Dissertation > Excellent graduate degree dissertation topics show

Research on the Key Escrow Problem in Identity Based Cryptosystem

Author: JinZhengPing
Tutor: WenQiaoYan
School: Beijing University of Posts and Telecommunications
Course: Cryptography
Keywords: Identity-based public key cryptosystem Key escrow problem No certificate public key cryptosystem Signcrypted Proxy multi-signature Multi- proxy signature Provable security Random oracle model
CLC: TN918.1
Type: PhD thesis
Year: 2010
Downloads: 139
Quote: 1
Read: Download Dissertation


Identity-based public key cryptosystem, simplifying the traditional certificate-based cryptography key management, is the modern cryptography research hotspot. But the key escrow problem has been the existence of identity-based cryptography major flaw that seriously hindered the identity-based cryptography development and large-scale applications. This paper focuses on how to solve the problem of key escrow system expands to the theory of provable security methods and technologies as the main line, respectively, for identity-based public key cryptography and public key cryptography without a certificate under signcryption, proxy multi-signature scheme and multi-proxy signature scheme design and analysis. The main research results are as follows: 1. For a single private key generator (PKG) identity-based cryptography existing user private key distribution and custody issues, Barreto et al scheme is proposed based on a suitable multiple PKG environment based signcryption scheme. In terms of safety, the use of the random oracle model proved that the q-Strong Diffie-Hellman problem and q-bilinear Diffie-Hellman inversion problem difficulty based on the assumption that the scheme with message confidentiality and existential signature fake sex. Efficiency, compared with similar programs, we need fewer programs for operations, is by far the best of our knowledge the most efficient multi-PKG case of identity-based signcryption scheme. '2. Pointed out by Yu et al proposed an identity-based signcryption scheme does not meet the security requirements they claim that in the standard model can not achieve semantic security. Signcrypted use in plaintext to be embedded in a random string of ideas put forward an improved scheme, and proved in the standard model of this scenario in determining difficulties bilinear Diffie-Hellman assumption is based on the semantic security, namely adaptive chosen message and identity attacks ciphertext indistinguishability. Also noted that the improved solution in the presence of unforgeable aspect nor weaker than the original proposal, then explain the improved scheme in the standard model can truly achieve provable security. 3.Liu, who presented the first standard model provably secure signcryption scheme, but Selvi and others through their confidential user key replacement for the deadly attack. For Liu et al signcryption caused due to negligence of the security design flaws, we use the public key to the user to add a Schnorr type a digital signature, to take remedial measures gives a modification. By Liu et al. Safety certification process analysis, pointing out that the original scheme prove the existence of vulnerabilities and targeted program gives the modified security proof. Pointed out that in the standard model of the program in the decisional bilinear Diffie-Hellman assumption based on difficult issues is truly safe, including semantic security and existence unforgeable. 4 No certificate defines the formal structure proxy multi-signature and its security model, using bilinear certificate for the design of a non-proxy multi-signature scheme. In the random oracle model to prove the program in computational Diffie-Hellman assumption is difficult issues authorization certificates and adaptation options chosen message attack the existence and identity can not be forged. 5 No certificate presented a formal definition of multi-proxy signature and security model, and constructed a concrete multi-proxy signature scheme without certificates. Prove the random oracle model which based on computational Diffie-Hellman problem is assumed to have difficulty resisting authority certificate and select adaptive chosen message and identity attacks to meet the non-existence of fake security attributes.

Related Dissertations

  1. Research of the Identity-based Encryption and Signature,TN918.1
  2. Tor anonymous communication system security analysis and research,TP393.08
  3. Design and Security Proof of Password Authenticated Key Exchange Protocols,TN918.2
  4. Design and Analysis of Certificateless Signature and Signcryption Schemes,TN918.1
  5. Research on Some Problems for Identity-Based Authenticated Key Agreement Protocols,TN918.1
  6. A continued fraction linear lower bound of research and types of proxy signature scheme design,TN918.1
  7. Design and Analysis of Security Protocols Based on SPALL Logic,TP393.08
  8. Design and Analysis of Authenticated Key Establishment Protocols Based on CPK or Password,TN918.1
  9. An Efficient Public Verifiable Identity-based Signcryption Scheme,TN918.1
  10. Provable Security for Feistel Ciphers Containing SPN Structure,TN918.1
  11. Relevant Researches on Ad-hoc Network Key ļ¼­anagement Scheme,TN929.5
  12. Signcryption scheme of analysis and design,TN918.1
  13. Standard model safe threshold cryptosystem without certificate,TN918.1
  14. Attribute-based Signcryption and Proxy-signcryption Scheme,TN918.1
  15. Research on Cryptosystems Based on Conic Curve Over Z_n,TN918.1
  16. Signcrypted with special properties related research,TP309.7
  17. Research on Threshold Proxy Signature,TN918.1
  18. Identity-Based Encryption, Revisited,TN918.1
  19. Provable Secure Key Agreement Protocol,TN918.1
  20. Research on Identity Based Identification and Its Application,TP393.08
  21. Intrusion-Resilient Key Management Research on Digital Signature,TN918.2

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net  Mobile