Dissertation > Excellent graduate degree dissertation topics show

Design and Analysis of Cryptographic Protocols from Bilinear Pairings

Author: YangChen
Tutor: WangXinMei
School: Xi'an University of Electronic Science and Technology
Course: Communication and Information System
Keywords: Bilinear pairing Cryptographic protocol Traitor tracing Digital signature Identity authentication
CLC: TN918.1
Type: PhD thesis
Year: 2007
Downloads: 263
Quote: 1
Read: Download Dissertation


Cryptographic protocol is one of the key techniques to provide identity authentication, dada integration and non-repudiation in the network environment. It plays an important role in the secure networks systems on which the multimedia services (e.g. Pay-TV, Online Database) are based, and it is the foundation for establishing the secure network environment.Bilinear pairings is a crucial tool for constructing the cryptographic protocols in recent years. The bilinear pairing-based cryptographic protocols not only have the advantages of higher security, shorter key size and faster implementation, but also possess many benefits that cannot be easily achieved by using other techniques. This dissertation focuses on the design and analysis of the pairing-based cryptographic protocols in following aspects: traitor tracing, digital signature, identity authentication and group key distribution of the multimedia information protection. The main contributions of this dissertation are as follows:1. A new pairing-based traitor tracing scheme that can efficiently resist single-user anonymous pirate attack is proposed, and the corresponding black-box tracing algorithm with limited pirate capability is also constructed. The proposed scheme has the following advantages: (1) The data transmission bandwidth needed is independent of the number of the users in the system; (2) All the authorized users contributing to the construction of the pirate decoder can be detected; (3) The scheme can be used to construct public key traitor tracing schemes.2. We study the certificateless public-key cryptosystem using SEM (SEcurity Mediator) mechanism, and present the formal models of the SEM-based certificateless public-key encryption scheme and certificateless signature scheme respectively. An efficient SEM-based certificateless public-key encryption scheme using bilinear pairing is proposed. The proposed scheme can eliminate the key escrow problem in traditional identity-based public-key cryptosystem, and also realize the immediate revocation of user keys.3. A mediated identity-based signature scheme is presented by introducing the online SEM mechanism. The scheme can provide fast user-key revocation and securely withstand existential forgery attack under the difficulty of computational Diffie-Hellman assumption.4. Security analysis is conducted for Ju et al’s signature scheme with immediate revocation. As pointed out, the immediate revocation property will be damaged once the system user has successfully completed one message signature with the help of the SEM. We propose an improved scheme that does not have the above weakness.5. By binding the initial password selected by one user with his identity information, we present a smartcard-based remote user password authentication scheme using bilinear pairings derived from hyperelliptic curves. The proposed scheme enables each user to choose and change his login password freely to achieve the aim of the user-friendly. Additionally, there is no need to use any verifier table to verify each user’s login request, and thus the authentication server’s storage burden is greatly reduced.6. The notion of key proxy quantity is introduced to construct remote user authentication scheme using smart card. The authentication server generates for each user a key along with the corresponding proxy quantity stored in the smartcard which is given to the user to compute the login request, which enhances the system security against collusion attack.7. An identity-based group key distribution scheme using bilinear pairings is constructed. The broadcasting controlling information in the scheme is independent of the number of the users in the system. Therefore, the proposed scheme is suitable for the situation with large set of system members. The proposed scheme can also provide dynamic user joining.

Related Dissertations

  1. Study on System of Electronic Documetnt Security Signature,TN918.2
  2. The Design and Implementation of Student Information Management System Based on Workflow,TP311.52
  3. Research on the Security in Wireless Sensor Network,TN915.08
  4. IBE algorithm in wireless sensor network design and implementation,TP212.9
  5. Study on the System of Signcryption,TN918.1
  6. Research and Implementation of the Platform of Unified Authentication and Authorization in Education Information Network,TP393.08
  7. Research and Achievement of PGP Secure E-mail System Based on Web,TP393.098
  8. Design and Realization of Verification Code Based on USBKey,TP393.08
  9. Construction and Analysis of Scalar Multiplication Algorithm on Elliptic Curve,TN918.1
  10. Research and Application of Ring Signature in Ad Hoc Networks,TN918.82
  11. Research and Design of Unified Authentication System in University Campus Network,TP393.08
  12. An Efficient Public Verifiable Identity-based Signcryption Scheme,TN918.1
  13. Cash Funds Box Data Acquisition and Flow Process Management Design,TP274.2
  14. Rearsh and Design on Identity-Based Blind Signatures with Message Recovery,TN918.1
  15. The Research of Short Signature Based on Bilinear Pairings,TN918.1
  16. The Shortest Non-Threshold Group Signature Scheme,TN918.1
  17. Research on Verifiable Secret Sharing Scheme,TN918.1
  18. Based on zero-knowledge proof of digital signature,TN918.1
  19. Attribute-based Signcryption and Proxy-signcryption Scheme,TN918.1
  20. The Design and Realization of Visual Electronic System,TP309
  21. Research on Cryptosystems Based on Conic Curve Over Z_n,TN918.1

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net  Mobile