Chan Kwok Leong. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2005. / Includes bibliographical references (leaves 72-78). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- Preliminaries --- p.4 / Chapter 2.1 --- Notation --- p.4 / Chapter 2.2 --- Cryptographic Primitives --- p.5 / Chapter 2.2.1 --- Symmetric Key Cryptography --- p.5 / Chapter 2.2.2 --- Asymmetric Key Cryptosystem --- p.6 / Chapter 2.2.3 --- Secure Hash Function --- p.7 / Chapter 2.2.4 --- Digital Signature --- p.8 / Chapter 2.2.5 --- Digital Certificate and Public Key Infrastructure --- p.8 / Chapter 2.3 --- Provable Security and Security Model --- p.9 / Chapter 2.3.1 --- Mathematics Background --- p.9 / Chapter 2.3.2 --- One-Way Function --- p.10 / Chapter 2.3.3 --- Candidate One-way Functions --- p.12 / Chapter 2.4 --- Proof Systems --- p.15 / Chapter 2.4.1 --- Zero-knowledge Protocol --- p.15 / Chapter 2.4.2 --- Proof-of-Knowledge Protocol --- p.17 / Chapter 2.4.3 --- Honest-Verifier Zero-Knowledge (HVZK) Proof of Knowl- edge Protocols (PoKs) --- p.18 / Chapter 2.5 --- Security Model --- p.19 / Chapter 2.5.1 --- Random Oracle Model --- p.19 / Chapter 2.5.2 --- Generic group model (GGM) --- p.20 / Chapter 3 --- Signature Scheme --- p.21 / Chapter 3.1 --- Introduction --- p.21 / Chapter 3.2 --- Security Notation for Digital Signature --- p.23 / Chapter 3.3 --- Security Proof for Digital Signature --- p.24 / Chapter 3.3.1 --- Random Oracle Model for Signature Scheme --- p.24 / Chapter 3.3.2 --- Adaptive Chosen Message Attack --- p.24 / Chapter 3.4 --- Schnorr Identification and Schnorr Signature --- p.25 / Chapter 3.4.1 --- Schnorr's ROS assumption --- p.26 / Chapter 3.5 --- Blind Signature --- p.27 / Chapter 4 --- Spontaneous Anonymous Group (SAG) Signature --- p.30 / Chapter 4.1 --- Introduction --- p.30 / Chapter 4.2 --- Background --- p.30 / Chapter 4.2.1 --- Group Signature --- p.30 / Chapter 4.2.2 --- Threshold Signature --- p.31 / Chapter 4.3 --- SAG signatures --- p.33 / Chapter 4.4 --- Formal Definitions and Constructions --- p.35 / Chapter 4.4.1 --- Ring-type construction --- p.36 / Chapter 4.4.2 --- CDS-type construction --- p.36 / Chapter 4.5 --- Discussion --- p.37 / Chapter 5 --- Blind Spontaneous Anonymous Signature --- p.39 / Chapter 5.1 --- Introduction --- p.39 / Chapter 5.2 --- Definition --- p.40 / Chapter 5.2.1 --- Security Model --- p.41 / Chapter 5.2.2 --- Definitions of security notions --- p.41 / Chapter 5.3 --- Constructing blind SAG signatures --- p.43 / Chapter 5.3.1 --- Blind SAG signature: CDS-type [1] --- p.43 / Chapter 5.3.2 --- "Blind SAG signature: ring-type [2, 3]" --- p.44 / Chapter 5.4 --- Security Analysis --- p.44 / Chapter 5.4.1 --- Multi-key parallel one-more unforgeability of blind signature --- p.45 / Chapter 5.4.2 --- Security of our blind SAG signatures --- p.47 / Chapter 5.5 --- Discussion --- p.49 / Chapter 6 --- Linkable Spontaneous Anonymous Group Signature --- p.51 / Chapter 6.1 --- introduction --- p.51 / Chapter 6.2 --- Related work --- p.51 / Chapter 6.3 --- Basic Building Blocks --- p.52 / Chapter 6.3.1 --- Proving the Knowledge of Several Discrete Logarithms --- p.53 / Chapter 6.3.2 --- Proving the Knowledge of d Out of n Equalities of Discrete Logarithms --- p.55 / Chapter 6.4 --- Security Model --- p.57 / Chapter 6.4.1 --- Syntax --- p.57 / Chapter 6.4.2 --- Notions of Security --- p.59 / Chapter 6.5 --- Our Construction --- p.63 / Chapter 6.5.1 --- An Linkable Threshold SAG Signature Scheme --- p.63 / Chapter 6.5.2 --- Security --- p.65 / Chapter 6.5.3 --- Discussions --- p.67 / Chapter 7 --- Conclusion --- p.70 / Bibliography --- p.72
Identifer | oai:union.ndltd.org:cuhk.edu.hk/oai:cuhk-dr:cuhk_325409 |
Date | January 2005 |
Contributors | Chan, Kwok Leong., Chinese University of Hong Kong Graduate School. Division of Information Engineering. |
Source Sets | The Chinese University of Hong Kong |
Language | English, Chinese |
Detected Language | English |
Type | Text, bibliography |
Format | print, vii, 78 leaves ; 30 cm. |
Rights | Use of this resource is governed by the terms and conditions of the Creative Commons “Attribution-NonCommercial-NoDerivatives 4.0 International” License (http://creativecommons.org/licenses/by-nc-nd/4.0/) |
Page generated in 0.0016 seconds