Dissertation > Excellent graduate degree dissertation topics show
The Research on Certificateless Signature Scheme Without Bilinear Pairing
Author: WangZuo
Tutor: DuWeiZhang
School: Changsha University of Science and Technology
Course: Communication and Information System
Keywords: Certificateless public key cryptography system bilinear pairings elliptic curve discrete logarithm problem malicious KGC attacks public key substitutionattack
CLC: TN918.4
Type: Master's thesis
Year: 2013
Downloads: 7
Quote: 0
Read: Download Dissertation
Abstract
Certificateless public key cryptography system has solved the problems of identityauthentication and key escrow, which has outstanding advantages. But a certificatelesssignature without authentication is vulnerable to the public key substitution attack, and acertificateless signature is also vulnerable to malicious KGC (Key Generation Center) attackbecause KGC can get the partial private key of user. How to resist these two attacks is theresearch focus of certificateless signature. In addition, the stand or fall of a signature schemeis also measured by efficiency. Due to the high computational complexity of bilinear pairings,the schemes constructed without bilinear pairings have higher efficiency. Research thecertificateless signature respectively from safety and efficiency, the main work is as follows:By studying the security model used for analysis safety of certificateless signaturescheme, it is pointed out that the security risks existed in the schemes constructed under thissecurity model. Considering the different attack model, a improved security models isproposed, which defined a new attack rival who can generate key and fake user. The newsecurity model has higher security goals, and the certificateless signature scheme constructedunder the improved model has higher security.Through analyzing the security of a certificateless signature scheme without bilinearpairing proposed by Wang Shengbao et al, it is indicated that the scheme could not resistmalicious attack of positive dishonest KGC. For this kind of attack, a detailed attack methodis given, and an improved scheme is proposed. Security of the improved scheme is analyzedin the improved model, it shows that the scheme can resist the malicious KGC attack,maintains efficiency of the original scheme and has higher security. Meanwhile, thecommunication complexity is reduced due to the elimination of the secure channel in the improved scheme.Combined with the characteristics of proxy blind signature, a certificateless proxy blindsignature scheme without bilinear pairings is proposed on the basis of the research of thecertificateless signature. Security of the new scheme is analyzed under the discrete logarithmproblem in the finite field. It shows that the new scheme can resist malicious KGC attackfundamentally, which satisfies all the security requirements of the proxy blind signature.
|
Related Dissertations
- Threshold proxy signature and its extension,TN918.1
- Identity-based Digital Signature Scheme,TN918.1
- Application of electronic elections identity-based blind signature scheme,TN918.1
- Research and Design of a High-Performance Scalable Public Key Cryptographic Coprocessor,TN918.1
- The Research of Internet-bank Security Trading Authentication System Based on CPK,TP393.08
- Research and Analysis of Key Management and Secure Routing Technology of Wireless Sensor Network,TN915.08
- Research on the Application of Negation Map in Elliptic Curve Cryptosystem,TN918.1
- Design of the Authentication and Key Management in the Internet of Things,TN918.82
- SSL protocol used in network conference system improvement and research,TP393.08
- Research and Implementation of Dynamic Password Authentication Scheme Based on Ecc,TP393.08
- The Design and Implementation of the Dual Factors Identity Authentication Based on ECC,TP393.08
- Design of Secure E-mail System Based on Encryption,TP393.098
- The Reserch on Efficient Divisible E-Cash Based on ECC,TP393.09
- Elliptic curve digital signature in e-commerce applications,F713.36
- Research and Improvement of the key algorithms elliptic curve cryptosystems,TN918.1
- Research on Identity Based Authentication and Key Agreement Protocol,TN918.2
- Design and Analysis of Certificateless Signature and Signcryption Schemes,TN918.1
- Research on Special Digital Signature Scheme Based on the Bilinear Pairing,TN918.1
- Research on Technology of Application Specific Instruction and Reconfigurable Unit of Elliptic Curve Cryptography Coprocessor Design,TN918.2
- Study on Batch Verification of Digital Signatures,TN918.1
- Authentication and Key Management Based on CPK,TN918.1
CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Password encryption and decryption
© 2012 www.DissertationTopic.Net Mobile
|