| 研究生: |
黃倍輝 Huang, Pei-Hui |
|---|---|
| 論文名稱: |
可選擇代理群之代理簽章 Generalized Proxy Signatures |
| 指導教授: |
黃宗立
Hwang, Tzonelih |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 資訊工程學系 Department of Computer Science and Information Engineering |
| 論文出版年: | 2005 |
| 畢業學年度: | 93 |
| 語文別: | 中文 |
| 論文頁數: | 69 |
| 中文關鍵詞: | 簽章 、代理簽章 |
| 外文關鍵詞: | signature, proxy signature |
| 相關次數: | 點閱:80 下載:2 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在數位化的時代,資訊是非常容易遭到複製以及發生偽造或欺騙的情形,因此須要有一套機制來解決此類爭議。目前大多利用數位簽章技術對數位化資料進行認可與保證。
傳統數位簽章中,只有簽章者本身能夠產生有效之數位簽章。某些情況下,簽章者無法親自產生數位簽章,須交由代理人簽署,代理簽章技術因而產生。原始的代理簽章都是原始簽署者授權給一個代理人來代理簽署文件,然而,當原始簽章者是一個十分重要的人物,為了防止代理權被濫用,原始簽章者可能不願意只將代理權力賦予單一個代理人。基於上述的考量,多代理人之代理簽章技術因而產生。在現實環境中,一家公司的主管可能要將簽章簽署權力授予下屬,但是,為了避免簽署權力遭濫用及符合分層負責之原則,主管可選擇特定代理人群體代理簽署。但是綜觀現今之多代理人之代理簽章,並無法解決上述之問題。
本論文著眼於上述之問題,因此,提出了一種新型態的多代理人之代理簽章,稱之為『可選擇代理群之代理簽章』。可選擇代理群之代理簽章是指,原始簽章者可將簽署簽章之權力授予一代理人群體,在此代理人群體中,可依簽署權力細分為代理人子群,每一代理人子群皆可產生有效之代理簽章。
除此之外,本論文亦將可選擇代理群之代理簽章所使用之金鑰管理概念加以延伸,提出了一般化之門檻值簽章與一般化門檻值之密碼系統概念,以期擴大應用之範圍。
[1] G.R Blakley, “Safeguarding cryptographic keys”, in Proc. NCC Vol48, 1979, pp. 535-541.
[2] T. S. Chen, Y. F. Chung, and K. H. Huang, “A traceable proxy multisignature scheme based on the elliptic curve cryptosystem,” Applied Mathematics and Computation, Vol.159, Issue 1, 2004, pp.137-145.
[3] T. S. Chen, Y. F. Chung, and G. S. Huang, “Efficient proxy multisignature schemes based on the elliptic curve cryptosystem”, Computer & Security, Vol.22,No 6, 2003, pp.527-534.
[4] G.I Davida, R.a.Demillo and R.J. Lipton, “Protecting shared cryptographic keys”, in Proc. Symp. on Security and Privacy, IEEE Computer Soc. Press, Silver Spring, MD, 1980, pp. 100-102..
[5] W. Diffie and M. E. Hellman, “New Directions in Cryptography.” IEEE Trans. on Information Theory, Vol. IT-22, No.6, Nov, 1976. pp.644-654.
[6] T. ElGamal, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms”, Advances in Cryptology-CRYPTO'84, Springer-Verlag, LNCS 196, 1985, pp.10-18.
[7] Sun, Hung-Min, “An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers”, Computer Communications, Vol.22, 1999, pp.717-722.
[8] H. M. Sun, “On Proxy Multisignature scheme”, Proceedings of the International Computer Symposium, 2000, pp.65-72.
[9] S. Kim, S. Park and D. Won, “Proxy signatures, revisited”. ICICS'97, Lecture Notes in Computer Science 1334, Springer-Verlag, 1997, pp. 223-232.
[10] N. Koblitz, “Elliptic curve cryptosystems”, Mathematics of Computation, 48,1985, pp 203-209.
[11] X. Lai, J. Massey, “A Proposal for a New Block Encryption Standard”, Advances in Cryptology-EUROCRYPT'90, Springer-Verlag, LNCS 473, 1991, pp.389-404.
[12] M. Mambo, K. Usuda, and E. Okamoto, “Proxy Signatures for Delegation Signing Operation,” Proc. Third ACM Conf. on Computer and Communications Security, 1996, pp. 48-57.
[13] M. Mambo, K. Usuda, and E. Okamoto, “Proxy Signatures: Delegation of the Power to Sign Message,” IEICE Trans. Fundamentals, Vol. E79-A, No. 9, Sep. 1996, pp. 1338-1353.
[14] V. Miller, “Use of elliptic curves in cryptography”, Advances in Cryptology- CRYPTO’85, Lecture Notes in Computer Science, 218,1985, pp.417-426.
[15] R.L. Rivest, “The MD5 Message Digest Algorithm”, Apr 1992,RFC 1321.
[16] R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM, V.21, n.2, Feb 1978, pp.120-126.
[17] R.L. Rivest, A. Shamir and Y. Tauman, “How to leak a secret”, Advances in Cryptology-Asiacrypt 2001, Spring-Verlag, LNCS 2248, 2001, pp. 552-565.
[18] A. Shamir, “How to share a secret”, Communications of the ACM, Vol.22, 1979, pp. 612-613.
[19] Zuhua Shao, “Proxy signature schemes based on factoring”, Information Processing Letters 85, 2003, pp.137-143.
[20] William Stalling, “Network and Network Security – Principles and Practice”, Prentice Hall International Edition, 1995, pp.1-14.
[21] S. J. Wang, “Direct construction of a secret in generalized group-oriented cryptography”, Computer Standards & Interfaces, 2004, pp455-460.
[22] L. Yi, G. Bai and G. Xiao, “Proxy multi-signature scheme: A new type of proxy signature scheme”, Electronics Letters, vol.36, no.6, 2000, pp.527-528.
[23] K. Zhang, “Threshold Proxy Signature Schemes,” 1997 Information Security Workshop, Janpan, Sep. 1997, pp. 191-199.
[24] NBS FIPSPUB 46, Data Encryption Standard, National Bureau of Standards, U.S. Department of Commerce, Jan 1997.
[25] NIST FIPS PUB 180-1, “Secure Hash Standard”, National Institute of Standards and Technology, U.S. Department of Commerce, Apr 1995.
[26] 資訊安全通訊 Vol.7 No.3, June 2001.
[27] 經濟部建置電子商務法制環境http://www.esign.org.tw/default.asp
[28] 國立台灣科技大學電子商務研究中心:教育部製商整合計畫-密碼學與資訊安全http://ecrg.ba.ntust.edu.tw/edu.htm