Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | 이향숙 | - |
dc.contributor.author | 김은미 | - |
dc.creator | 김은미 | - |
dc.date.accessioned | 2016-08-25T04:08:20Z | - |
dc.date.available | 2016-08-25T04:08:20Z | - |
dc.date.issued | 2006 | - |
dc.identifier.other | OAK-000000012520 | - |
dc.identifier.uri | https://dspace.ewha.ac.kr/handle/2015.oak/179069 | - |
dc.identifier.uri | http://dcollection.ewha.ac.kr/jsp/common/DcLoOrgPer.jsp?sItemId=000000012520 | - |
dc.description.abstract | Threshold ring signature schemes에서는 t명의 구성원이 임의로 n-t명을 선택하여 실제 t명의 서명자들을 익명으로 하면서 누구나 확증할 수 있는 t-out-of-n ring 서명을 만들 수 있다. 이 서명의 spontaneity은 mobile ad-hoc networks과 같은 ad-hoc groups에서 유용하다. 이 노눈에서 저자는 두 번 pairing 계산량을 갖는 identity based threshold ring singnature scheme을 제안하였다. 이 scheme의 안전성은 computational Diffie-Hellman assumption에 기반을 두고 있으며 저자는 random oracle model상에서 제안한 scheme의 안전성을 증명하였다.;In threshold ring signature schemes, any group of t entities spontaneously conscripts arbitrarily n-t entities to generate a publicly veriffiable t-out-of-n signature on behalf of the whole group, yet the actual signers remain anonymous. The spontaneity of these schemes is desirable for ad-hoc groups such as mobile ad-hoc networks. In this paper, we construct an identity based threshold ring signature scheme. Our scheme achieved a constant number of pairing computations. The security of our threshold ring signature is based on the Computational Diffie-Hellman assumption. We prove security of our system in the random oracle model. | - |
dc.description.tableofcontents | 1. Introduction = 1 2. Preliminaries = 2 2.1 Bilinear Pairing and Gap Diffie-Hellman Groups = 2 2.2 The Splitting Lemma = 3 3. Identity Based Threshold Ring Signature = 4 3.1 Framework of ID-Based Threshold Ring signature = 4 3.2 Formal Security Model = 5 4. Our Proposed Scheme = 7 4.1 Basic Construction = 7 4.2 Robustness = 8 5. Analysis of the Proposed Scheme = 9 5.1 Consistency = 9 5.2 Efficiency = 9 5.3 Existential Unforgeability = 10 5.4 Signer Ambiguity = 15 6. Conclusion = 16 References = 17 논문초록 = 19 | - |
dc.format | application/pdf | - |
dc.format.extent | 478251 bytes | - |
dc.language | eng | - |
dc.publisher | 이화여자대학교 대학원 | - |
dc.title | Efficient Identity Based Threshold Ring Signature | - |
dc.type | Master's Thesis | - |
dc.creator.othername | Kim, Eun-Mi | - |
dc.format.page | ii, 19 | - |
dc.identifier.thesisdegree | Master | - |
dc.identifier.major | 대학원 수학과 | - |
dc.date.awarded | 2006. 8 | - |