Loading...

Design of Intermediate-level Primitives for Electronic Voting and Multi-party Protocols

Rajabzadeh Asaar, Maryam | 2014

1338 Viewed
  1. Type of Document: Ph.D. Dissertation
  2. Language: Farsi
  3. Document No: 46423 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Salmasizadeh, Mahmoud
  7. Abstract:
  8. In this thesis, intermediate-level cryptographic primitives of multi-proxy multi-signatures and proxy signatures with message recovery with different applications in multi-party protocols such as electronic voting are considered. To save bandwidth, improve efficiency and ensure the accuracy of design, four factors: employing identity-based settings, independency of signature size to the number of signers in multi-proxy multi-signature schemes, transmission of signatures without messages in proxy signature schemes and presenting provable security are vital. On
    one hand, to take advantage of identity-based cryptosystems to improve efficiency, designing schemes without bilinear pairings is important.On the other hand, there is a trade-off between the signature-size and reducing the computational cost for efficient schemes of identity-based
    multi-proxy multi-signature schemes. In this thesis, concentrating on solving this trade-off, an efficient provably secure scheme for computational cost and signature-size is proposed for identity-based multi-proxy multi-signatures. Security of the scheme is based on the RSA (widely-accepted assumption) in the random oracle model and the paradigm used in design is sequential aggregation and because of this, the key exposure attack does not have any impact on it. Meanwhile, we show that other proposed schemes without bilinear pairings for these primitives are forgeable due to their improper security definitions and incorrect proofs. Furthermore, we show that the existing scheme for identity-based proxy signatures with message recovery is not short, and then, we present an efficient scheme for this primitive, and show that it is provably secure in the random oracle model under computational Diffie-Hellman assumption. We should highlight that the proposed scheme is the shortest scheme among previous identity-based proxy signature schemes
  9. Keywords:
  10. Random Oracle Model ; Provable Security ; Electronic Voting ; Identity Based Multi-Proxy Multi-signature ; Identity Based Proxy Signature with Message Recovery

 Digital Object List

 Bookmark

...see more