首页--工业技术论文--无线电电子学、电信技术论文--通信论文--通信保密与通信安全论文--理论论文

Research on the Digital Signature Based on ECC and Bilinear Pairings

摘要第8-12页
ABSTRACT第12-16页
Symbol and Abbreviation第17-18页
Chapter 1 Introduction第18-25页
    1.1 Digital Signature System第18-21页
        1.1.1 The Main One-way Function in Public Key Cryptography第18-19页
        1.1.2 Public Key System第19-20页
        1.1.3 Digital Signature System第20-21页
    1.2 ECC第21-22页
        1.2.1 Ellipse Curve in the Finite Field第21页
        1.2.2 Characteristic of ECC第21-22页
    1.3 Hash Function第22-23页
    1.4 The Contribution of This Thesis第23-25页
Chapter 2 New Signature Schemes based on ECC第25-39页
    2.1 Introduction of Several Special Digital Signature第25-26页
    2.2 proxysignature, blind signature and multisignature第26-29页
        2.2.1 proxysignature第26-27页
        2.2.2 Blind Signature Based on Schnorr and Nyberg-Rueppel Signature第27-28页
        2.2.3 Multi-signature第28-29页
    2.3 Introduction of Proxy-multi signature and multi- proxy multi- signature第29-31页
        2.3.1 Prdxy-multi signature第29-30页
        2.3.2 Multi-proxy multi-signature第30页
        2.3.3 Proxy-multi signature and multi-proxy multi-signature Reseach Actuality第30-31页
    2.4 New proxy Blind Multi-signature Scheme第31-34页
        2.4.1 System Parameter and User Parameter第31页
        2.4.2 Proxy Key Generation第31-32页
        2.4.3 Proxy Blind Multi-Signature Generation第32页
        2.4.4 Verification第32-33页
        2.4.5 Correctness第33页
        2.4.6 Security Analysis第33-34页
    2.5 New Multi-Proxy Blind Multi-Signature Scheme第34-37页
        2.5.1 System Parameters and User Parameters第34页
        2.5.2 Multi-proxy Key Generation第34-35页
        2.5.3 Multi-proxy Blind Multi-signature Generation第35页
        2.5.4 Verification第35-36页
        2.5.5 Correctness第36页
        2.5.6 Security Analysis第36-37页
    2.6 Conclusion第37-39页
Chapter 3 New Proxy Signature Schemes Based on Bilinear Pairings第39-55页
    3.1 Proxy Signature Status第39-41页
    3.2 Introduction of Bilinear pairings第41-44页
        3.2.1 Difinition and Properties of Bilinear Pairings第41-42页
        3.2.2 Corresponding Assumption第42-43页
        3.2.3 System Parameter & Users Parameter第43-44页
    3.3 Proxy Signature proposed by Z.Fangguo[61]第44-45页
        3.3.1 Proxy Key Generation第44页
        3.3.2 Proxy Signature Generation第44页
        3.3.3 Verification第44-45页
    3.4 New Proxy Signature第45-48页
        3.4.1 Proxy Key Generation第45页
        3.4.2 New Proxy Signature Generation第45页
        3.4.3 Verification第45页
        3.4.4 Correctness第45-46页
        3.4.5 Security Analysis第46-47页
        3.4.6 Advantages第47-48页
    3.5 New Proxy Multi-signature第48-49页
        3.5.1 Proxy Key Generation第48页
        3.5.2 New Proxy Multi-signature第48页
        3.5.3 Verification第48页
        3.5.4 Correctness第48-49页
        3.5.5 Security Analysis第49页
    3.6 New Multi-proxy Signature第49-51页
        3.6.1 Proxy Key Generation第49-50页
        3.6.2 Multi-Proxy Signature Generation第50页
        3.6.3 Verification第50页
        3.6.4 Correctness第50页
        3.6.5 Security Analysis第50-51页
    3.7 Multi-Proxy Multi-signature第51-52页
        3.7.1 Proxy Key Generation第51页
        3.7.2 Multi-Proxy Multi-signature Generation第51-52页
        3.7.3 Verification第52页
        3.7.4 Correctness第52页
        3.7.5 Security Analysis第52页
    3.8 The Advantages of Three New Schemes Above第52-54页
    3.9 Conclusion第54-55页
Chapter 4 New Blind Signature Schemes Based on Bilinear Pairings第55-65页
    4.1 Introduction第55-56页
        4.1.1 The Conception of Blind Signature第55页
        4.1.2 Type of Blind Signature第55-56页
    4.2 Analysis of Signature Scheme proposed by J.Jiahui and L.Daxing第56-58页
        4.2.1 The Multi-Proxy Blind Signature Scheme proposed by Ji-Jiahui第56-58页
        4.2.2 The Problem of Signature Scheme Proposed by Ji-Jiahui第58页
    4.3 New Multi-Proxy Blind Signature第58-61页
        4.3.1 Proxy Secret Key Generation第59页
        4.3.2 New Multi-Proxy Blind Signature Generation第59页
        4.3.3 Verification第59-60页
        4.3.4 Correctness Proof第60页
        4.3.5 Security Analysis第60-61页
    4.4 New Multi-Proxy Blind Multi-Signature第61-63页
        4.4.1 Proxy Secret Key Generation第61-62页
        4.4.2 New Multi-Proxy Blind Multi-Signature Generation第62页
        4.4.3 Verification第62页
        4.4.4 Correctness Proof第62-63页
        4.4.5 Security Analysis第63页
    4.5 Conclusion第63-65页
Chapter 5 New threshold signature scheme based on bilinear pairings第65-76页
    5.1 Research Status第65-67页
    5.2 Verification Secret Protocol (VSS)第67-68页
    5.3 New Threshold Signature Scheme第68-72页
        5.3.1 The Main Idea of New Scheme第68页
        5.3.2 Symbols第68页
        5.3.3 Secret Initialization Distribution (SID)第68-69页
        5.3.4 Verification Secret Redistribution (VSR)第69-70页
        5.3.5 Threshold Signature Protocol (TSS)第70页
        5.3.6 Threshold Signature Verification (TSV)第70页
        5.3.7 Correctness Proof.第70-72页
    5.4 New Threshold Blind Signature第72-74页
        5.4.1 Threshold Blind Signature Protocol(TBSP)第72-73页
        5.4.2 Verification第73页
        5.4.3 Correctness Proof第73-74页
        5.4.4 Security Analysis第74页
    5.5 Conclusion第74-76页
Chapter 6 New Threshold Group Signature第76-88页
    6.1 Group Signature Introduction第76页
    6.2 Threshold Group Signature第76-78页
        6.2.1 Threshold Group Signature Introduction第76-77页
        6.2.2 Threshold Group Signature Research Status第77-78页
    6.3 X-Y Threshold Group Signature Scheme and Analysis第78-81页
        6.3.1 X-Y Threshold Group Signature Scheme第78-80页
            6.3.1.1 System Initialization第78-79页
            6.3.1.2 unit signature generation第79-80页
            6.3.1.3 Threshold Group Signature Generation第80页
            6.3.1.4 Threshold Group Signature Verification and Identity Tracing第80页
        6.3.2 X-Y Threshold Group Signature Scheme Analysis第80-81页
    6.4 New Threshold Group Signature第81-86页
        6.4.1 System Initialization第81-82页
        6.4.2 Unit Signature Generation第82-83页
        6.4.3 Threshold Group Signature Generation第83页
        6.4.4 Threshold Group Signature Verification第83-84页
        6.4.5 System Updating第84页
        6.4.6 Correctness Proof第84-85页
        6.4.7 Efficiency and Security Analysis of New Scheme第85-86页
    6.5 Conclusion第86-88页
Reference第88-97页
Appreciation第97-98页
在读期间参与科研项目情况第98-99页
博士学习期间发表论文情况第99-100页
学位论文评阅及答辩情况表第100页

论文共100页,点击 下载论文
上一篇:Characterization of a Novel Salt Tolerant Bacterium Gracilibacillus sp. GTY and Its Performance of Dye Decolorization
下一篇:人胸膜间皮细胞水通道蛋白的表达及其调控