City University of Hong Kong

CityU Institutional Repository >
3_CityU Electronic Theses and Dissertations >
ETD - Dept. of Computer Science  >
CS - Master of Philosophy  >

Please use this identifier to cite or link to this item:

Title: Nominative signature : applications, security models and constructions
Other Titles: Ren ming qian zhang : ying yong, an quan mo xing ji ju ti jian gou
任命簽章 : 應用, 安全模型及具體建構
Authors: Liu, Yan Wang Dennis (廖忻宏)
Department: Dept. of Computer Science
Degree: Master of Philosophy
Issue Date: 2007
Publisher: City University of Hong Kong
Subjects: Computer security
Digital signatures
Notes: CityU Call Number: QA76.9.A25 L588 2007
Includes bibliographical references (leaves 109-120)
Thesis (M.Phil.)--City University of Hong Kong, 2007
vi, 123 leaves : ill. ; 30 cm.
Type: Thesis
Abstract: A signer in a Nominative Signature (NS) scheme can arbitrarily choose a nominee, then jointly generate a signature in such a way that the signature can only be verified with the nominee’s consent and the nominator cannot check or prove to others the validity of the signature. Since its introduction in 1996, there have been only a few constructions proposed and all of them have already been found flawed. In addition, there is no formal security model defined for nominative signature. Even more problematic, there is no convincing application proposed. Due to these problems, the research of nominative signature has almost stalled and it is unknown if a secure nominative signature scheme can be built or there exists an application for it. In this thesis, we investigate these problems and provide positive answers to them. First, we find that nominative signature has more desirable properties for building a user certification system than universal designated-verifier signature which is originally believed to be one of the best implementations of the user certification system. Second, we propose a suite of formal definitions and rigorous security models for nominative signature. Third, we construct four concrete nominative signature schemes. We show that all of our constructions are efficient and suitable for different target applications. In addition, all the constructions are proven secure under the adversarial models we defined.
Online Catalog Link:
Appears in Collections:CS - Master of Philosophy

Files in This Item:

File Description SizeFormat
fulltext.html159 BHTMLView/Open
abstract.html159 BHTMLView/Open

Items in CityU IR are protected by copyright, with all rights reserved, unless otherwise indicated.


Valid XHTML 1.0!
DSpace Software © 2013 CityU Library - Send feedback to Library Systems
Privacy Policy · Copyright · Disclaimer