Dissertation > Excellent graduate degree dissertation topics show

Study on Identity Authentication Scheme Based Group Signature

Author: XiaoPingAn
Tutor: YangLing
School: Lanzhou University
Course: Communication and Information System
Keywords: Group signature Quantum group signature Quantum cryptography Authentication
CLC: TN918.1
Type: Master's thesis
Year: 2013
Downloads: 6
Quote: 0
Read: Download Dissertation


Along with the rapid development of computer network technology, cryptology technology and the Internet, the network not only brings economic benefits and convenient, but also causes the personal information disclosure、distorted and counterfeited, and the military information stolen、 forged and destroyed, etc. Because the digital signature technology has data integrity inspection、 identification identity proof、prevention denying, etc.so it has a broad application value and prospect in financial,commercial, military and other fields.However, with the Deutches algorithm, Shor algorithm and Grove algorithm appearing, they threat serious to traditional cryptography. Then quantum information science becomes the forefront of attention gradually.First, ACJT scheme and BLS short group signature schemes are analyzed in this paper, an improved scheme is respectively presented to overcome the problem of scheme of prevention against. Second,this paper introduces the basic knowledge of quantum cryptography. Third, according to quantum infonnatics and group signature scheme theory, based on quantum signature scheme, a quantum group signature scheme is given. At the same times, this paper sets a message authentication system, based on the quantum group signature scheme, using four quantum state controls the quantum gate operations, to obtain participants in the calculation and inspectors check. Otherwise, because the message authentication communication mode is divided into quantum channel and quantization of classical channel, this result can also compare with quantization classic channel.So, it can be ensure that the candidate or the identity of the participants from two aspects. Final, the data analysis shows that this system has the good identification ability when quantum bits of the message length is not more than22, and this system can resist noise interference.

Related Dissertations

  1. Research on Transparent Security of JPEG Image,TP391.41
  2. The Design of Computer Forensics Model Based on Windows Log,D918.2
  3. Study on Legal Issues in Concluding Electronic Commerce Contract,D923
  4. Design and Implementation of Image Authentication on CUDA Platform,TP391.41
  5. Image Restoration Method Research and Its Application Based on Probability PCA,TP391.41
  6. Research of Security Application in Enterprise Based on PKI Technology,TP393.08
  7. Research and Application on Security Authentication Technologies in Internet of Things,TN929.5
  8. Research on Provably Security Model for AKE Protocol,TP309
  9. An Identity Certification System for the Online Banking Based on Fingerprint Recognition and PKI,TP393.09
  10. Research password authentication key agreement protocol based,TN918.1
  11. Design and Implementation of Zhaoqing S & T Polytechnic Online Examination System Base on Computer Basis,TP311.52
  12. Research and Implementation for Single Sign on System Based on PKI,TP393.08
  13. Distributed Ad Hoc network part of key management and authentication scheme,TN929.5
  14. The Design and Implementation of APs and Stations’ Management Based on Centralized WLAN Architecture,TN925.93
  15. Distributed Authenticated Skip List and Its Application in P2P Distributed Storage System,TP333
  16. Guard Against Phishing Attacks for Two-way User Authentication Mechanisms and Implementation,TP393.08
  17. The Judicial Authentication Institutions Management System to Reform and Perfect in Our Country,D918.9
  18. Based on the RADIUS protocol analysis and application of the extended attribute,TN915.04
  19. Distributed authentication technology research,TN929.5
  20. Authentication in e-government application of,TP393.08
  21. Windows-based interface layer encryption Secure Access System Design and Implementation,TP393.08

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net  Mobile