proc,Crypto’82[C].New York:Plenum press,1983:199—203
    [5].HChaumD.HeystE.V>Groupsibnatures[A].AdvancesinCryptology—Eurocrypto’91,LNCS 547[C].berlin:Springer—nerlag,1991:257—265
    [6]GAteniese,JCameniseh,MJoye.GTsudik.APractiealandProvablysecureeoalition一resistant grouPsignatureseheme,AdvaneesinCryPtology一CryPto’2000,LNCS1880.Berlin:Springer- Verlag2000:255一270.
    [7]J.Camenisch,M.Stadler.EffieientgrouPsignaturesehemesforlargegrouPs〔C],KaliskiBS,edit, AdvaneesinCryPtology一EUROCRYPT’97,LNCS1294.Berlin:SPringer-Verlag,1997:410一24
    [8]JanCamenisch,MarkusMiehels.A group signature scheme with improved efficiency [C],Kazuo Ohta,DinqyiPei,editors,AdvaneesinCryPtology一ASLACRYPT,98,LNCS1514.Berlin: Springer一Verlag,1998:160一174.
    [9]ChenL , PedersenT.New group signature schemes [C] , Advances in Cryptology一EUROCRYPT’1994,LNCS950.Berlin:SPnnger-Veriag,1995:171一181.
    [10]R.Cramer,1.Damgard,B.Sehoenmakers.Proofs of Partial knowledge and Simplified design of witness hiding Protocols.In:Advances in Cryptology:CryPto’94,Lecture Notes in Computer Science 839,Berlin:Springer,1994,174一187.
    [11]R.Rvest A.Shamir,and Y.Tauman.How to leak a secret.In:Advance in CryPtology:ASIACRYPT2001,Lecture Notes in Computer Science2 248,Berlin:Springer,2001,552一565.
    [12]R.L.Rivest,A.Shamir,and Y.Tauman.How to leak a Secret.In Colin Boyd,editor,Advance s in Cryptology一AsIACRPT2001, 7 thInternational Confer-ence on the Theory and Application of Cryptology and Information Security,Gold Coast,Australia,Decemeber 9一13,2001,Proeeedings,volume 2248 of Lecture Notes in Computer Science,pages 552一565.Springer,2001.
    [13]M.Abe,M.Ohkubo,K.Suzuki.1一out一of-n signatures from a variety of keys[A]LNCS 2501,Asiacrypt 2002[C」.Berlin:Springer-Verlag,2002.415一423
    [14]Fang Zhang , Kwangjo Kim.ID一based blind signature and ring signature from pairings[A].LNCS 2501,Asiacrypt 2002[C].Berlin:Springer一Verlag,2002.533一574.
    [15]Emmanuel Bresson,Jacques stern,Michael Szydlo.Threshold ring signature for ad-hoc groups[A].LNCS 2442,Cryptology一2002[C].Berlin:Springer-Verlag,2002.465一480.
    [16]J·Lv,X.Wang ,Verifiable Ring Signature[A].In Proc,of DMS 2003.The 9 thInternational Conference on Distributed Multimedia Systems,Pages 663一667,2003.
    [17]}Jing Xu,Zhenfeng Zhang,and Dengguo Feng.A Ring Signature Scheme US-ing Bilinear Pairings. In Chae Hoon Lim and Moti Yung,editors.Information Security Applications 5 th International Workshop,WISA 2004,Reviesd Papers,volume 3325 of Lecture Notes in Computer Science,pages 163一172,Jeju Island,Korea,August 2004.Springer-Verlag.
    [18]ShermanS.M.Chow,Joseph K.Liu and Tsz Hon Yuen,Ring signatures with-out Random Orcales,http://eprint.iacr.org/2005/317.
    [19]朱文余,孙琦.计算机密码应用基础[M].北京:科学出版社,2004
    [20]Diffle,w. And Hellman,M New Directions in Cryptography,IEEE Trans,Inform Theory,1976,Vol,IT-22(6):644-654
    [21]李勇.盲数字签名理论及其应用研究:[硕士学位论文].武汉:武汉大学,2003.
    [22]徐光宝.盲签名方案及其应用研究:[硕士学位论文].陕西:陕西师范大学,2005.4
    [23]闵嗣鹤,严士健.初等数论[M]高等教育出版社,北京,2003,12
    [24]B.Preneel,Analysis and Design of Crytographic Hash Functions,PH.D dissertation,Katholike Universiteit Leuven,Jan,1993
    [25]Bruce Schneier著(吴世忠、祝世雄等译).应用密码学协议、算法与C源程序.北京:机械工业出版社,2003
    [26]D.chaum,"Blind signatures for Untrace-able payments".Advance in cryptology:Proceedings of crypto 82, plenum press,1983,PP.199-203
    [27]《应用密码学》吴世忠等编。
    [28]《信息系统与安全理论技术》。蔡勉卫宏儒主编,北京工业大学出版社。
    [29]D。Chaum,"security without Identification:Transaction systems to Make Big Brother.Obsolete" communications of the ACM,V.28,n.10.Otc 1985,PP.1030-1044
    [30]ElGamal T.A public—key cryptosystem and a signatures scheme based on discrete logarithms[J].IEEE Transations on Information Theory,1985,31(4):469—472
    [31]一种新的具有双重性质的盲签名方案,作者:邵立勇,李志斌。
    [32] M an boM,U suda K,Okamoto E. Proxy signatures fordelegation signingoperation[C], Proceedings of the Third ACM Conference on Computerand Communication Security,New Delh,i India, January 1996: 48-57.
    [33] Kim S, Park S,Won D. Proxy signatures, revisited[C], ICICS_97, inLecture Notes in Computer Science, 1334, Springer, Berlin, 1997:223-232.
    [34]伊丽江,白国强,肖国镇.代理多重签名:一类新的代理签名方案[J].电子学报, 2001, 29(4): 569-570.
    [35]伊丽江,白国强.代理签名体制及其应用研究[D].西安:西安电子科技大学, 2000.
    [36]李方伟,谭利平,邱成刚。基于离散对数的代理盲签名[j]重庆邮电大学移动通信重点实验室。2008.
    [37]LIN W D,JAN J K.A security personal learning tools usinga proxy blind signature scheme[C]//Proceedings of International Conference on Chinese Language Computing. Illinois,USA:[s.n.],2000:173-177.
    [38]TAN Zuo-wen,LIU Zhuo-jun,TANG Chun-ming.A proxyblind signature scheme based on DLP[J].Journal ofSoftware,2003,14(11):1931-1935
    [39]SUN H,HSIEH B.On the security of some proxy blindsignature schemes[C]//Australasian Information SecurityWorkshop(AISW2004).New Zealand:Dunedin,2004:75-78.
    [40]WANG Shao-bin,HONG Fan,CUI Guo-hua.Secureefficient proxy blind signature schemes based DLP[C]//Proceedings of the Seventh IEEE International Conferenceon E-Commerce Technology(CEC’05).[S.l.]:IEEE,2005:452-455
    [41]D.Chaum.Untraceable Electronic Mail Return Addresses .and Digital Pseudonyms. Comm . ACM24:84--88,1981.
    [42]D.Chaum.Blind Signatures for Untraceable Payments.Advances inCryPtology一CryPto,82,SPringer-Verlag,PP.199ee203,1983.
    [43]D.Chaum,A.Fiat,M.Naor.Untraceable Electronic Cash. Advances inCryPtology一CryPto,88,LNCS403,SPringer-Verlag,PP.319--327,1988.
    [44]Wen一ShengJuang and Chin一LaungLei.A Secure and Practical Electronic Voting Scheme for Real World Environments.TIEICE:IEICE Transactions on Communications/Electronies/Information and Systems,E80A(l):64一71,1997.
    [45]J.Lenti , 1.Lovanyi and A.Nagy.Blind Signature Based Steganographic ProtocolIEEE International Workshop on Intelligent Signal Processing,2001.
    [46]F.Zhang,K.Kim,ID一based blind signature and ring signature from Pairings,Advances in Cryptology一Asiacrpt2002,LNCS2501,SPringer-Verlag,PP.533一547,2002.
    [47].P.Sehnorr,Security of blind discrete log signatures against interactive attacks,ICICS2001,LNCS2229,SPringer一Verlag,PP.l一12,2001.
    [48]D.Wagner,A generalized birthday Problem,AdvaneesinCryPtology一Crypto2002,LNCS2442,SPringer-Verlag,PP.288一303,2002.
    [49]F.Zhang,K.Kim,EfficientID一based blind signature and Proxy signature from Bilinear Pairings,Proc.of ACISP2003(The 8th Australasian Conference on Information Security and Privacy),LNCS2727,SPringer-Verlag,PP.312一323,2003.
    [50]Z .Huang,K.Chen and Y.Wang,Efficient Identity一Based Signatures and Blind 5ignatures,CANS2005,LNCS3810,SPringer-Verlag,PP.120一133,2005.
    [51]A.Lysyanskaya and Z.Ramzan.Group Blind Digital Signature:A ScalableSolution to Electronic Cash.In:HitsehfeldR , ed.Financial Cryptography Conference , LNCS1465 ,SPringer-Verlag,PP.184--197,1998.
    [52]S.Brands.Untraceable Off-line Cash in Wallet with observers.Advances in Cryptology一CryPto,93,LNCS773,SPringer-Verlag,PP.302一318.1993
    [53].J.Cameniseh,J.M.Piveteau,and M.Stadler.Fair Blind Signatures.In Eurocrypt95,LNCS921,SPringer-Verlag,PP.209一219,1995.
    [54]GMaitlandandC.Boyd.Fair electronic cash based on a group signature scheme In:Proceeding of Information Security and Cryptography(ICICS,01),LNCS2229,Springer一Verlag,PP.461一65,2001.
    [55]A.Bender,J.Katz,and R.Morselli.Ring signatures:stronger definitions,and Constructions without random oracles.InS.Halevi and T.Rabin,editors,Theory of Cryptography一TCC2006,LNCS3876,SPringer-Verlag,PP.66-79,2006.
    [56]C.Lin and T.Wu An Identity一Based Ring Signature Scheme from Bilinear Pairings.Cryptology ePrint Archive,RePort2003/11,available at http://ePrint.iacr.org 2003.
    [57]Koyama K.A master key for the RSA public—key cryptosrstem[J]IEICE Transactions on Information and Systems,1982,J65 D(2):163—170
    [58]蔡伟鸿,邓宇乔.一个具有前向安全性的电子现金系统[J].计算机工程与应用,2007,43(7):152—154
    [59]R.Anderson.Two remarks on public key cryptology[C].In:Fourth Annual Conference on Computer and Communications Security,ACM,1997
    [60]M Bellare,S Miner.A forward—secure digital signature scheme[C].In:Advance in Cryptology—Crypto’99,volume 1666 of Lecture Notes of Computer Science,1999: 431—448
    [61]秦波,王尚平,王晓峰等.一种新的前向安全可证实数字签名[J].计算机研究与发展,2003,40(7):1016—1020
    [62]吴克力,王庆梅,刘玉凤.一个具有前向安全的数字签名方案[J].计算机研究与发展,2003,24(9):42—47
    [63]李虓,何明星.基于RSA的前向安全的数字签名[J].计算机工程与应用.2006. 16:124—125
    [64]ITKIS G,REYIIN L SiBIR:signer—base intrusion—resilient signatures[C]// Proceedings of the zznd. Annual International Cryptology Conference on Advances in Cryptology.London Springer—Verlag 2002:499—514
    [65]Desmedt Y,Frankel Y.Threshold cryptosystems[A].Brassard G.Advance in Crytolo gy—CRYPTO’89,Lecture Notes in,Computer Science Vol.435[C].Berlin:Springer—V erlag,1989,307—315
    [66]Shamir A.How to share a secret[J].Comm of the ACM,1979,22:612—613
    [67]杨义先,钮心忻,詹梓华,杨放春.电子商务的安全问题[ J].世界电信.1999, 18—20
    [68]Brands S,An efficiente off-line electronic cash system based on the representation problem[C].CWI Technical Report CS_R9323,1993
    [69]Chaum D,Fait A,Naor M.untraceable electronic cash.Advance in CRYPTO’88,LNCS403[C].1990:319—327
    [70]Okamoto T,Ohta K.Uninersal electronoce cash.In Advance in CRYPYO’91[C]. Springer Verlag,1992:324—327
    [71]帅青红电子现金支付问题分析[J]西南民族大学学报.2007,33(3):576—579
    [72]Chaum D. Blind signature for untraceable payments[A].Proc,Crypto’82[C].New York:Plenum press,1983: 199-203
    [73]蔡伟鸿,邓宇乔.一个具有前向安全性的电子现金系统[J].计算机工程与应用,2007,43(7):152—154
    [74]Chaum D,Fait A,Naor M.untraceable electronic cash.Advance in CRYPTO’88,LNCS403[C].1990:319—327
    [75]Okamoto T,Ohta K.Uninersal electronoce cash.In Advance in CRYPYO’91[C].Springer Verlag,1992:324-327
    [76]苏云学,祝跃飞.一个前向安全的电子货币系统[J].计算机学报.2004,27(1): 136—139
    [77]洪泽勤,曾俊杰,钟旭,陆浪如.基于ElGamal的强盲签名方案[J].信息工程大学学报.2004,5(4):18—19
    [78]ZHANG F G,REIHANEH S N,LIN C Y.New Proxy Signature,Proxy blind signature and proxy ring signature schemes from bilinear pairings[EB/OL].http://eprint.iacr.org/2003/104,2003.
    [79]CHAN T K,FUNG K,LIU J K,et al.Blind spontaneous anonymous group signatures for ad hoc groups[A].ESAS 2004[C].Springer-Verlag,2005.82-94.
    [80]WU Q H,ZHANG F G,SUSILO W,etal.An efficient static bling ring signature scheme[A].ICISC 2005[C].Springer-Verlag,2006.410-423.
    [81]LV J Q,REN K,CHEN X,et al.Ring authenticated encryption:a newtype of authenticated encryption[A].The 2004 Symposium on Crypto-graphy and Information Security[C].Sendai,Japan,2004.1179-1184
    [82]BRESSON E,STERN J,SZYDLO M.Threshold ring signatures and applications to ad-hoc groups[A].Proc CRYPTO’02[C].Springer-Verlag,2002.465-480.
    [83]ISSHIKI T,TANAKA K.An(n-t)-out-of-n threshold ring signature scheme[A].ACISP 2005[C].Springer-Verlag,2005.406-416.
    [84]CHOW S S M,LIU J K,WEI V K,et al.Ring signature without random Oracles[EB/OL].http://eprint.iacr.org/2005/317/,2005.
    [85]]LEI Q,JIANG Z T,WANG Y M.Ring-based anonymous finger printing scheme[A].CIS 2005[C].Springer-Verlag,2005.1080-1085.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700