Dissertation > Excellent graduate degree dissertation topics show

Research and Implementation of Direct Anonymous Authentication Base on Goppa Codes

Author: ZhuHuiJun
Tutor: LiZiChen
School: Henan Polytechnic University
Course: Computer Applications
Keywords: trusted computing trusted computing module Goppa codes direct anonymous authentication
CLC: TP309
Type: Master's thesis
Year: 2009
Downloads: 32
Quote: 0
Read: Download Dissertation

Abstract


At present, information security issues become increasingly complex due to the rapid development of information technology. In trusted computing, trusted computing technology is increasingly becoming a new researched focus in the field of information security, it is to solve security issues. Trusted Computing Platform is consisted by the computer’s hardware and software entities in addressing information security risks. The user’s privacy protection is an essential factor in the credibility of the system. Computer terminal security is an important guarantee for the protection of users’privacy. Anonymous authentication is the important functions of trusted computing platform, it protects the users’privacy better, while it has become a current research focus.This paper studies the key technology of digital signatures, especially for the blind signature technology conducted in-depth study. In the analysis on the basis of several blind signature, based on Goppa codes and McEliece public key cryptosystem,this paper proposed a new blind signature schemes - The blind signature scheme based on McEliece public key cryptosystem, and does the analysis of the program’s security.Secondly, this paper deeply studies the direct anonymous authentication scheme, such as: its’research background, stage of development, implementation mechanisms and specific agreements. At present, direct anonymous authentication program is mostly based on large integer factorization and discrete logarithm problem.However, with the emergence of quantum computers, We can go to solve large integer factorization and discrete logarithm problem that we can’t do before.Therefore, the traditional post-quantum (Post-Quantum) encryption technology becomes hotspot.After researching Goppa codes and McEliece public key cryptosystem, combining Goppa codes with the direct anonymous authentication scheme, this paper proposes a direct anonymous authentication system based on Goppa codes, at the same time does the analysis of the new program’s security.

Related Dissertations

  1. The special trusted computing research and design of the network,TP393.08
  2. UEFI-based trust chain design and implement TPM driver,TP311.1
  3. File Protection System Research Based on Hardware Assisted Virtualization,TP309
  4. Trusted Platform on Research and Implementation of copyright protection model,TP309
  5. Design and Implementation of a Bytecode-based Software Monitoring and Trusted Evolution Framework,TP311.52
  6. Authentication Based on Trusted Computing Research and Implementation,TP393.08
  7. Udisk trust chain dynamic tracking technology research and implementation,TP309
  8. Research and Implementation of PrivacyCA System in Trusted Computing,TP393.08
  9. Based on Trusted Computing intranet information security research,TP393.08
  10. Design and Analysis of Some Security Protocols Based on CPK in Trusted Computing Environment,TP309
  11. TCG Software Stack (TSS) Specification Analysis and Implementation,TP309
  12. Research on Trust Model in Ad Hoc Network,TN929.5
  13. Research and Application of Trust Computing in Direct Power Purchase for Large Consumers,F426.61
  14. The Research and Implementation of Trusted Security Enchancement System Based on USBKey,TP393.08
  15. Design and Implementation of Testing System for Trusted Computing Platform,TP311.53
  16. Design and Implementation of Testing System for Trusted Platform Module,TP309
  17. Research on Function Model of Trusted Computing Mechanism in Vista,TP309
  18. Research on Digital Rights Management Based on Trusted Mobile Platform,TP309
  19. The Design and Research of Secure Communication about COP,TN919.2
  20. Using Cryptography to Guarantee the Safety of Internet Bank,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality
© 2012 www.DissertationTopic.Net  Mobile