Dissertation > Excellent graduate degree dissertation topics show

The Application of Identity-Based Signature in Self Test Platform

Author: YanYan
Tutor: CaoZhenFu;GuHongLiang
School: Shanghai Jiaotong University
Course: Software Engineering
Keywords: Self Test Silverlight WCF Identity-Based Signature XML Signature
CLC: TN918.1
Type: Master's thesis
Year: 2011
Downloads: 25
Quote: 0
Read: Download Dissertation


With rapid popularization of Internet/Intranet, it has completely changed the approaches for people to obtain information, communicate, and study. First and foremost, traditional teaching method is not content with the thirsty of people to knowledge. On the other hand, along with development of network technology and continuously increasing resource of the computer courseware, people can select courses they are interested in, so as to get abundant knowledge. E-learning is a fundamental characteristic of future learning society and a basic requirement of people, and it includes studying, finding materials, scanning information and downloading information from network. The design and implementation of the self-examination system and web-based intelligent answering system has been promoted to an important situation, because it is an important aspect of e-learning. Not only by means of self-examination system and intelligent answering system can students track and test on the knowledge, realize the study status at all times, and adjust the learning emphases in time, in order to study better and improve oneself continuously. But also can make teachers immediately and completely know about the students’ understanding situation; Thus the teachers can tune-up teaching content, highlight and difficulty in time. Thereby, how to scientifically manipulate internet on online testing and intelligent answering has become a universal concern of educational supervisors and a lot of students.The traditional security system of Electronic Business guarantees the network information confidentiality, integrity, usability, authentication and non-repudiation mainly through entity authentication, digital signature, encryption by using the Public Key Infrastructure/Certification Authority (PKI/CA) system. However, because of the complexity of the digital certification management in PKI/CA system, it is unsuitable for real-time online exchanges and so on. Therefore, it is necessary to improve the existing PKI/CA system.Current authentication techniques are mainly based on asymmetric cryptography. In 1984, Shamir proposed the idea of identity-based encryption, signatures, and authentication. The kernel of this idea is that a user’s public key is not produced by binding a user’s public key with the user identity through Certification Authority but extracted directly from the user’s identity information (such as ID card number, name, email addresses, IP addresses, etc.). And the user’s private key is generated by a trusted centre (Private Key Generator) (referred to as PKG). But until 2001, when Dan Boneh and Matt Franklin proposed a kind of identity-based encryption algorithm, the study of identity-based cryptography has been in full swing up. Now the identity-based cryptography has become a hot topic of cryptography field.Based on the Public Key Infrastructure (PKI) system and asymmetric encryption algorithm, the traditional XML signature has many drawbacks such as complex management process and high computational cost. By the research of XML signature syntax and Identity Based Signature (IBS) scheme without a trusted third-party, the author realized a new XML signature based on the above IBS system and Weil pairing correspondingly, and designed the corresponding XML signature process and structure of XML signature according to the XML signature syntax. The new XML signature overcomes the drawbacks of traditional signature based on the PK1 with good security and high efficiency.This article uses WCF framework, alongside Silverlight and LINQ to construct a distributed College English Test Band-4 Self-Examination system. The system has adopted Identity-Based Signature to improve its security. There is no requirement of the trusted third party Certification (Certification Authority) which is required by the Public Key Infrastructure. At the same time, because only a limited amount of common parameters is needed to be saved up, it does not need a separate directory server to store the public key or a database to support it, and also does not require public key management and certification issues. All these will greatly reduce the complexity of the system.

Related Dissertations

  1. Design and Implementation of Framework Control Information System Based on WCF,TP311.52
  2. Software System Design of Supermarket Cashier Based on Intelligent Client,TP311.52
  3. . NET-based remote monitoring system power switch boundaries Design and Implementation,TM76
  4. Research of Web Application Framework Based on WCF and Silverlight,TP393.09
  5. Silverlight-based transfer of hazardous waste regulatory system design and implementation,TP311.52
  6. WCF - based online ordering system,TP311.52
  7. Application and Research on Silverlight and WCF Technology in the Tobacco Pestal Early Alarm System,TP311.52
  8. XML for the Type of Data Encryption and Decryption Technology,TP393.08
  9. Service-oriented distance education academic support Platform,TP393.09
  10. Research and Design of Supply Chain Management System’s Architecture Based on SOA,TP311.52
  11. The Research and Implementation of the Key Technology Based on GIS Visualization of Marine & Atmosphere Data,TP391.41
  12. WCF services team group message - based communication platform development,TP311.52
  13. Airlines clearing system distributed development framework,TP311.52
  14. Design of Land Public Information Management System Based on RIA and WEBGIS,TP311.52
  15. Study on Batch Verification of Digital Signatures,TN918.1
  16. Research and Application of SOA Architecture Based on ESB,TP393.09
  17. Schedule and control management information systems,TP311.52
  18. RIA technology stratification student expense management , systems analysis and design,TP311.52
  19. Design and Implementation of the Environmental Protection dynamic monitoring and emergency management system,TP311.52
  20. Research of the Power System Visual Graphics Software Based on New Web Technology,TM76
  21. Low Power SRAM Design and Implementation in X-DSP,TP333

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net  Mobile