Dissertation > Excellent graduate degree dissertation topics show

Research on Cryptosystems Based on Conic Curve Over Z_n

Author: GeShuJuan
Tutor: LiangXiangQian
School: Shandong University of Science and Technology
Course: Basic mathematics
Keywords: Public-key cryptosystem The ring Z_n conic sections Digital Signature Discrete logarithm Proxy multi-signature
CLC: TN918.1
Type: Master's thesis
Year: 2009
Downloads: 24
Quote: 0
Read: Download Dissertation

Abstract


Since Diffie and Hellman proposed public-key cryptosystem , a variety of cryptosystem are emerging , such as the large integer factoring the difficult problem of security based on RSA public-key cryptosystem , solving difficult problems in discrete logarithm security based EIGamal public key cryptography system to the elliptic curve discrete number of solving difficult problems as a security based on elliptic curve public key cryptosystem , these cryptosystems have been better with a wide range of applications , the appropriate standards have been established . In recent years, the conic cryptosystem began to receive attention , because the the conic public key cryptosystem is an extension of the elliptic curve cryptosystem , it not only has the advantage of elliptic curve cryptosystem , and elliptic curve , conic group the computation is easier than on the elliptic curve group , such as conic group plaintext embedding , the order of calculation and the point of operation are easier , especially on which the encoding and decoding can easily be run , and since the introduction of the standard binary algorithm , significantly reducing the amount of computation . Meanwhile , you can also create a the the modulo n conic group , the structure is equivalent to the decomposition of large integers password . The algebraic curve cryptographic algorithm is most interested , in addition to elliptic curve cryptography , the the conic public key cryptosystem C.Shcnorr think . This paper mainly based the conic ring Z_n cryptosystem study and do the following work : 1 introduces the basics of cryptography , especially the details of the mathematical properties of the conic . In -depth study on the basis of the conic ring Z_n used in public-key cryptosystem , given a proxy multi- signature schemes and programs to do numerical simulation , the program of comprehensive utilization of the difficulty of factoring large integers and limited the domain discrete number of solving the difficulty , and enhance the security of the algorithm ; study key agreement based on one based the conic ring Z_n key agreement protocol , the protocol utilizes ring Z_n conic public key cryptography to establish a session key , to improve communication security ; 4 , further improvement of these proxy multi-signature scheme , gives a secure digital signature scheme the conic ring Z_n forward .

Related Dissertations

  1. Study on System of Electronic Documetnt Security Signature,TN918.2
  2. The Design and Implementation of Student Information Management System Based on Workflow,TP311.52
  3. Analysis and improvement of several e-cash payment scheme,TP393.08
  4. Research and Design of a High-Performance Scalable Public Key Cryptographic Coprocessor,TN918.1
  5. Research on the Security in Wireless Sensor Network,TN915.08
  6. Research of the Identity-based Encryption and Signature,TN918.1
  7. Drug Safety Supervision System Research and Implementation,F203
  8. The Office Automation Work System Key Technologies Based on the ASP.NET the Research,TP317.1
  9. Applied Research of Electronic Seal Technology in Production Management System Application,TP309.7
  10. Research and Achievement of PGP Secure E-mail System Based on Web,TP393.098
  11. The Research and Implementation of the Electronic Seal Technology Based on Digital Signature,TN918.2
  12. ECC Based on Fast Digital Signature and Its Implememtation,TN918.1
  13. The Constructions of Difference Set Pairs and Frequency-Hopping Sequences Based on the Cyclotomy,O157.2
  14. Research and Implementation of Scalar Multiplication Algorithms and Mixed Encryption on Conic Curve over F2m,TN918.1
  15. Subliminal Channel in Multisignature,TN918.1
  16. The Application of RSA Algorithmin the ATMC Platform,TN918.4
  17. Research on Known Identity-Based Digital Signature Scheme,TN918.1
  18. Digital Signature Based on CPK and the Research of Its Application in E-Mail System,TN918.2
  19. Research on Threshold Proxy Signature,TN918.1
  20. Research on Generation of Strong Prime and Multiplication of Large Integers in Public-key Cryptosystem,TN918.1

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net  Mobile