English  |  正體中文  |  简体中文  |  Items with full text/Total items : 62835/95882 (66%)
Visitors : 4187648      Online Users : 519
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/34164


    Title: 植基於個人識別的公鑰系統下之自主式變色龍簽章
    Other Titles: Id-based chameleon signature determine by signer
    Authors: 洪晟維;Hung, Sheng-wei
    Contributors: 淡江大學資訊管理學系碩士班
    李鴻璋;Lee, Hung-chang
    Keywords: 變色龍簽章;環簽章;雜湊函數;陷門;植基於個人識別;Chameleon signature;Ring signature;trapdoor;ID-Based
    Date: 2009
    Issue Date: 2010-01-11 04:59:19 (UTC+8)
    Abstract: 數位簽章近年發展漸趨成熟,但亦能利用特殊的簽章方案來因應特殊情況下傳統簽章所無法達成的效果與特性。
    變色龍簽章是一種基於離散對數的非交互式數位簽章方案,以傳統簽章為基礎,在雜湊函數上使用特殊的變色龍雜湊函數,能夠在出現有疑慮的簽署碼時,可利用兩組碰撞的簽署碼,透過變色龍雜湊函數運算產生更多的碰撞簽署碼以質疑該簽章的正確性,進而否認該簽章內容。
    改良變色龍簽章方案時,為了擁有更輕便的金鑰分發,將變色龍簽章改採用植基於個人識別的公鑰系統;為了使簽章者擁有主動否認簽章內容之能力,將原先使用接收者或公正第三方之金鑰轉換為使用簽章者之金鑰;為了強化其不可轉讓性而採用雙重簽章方法;綜合而成的簽章方案稱為植基於個人識別的公鑰系統下之自主式變色龍簽章。
    該簽章可應用於針對特定接收者之可驗證的秘密透漏,並與將環簽章應用於匿名的秘密透漏做比較評估;最後實作植基於個人識別的公鑰系統下之自主式變色龍簽章系統,以驗證此簽章方案之可行性。
    Chameleon Signature was introduced to enhance the confidentiality and privacy of electronic transactions. By adopting Chameleon Signature, the recipient can not disclose the contents of the signed information to any third party without the signer''s consent. In order to improve the un-forgeability, non-transferability, and efficiency of Chameleon Signature, this paper proposed a modified ID-based Chameleon Signature scheme Determined by Signer, called ICS scheme. ICS has some advantages including (1) the signer can deny the signatures give to the recipient by himself, (2) non-transferability is improved by using double signature, and (3) providing a relaxing public key infrastructure. From the implementing and evaluating the ICS scheme, we prove that the design of our proposed ICS scheme is feasible.
    Appears in Collections:[Graduate Institute & Department of Information Management] Thesis

    Files in This Item:

    File SizeFormat
    0KbUnknown257View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback