Dissertation > Excellent graduate degree dissertation topics show
Research on Cryptosystems Based on Conic Curve Over Z_n
Author: GeShuJuan
Tutor: LiangXiangQian
School: Shandong University of Science and Technology
Course: Basic mathematics
Keywords: Publickey cryptosystem The ring Z_n conic sections Digital Signature Discrete logarithm Proxy multisignature
CLC: TN918.1
Type: Master's thesis
Year: 2009
Downloads: 24
Quote: 0
Read: Download Dissertation
Abstract
Since Diffie and Hellman proposed publickey cryptosystem , a variety of cryptosystem are emerging , such as the large integer factoring the difficult problem of security based on RSA publickey cryptosystem , solving difficult problems in discrete logarithm security based EIGamal public key cryptography system to the elliptic curve discrete number of solving difficult problems as a security based on elliptic curve public key cryptosystem , these cryptosystems have been better with a wide range of applications , the appropriate standards have been established . In recent years, the conic cryptosystem began to receive attention , because the the conic public key cryptosystem is an extension of the elliptic curve cryptosystem , it not only has the advantage of elliptic curve cryptosystem , and elliptic curve , conic group the computation is easier than on the elliptic curve group , such as conic group plaintext embedding , the order of calculation and the point of operation are easier , especially on which the encoding and decoding can easily be run , and since the introduction of the standard binary algorithm , significantly reducing the amount of computation . Meanwhile , you can also create a the the modulo n conic group , the structure is equivalent to the decomposition of large integers password . The algebraic curve cryptographic algorithm is most interested , in addition to elliptic curve cryptography , the the conic public key cryptosystem C.Shcnorr think . This paper mainly based the conic ring Z_n cryptosystem study and do the following work : 1 introduces the basics of cryptography , especially the details of the mathematical properties of the conic . In depth study on the basis of the conic ring Z_n used in publickey cryptosystem , given a proxy multi signature schemes and programs to do numerical simulation , the program of comprehensive utilization of the difficulty of factoring large integers and limited the domain discrete number of solving the difficulty , and enhance the security of the algorithm ; study key agreement based on one based the conic ring Z_n key agreement protocol , the protocol utilizes ring Z_n conic public key cryptography to establish a session key , to improve communication security ; 4 , further improvement of these proxy multisignature scheme , gives a secure digital signature scheme the conic ring Z_n forward .

Related Dissertations
 Study on System of Electronic Documetnt Security Signature,TN918.2
 The Design and Implementation of Student Information Management System Based on Workflow,TP311.52
 Analysis and improvement of several ecash payment scheme,TP393.08
 Research and Design of a HighPerformance Scalable Public Key Cryptographic Coprocessor,TN918.1
 Research on the Security in Wireless Sensor Network,TN915.08
 Research of the Identitybased Encryption and Signature,TN918.1
 Drug Safety Supervision System Research and Implementation,F203
 The Office Automation Work System Key Technologies Based on the ASP.NET the Research,TP317.1
 Applied Research of Electronic Seal Technology in Production Management System Application,TP309.7
 Research and Achievement of PGP Secure Email System Based on Web,TP393.098
 The Research and Implementation of the Electronic Seal Technology Based on Digital Signature,TN918.2
 ECC Based on Fast Digital Signature and Its Implememtation,TN918.1
 The Constructions of Difference Set Pairs and FrequencyHopping Sequences Based on the Cyclotomy,O157.2
 Research and Implementation of Scalar Multiplication Algorithms and Mixed Encryption on Conic Curve over F_{2}^{m},TN918.1
 Subliminal Channel in Multisignature,TN918.1
 The Application of RSA Algorithmin the ATMC Platform,TN918.4
 Research on Known IdentityBased Digital Signature Scheme,TN918.1
 Digital Signature Based on CPK and the Research of Its Application in EMail System,TN918.2
 Research on Threshold Proxy Signature,TN918.1
 Research on Generation of Strong Prime and Multiplication of Large Integers in Publickey Cryptosystem,TN918.1
CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net Mobile
