Dissertation > Excellent graduate degree dissertation topics show

Research on Identity-Based Cryptography Schemes

Author: ZhangBo
Tutor: XuQiuLiang
School: Shandong University
Course: Applied Computer Technology
Keywords: Identity-based Signcryption Multi - signcryption Oriented groups Key escrow
CLC: TN918.1
Type: PhD thesis
Year: 2010
Downloads: 396
Quote: 3
Read: Download Dissertation


Use of the public key in the traditional public-key cryptosystem, first rely on a trusted third party called a Certification Center (CA, Certificate Authority) to issue a public key certificate for the user. CA's public key certificate signature public key information of the user's identity and the seemingly random link, only after the user identity and public key of the CA signing is legitimate, CA institutions is thus this core architecture department is responsible for the user every aspect of the life cycle of the public key certificate. The use of these certificates takes huge computation and storage overhead, management of more complex, higher CA agency requirements as System Center, a heavier burden on the system. For simplify certificate management work, in 1984, the well-known cryptographer Shamir proposed the idea of ??identity-based cryptography (IBC, Identity-Based Cryptography), the basic idea is that the user's identity and its public key bundled together in the most natural way: sent to the user after the user's identity information is the user's public key, the user's private key from being called the private key generation center (PKG, Private Key Generator) trusted third party. In the identity-based public key cryptosystem architectures, without storage of the public key or certificate directory, simplifying the management process of the public key certificate, the public key is used is also more directly, thereby reducing the computation and storage overhead. This paper focuses on identity-based cryptography research, especially the design and analysis of identity-based cryptographic schemes in the standard model, the security model of the program focused on the establishment and formalization of provable security, identity-based cryptography under strong designated verifier signature, signcryption, multi-signcryption multi-recipient of anonymous signcryption and group-oriented encryption and signcryption secure key distribution protocol security cryptography scheme defined and specific focus, trying to design efficient the provable secure identity-based cryptography. Identity-based cryptography mostly use bilinear pairings, reduce bilinear on the number of operations is the key to improve the efficiency of identity-based cryptographic schemes. Recently, Liji Guo et al proposed a new identity-based signature scheme, the verification algorithm than Paterson et al. Program to reduce a bilinear pairing operations, significantly improve efficiency. In the third chapter, we the program analysis, found that the program exists regret security weaknesses, can not resist the known private key known of the existence of the signature forgery attack. In the real world, in order to achieve full control of the signature, prevent signature abuse, people want to be able to specify the signature verification, only to be designated verifier can verify and accept the signature content, the non-designated verifier can not determine the identity of the signer . Need to use authentication algorithm to verify the private key, designated verifier signature can be divided into designated verifier signature and designated verifier signature two. In the fourth chapter, we have a provable secure strong designated verifier proxy signature scheme and an identity-based strong designated verifier proxy signature scheme in the random oracle model, programs at the same time meet the proxy signature and designated verifier signature security features, can effectively prevent the the signature abuse and signature content of the leaks. In addition, we also proposed a provably secure identity-based strong designated verifier signature scheme in the standard model of the first. The encryption and signature is able to obtain the most basic confidentiality and authentication cryptography tools, 1997, Zheng signcrypted new cryptographic concepts, so that in the open channel using a single logical steps to complete the encryption and signature two operation, confidentiality and authentication information transfer process, while reducing the computation and communication costs of traditional signature first encryption method. The signcryption scheme identity-based signcryption one of the hot areas of research, the following results were obtained in the study of identity-based signcryption scheme: 1. Third chapter of the first constructed in the standard model based on identity sign encryption scheme security analysis, pointing out that its existing security issues and improvements, improved programs to meet the adaptive chosen ciphertext attack ciphertext indistinguishability and select the existence of the ciphertext message attacks unforgeability . 2 In the fifth chapter, we improve based on the multi-identity security model signcryption scheme, the standard model of the first provable secure identity-based multi-signcryption scheme, receiver, legitimate sign dense text recognition of all the signers of the plaintext message. The program has a higher efficiency, even in the degraded case (only a signcryption) also improved efficiency compared to the existing single signcryption signcryption scheme. 3 in Chapter V the first time we are given a formal definition of anonymous signcryption scheme based on the identity of more than receiver and comprehensive security model, and construct a specific program in the standard model, the program can achieve the signed secret the identity of the unconditional Anonymous, to improve the calculation and transmission efficiency in the process for the multi-recipient information transfer. Some network applications require the same message to a plurality of entities to be transmitted, the easiest way is the sender of the message is encrypted separately conducted several point-to-point transmission, Obviously, this method larger efficiency when in the receiving group very low, and will certainly lead to a great deal of calculation of the amount of traffic. In order to solve the problem effectively broadcast digital content to the recipient group, Fiat and others in 1993, the concept of broadcast encryption information broadcast information is encrypted and only certified user can decrypt the ciphertext for effective information broadcast simultaneously on the information recipient subgroup divided to different information to specified subgroup of users, the user can not get outside the subgroup broadcast information. Large number of identity-based broadcast signcryption scheme, these programs achieve information privacy and certification group communication process, these benefits at the same time, however, how the system parameters constant scale has been the difficulty of research in this field problems. Another problem is that existing programs must be fixed during the establishment phase of a large receiver group, the broadcaster must be aware of the individual public key of the group members, but in some applications, Chat may not clear the information reception 's information, and the receiver may be dynamically increased. In the sixth chapter, we first proposed the concept of identity-based oriented group encryption and signcryption and given a specific structure. New program in the system parameters and the length of the ciphertext are constant information sender only receive group's identity information will be able to produce dense text signed, information receiving group member can independently decrypt the ciphertext and verify the signature of the legitimate chosen ciphertext attack, a new program in the identity-based as well as select message attack is provably secure. PKG for the user based on the identity of the cryptographic system, the generated private key, the private key is transferred to the user and then through a secure channel. PKG fully grasp the user's private key, you must require that all users of its full trust. However, in real life, such a trusted entity is generally not easy to find, especially in the primary stage just begun identity-based password system applications, the infrastructure is not perfect, there is malicious PKG possible in this PKG or sell user The private key or decryption user ciphertext or forged user signature, even at the completion of the malicious behavior, but also not to be noticed, this is because they can not distinguish between these behaviors result (private key leakage, encrypted message leakage and signature forgery, etc.) is by The users themselves intentionally or unintentionally result, or indeed by PKG malicious completed. This PKG fully grasp the user's private key is known as the \In Chapter VII, we study the key escrow problem of existing solutions PKG attack behavior characteristics were analyzed, and the results show that single authentication method does not really solve the problem of key escrow, in the consolidated the advantages of the solution, we propose a new identity-based key distribution mechanism can effectively resist the attack the PKG-sponsored initiative, to avoid PKG fully grasp the user's private key.

Related Dissertations

  1. Resrarch on Multisignatures and Multisigncryptions from Identity-based,TN918.1
  2. Research of the Identity-based Encryption and Signature,TN918.1
  3. Research and Design of Secure Comunication of NVD on Demand System,TP309
  4. Mobile terminal identity digital signature scheme based on research,TN918.1
  5. Identity passwords on key management,TN918.2
  6. Identity-Based Authentication System Research and Implementation,TN918.1
  7. Study on the System of Signcryption,TN918.1
  8. Research on Identity Based Authentication and Key Agreement Protocol,TN918.2
  9. A continued fraction linear lower bound of research and types of proxy signature scheme design,TN918.1
  10. Continued fraction linear lower bound on the number of identity-based signature,TN918.1
  11. Study on Batch Verification of Digital Signatures,TN918.1
  12. Research and Application of Ring Signature in Ad Hoc Networks,TN918.82
  13. Research of the Encryption and Signature in Wireless Sensor Network,TN918.82
  14. Research on Tate Pairing and Implementing Tate Pairing’s Applying in Wireless Sensor Network,TN918.82
  15. Research on the Secure Transport Mechanism for the Nodes in IPv6 Network,TP393.08
  16. Construction of private key distribution and user encryption and authentication center VoIP systems,TN918.73
  17. Identity-Based Encryption, Revisited,TN918.1
  18. Research on Key Management Scheme in VoIP System,TN916.2
  19. Research on Identity-Based Public Key Cryptosystem,TN918.1
  20. Research on Rational Cryptographic Protocols and Its Application,TN918.1
  21. Research and Implementation of End-To-End Authentication and Key Management,TN918.82

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net  Mobile