Dissertation > Excellent graduate degree dissertation topics show
Standard model safe threshold cryptosystem without certificate
Author: YanZhiFeng
Tutor: ZhangFuTai
School: Nanjing Normal University
Course: Computer Software and Theory
Keywords: No certificate public key cryptosystem No certificates threshold decryption No threshold signature certificate Malicious KGC attacks Public key replacement attack
CLC: TN918.1
Type: Master's thesis
Year: 2011
Downloads: 20
Quote: 0
Read: Download Dissertation
Abstract
2003 Asian secret meeting, Al-Riyami and Paterson proposed a new public key cryptosystem called \In the absence of a certificate public key cryptosystem, the key generation center can not be informed of any user's private key. It solved the identity-based public key cryptosystem inherent key escrow problem while preserving nature without using public key certificates. Because of these two advantages, no certificate public key cryptosystem has been great concern in academic circles and has made a series of research results [2-18]. Most of the existing system without certificate password security is in the random oracle model to prove. However, we know that in the random oracle model, some functions are idealized as a true random function. This assumption can not be satisfied in practice. So, in the random oracle model provably secure password system without a certificate in practical applications may be a security risk. Therefore, in the standard model provably secure password system without certificate is preferable. Threshold cryptography system not only decrypt or signature authority in the dispersion is useful, and can effectively improve the cryptographic system availability and reduce the possibility of a single point of failure. No certificates by integrating public key cryptography and threshold cryptography system can generate both without a certificate and public key cryptography system advantages threshold cryptography cryptography, ie no certificate threshold cryptography. In this thesis, we study the security in the standard model without the certificate public key cryptography. We will focus on the device without using the random oracle case of no provably secure threshold decryption or signature certificate program. Our work is divided into two parts. The first part is no certificate of some existing threshold cryptography systems analysis and attacks. The second part is to construct a non-standard model security certificate threshold decryption new program. First, we have no certificate threshold of three security analysis system, which includes two threshold decryption program and a threshold signature scheme. Two threshold decryption scheme without certificates, respectively, by Yang et al and Zhang et al proposed in 2009. Both programs are claimed to be in the standard model with a chosen ciphertext security, and its security is based on the assumption some bilinear Diffie-Hellman problem is closely related problem is intractable. However, few of these programs through our analysis we can see that they are actually safe. Yang et al proposed threshold decryption scheme without a certificate on the public key substitution attack is fragile. Attacker does not know the private key of the receiver case, simply by replacing the recipient's public key can decrypt the ciphertext and get clear. Zhang et al threshold decryption scheme without certificates vulnerable to malicious KGC attacks and public key substitution attack. A malicious user does not know the secret KGC value in the case can be sent to any use to decrypt ciphertext. We analyze a threshold signature scheme without a certificate is Zhong et al proposed in 2010. Against the signature scheme, we prove that it is in the public key substitution attacks can be arbitrarily forged. Specific attack methods described in detail in Chapter 4. Secondly, we discussed the device without using the random oracle case of how to construct provably secure threshold decryption scheme without certificates. We propose a New certificateless threshold decryption scheme structure. The constructor uses bilinear mapping, and its security is based on the truncated q-ABDHE assumptions. We proved in the standard model in the new program has chosen ciphertext attack [ND-CCA security. We are also on the performance of the new program a brief analysis.
|
Related Dissertations
- Signcryption scheme of analysis and design,TN918.1
- Research on Two-Party Authenticated Key Agreement Protocols in Identity and Certificateless Based Public Key Cryptography,TN918.1
- Research on Threshold Proxy Signature,TN918.1
- Research on Theory of Digital Signature with Special Properties,TN918.1
- Research on Certificateless Public Key Cryptography Without Bilinear Pairing,TN918.1
- Research on the Key Escrow Problem in Identity Based Cryptosystem,TN918.1
- File Sharing System Based on CL-PKC in P2P Networks,TP393.09
- Research on Authentication Techniques with Privacy Preserving in Vehicular Ad-hoc Networks,TN929.5
- Research on Certificateless Digital Signcryption Schemes,TN918.1
- A Certificateless Proxy Ring Signature Scheme,TN918.1
- The AES Algorithm and Its Implementation in DSP,TN918.1
- Study on System of Electronic Documetnt Security Signature,TN918.2
- DR Stinson \,TN918.1
- Group Key Management in Wireless Sensor Networks,TN918.82
- Research of the Identity-based Encryption and Signature,TN918.1
- Mobile terminal identity digital signature scheme based on research,TN918.1
- Register-based chaotic secure communication and Noise Analysis,TN918
- Chaotic secure communication system modulation and optical fiber channel performance study,TN918.8
- CSK coherent technology based digital communication systems analysis,TN918.6
- Wireless sensor network key management scheme,TN918.82
- Chaotic Network File System password,TN918.2
CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net Mobile
|