by Wah-Kit Chan. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. / Includes bibliographical references (leaves 84-87). / Abstracts in English and Chinese. / Acknowledgement --- p.i / Abstract of thesis entitled: --- p.ii / 摘要 --- p.iii / List of Tables --- p.vii / List of Figures --- p.viii / Chapter 1. --- Introduction --- p.1 / Chapter 1.1 --- Preview of this thesis --- p.1 / Chapter 1.1.1 --- What is Signcryption? --- p.2 / Chapter 1.1.2 --- What is Proxy? --- p.2 / Chapter 1.1.3 --- What is Threshold? --- p.2 / Chapter 1.2 --- Development Timelines --- p.3 / Chapter 1.3 --- Recent progress on signcryption --- p.4 / Chapter 1.4 --- Organization of this thesis --- p.5 / Chapter 2. --- Introduction to Cryptography --- p.6 / Chapter 2.1 --- Cryptographic Primitives --- p.7 / Chapter 2.1.1 --- Symmetric Cryptography --- p.7 / Chapter 2.1.2 --- Asymmetric Cryptography --- p.8 / Chapter 2.1.3 --- Digital Signature --- p.8 / Chapter 2.1.4 --- Hash Function --- p.9 / Chapter 2.1.5 --- Digital Certificate --- p.10 / Chapter 2.1.6 --- Zero Knowledge Proof --- p.10 / Chapter 2.2 --- Discrete Logarithm Based Crypto system --- p.11 / Chapter 2.2.1 --- ElGamal Public and Private Key Generation Algorithm --- p.11 / Chapter 2.2.2 --- ElGamal Encryption Algorithm --- p.12 / Chapter 2.2.3 --- ElGamal Decryption Algorithm --- p.12 / Chapter 2.3 --- Integer Factorization Based Cryptosystem --- p.13 / Chapter 2.3.1 --- RSA Public and Private Key Generation algorithm --- p.13 / Chapter 2.3.2 --- RSA Encryption Algorithm --- p.14 / Chapter 2.3.3 --- RSA Decryption Algorithm --- p.14 / Chapter 2.4 --- Digital Signature --- p.14 / Chapter 2.4.1 --- RSA based Digital Signature --- p.15 / Chapter 2.4.2 --- ElGamal Digital Signature Scheme --- p.16 / Chapter 2.4.3 --- Digital Signature Standard --- p.17 / Chapter 2.4.4 --- Shortened Digital Signature Scheme --- p.20 / Chapter 2.4.5 --- Nyberg-Rueppel Digital Signature Scheme --- p.20 / Chapter 2.4.6 --- Schnorr Digital Signature Scheme --- p.21 / Chapter 2.5 --- Diffie-Hellman Key Exchange --- p.22 / Chapter 2.6 --- Blind Signature --- p.23 / Chapter 2.6.1 --- Overview --- p.23 / Chapter 2.6.2 --- Blinded Nyberg-Rueppel Digital Signature Scheme --- p.23 / Chapter 2.6.3 --- Discussion on Blind Signature Scheme --- p.24 / Chapter 2.7 --- Threshold Scheme --- p.24 / Chapter 2.7.1 --- Secret Sharing Scheme --- p.25 / Chapter 2.7.2 --- Petersen's Verifiable Secret Sharing Scheme --- p.26 / Chapter 3. --- Introduction to Signcryption --- p.27 / Chapter 3.1 --- "Traditional ""Signature-then-Encryption"" Scheme" --- p.28 / Chapter 3.1.1 --- Signature-then-Encryption based on RSA --- p.28 / Chapter 3.1.2 --- Signature-then-Encryption based on DSS + ElGamal Encryption --- p.29 / Chapter 3.1.3 --- Signature-then-Encryption based on Schnorr signature + ElGamal encryption --- p.30 / Chapter 3.2 --- Zheng's Digital Signcryption Scheme --- p.31 / Chapter 3.3 --- Proxy Signcryption Scheme --- p.32 / Chapter 3.4 --- Improved Digital Signcryption Scheme --- p.34 / Chapter 4. --- A Threshold Signcryption Scheme --- p.36 / Chapter 4.1 --- "A(t, n)-Threshold Signcryption Scheme" --- p.36 / Chapter 4.1.1 --- Scheme Description --- p.37 / Chapter 4.1.2 --- Validity Analysis --- p.40 / Chapter 4.1.3 --- Security Analysis --- p.43 / Chapter 4.2 --- "A (n, n)-Threshold Signcryption Scheme with Improved Complexity" --- p.45 / Chapter 4.2.1 --- Scheme Description --- p.45 / Chapter 4.2.2 --- Validity Analysis --- p.48 / Chapter 4.2.3 --- Security Analysis --- p.50 / Chapter 5. --- A Threshold Proxy Signcryption Scheme --- p.51 / Chapter 5.1 --- "A (t, n)-Threshold Proxy Signcryption Scheme" --- p.52 / Chapter 5.1.1 --- Scheme Description --- p.52 / Chapter 5.1.2 --- Validity Analysis --- p.57 / Chapter 5.1.3 --- Security Analysis --- p.59 / Chapter 5.2 --- "A (n, n)-Threshold Proxy Signcryption Scheme with Improved Complexity" --- p.61 / Chapter 5.2.1 --- Scheme Description --- p.61 / Chapter 5.2.2 --- Validity Analysis --- p.64 / Chapter 5.2.3 --- Security Analysis --- p.65 / Chapter 6. --- A Non-Repudiated Threshold Proxy Signcryption Scheme --- p.67 / Chapter 6.1 --- Non-repudiated Proxy Shares Generation --- p.68 / Chapter 6.2 --- Rushing Attack --- p.70 / Chapter 6.3 --- Non-repudiated and Un-cheatable Proxy Shares Generation --- p.72 / Chapter 6.4 --- "An Un-cheatable and Non-repudiated (t, n) Threshold Proxy Signcryption" --- p.76 / Chapter 6.4.1 --- Scheme Description --- p.76 / Chapter 6.4.2 --- Validity Analysis --- p.78 / Chapter 6.4.3 --- Security Analysis --- p.79 / Chapter 7. --- Conclusions --- p.81 / Appendix --- p.83 / Papers Derived from this thesis: --- p.83 / Bibliography --- p.84
Identifer | oai:union.ndltd.org:cuhk.edu.hk/oai:cuhk-dr:cuhk_323969 |
Date | January 2002 |
Contributors | Chan, Wah-Kit., Chinese University of Hong Kong Graduate School. Division of Information Engineering. |
Source Sets | The Chinese University of Hong Kong |
Language | English, Chinese |
Detected Language | English |
Type | Text, bibliography |
Format | print, viii, 87 leaves : ill. ; 30 cm. |
Rights | Use of this resource is governed by the terms and conditions of the Creative Commons “Attribution-NonCommercial-NoDerivatives 4.0 International” License (http://creativecommons.org/licenses/by-nc-nd/4.0/) |
Page generated in 0.0019 seconds