Dissertation > Excellent graduate degree dissertation topics show

The Design and Application of Two Types of Online/Offline Signatures Schemes

Author: LuChao
Tutor: LiZhiBin
School: East China Normal University
Course: System Analysis and Integration
Keywords: Signature Identity-based signature Online / offline signature Multi-Signature Bilinear pairing Strong Diffie-Hellman problem CDH problem
CLC: TN918
Type: Master's thesis
Year: 2010
Downloads: 43
Quote: 0
Read: Download Dissertation


A digital signature is an important network security technology, security services can provide authentication, data integrity, and non-repudiation. Multiple routing solutions for mobile ad hoc networks, such as wireless ad hoc networking on-demand the plane distance vector routing protocols AODV, as well as a dynamic source routing protocol DSR. However, the design of these programs did not consider the security issues, such as network node authentication. Routing scheme can apply a digital signature technology to provide security services, but the digital signature is applied directly to mobile ad hoc networks following problems: (1) ordinary signature required computationally intensive, but the computing power of mobile devices; (2 ) the signature of the plurality of nodes on the same message, the number of signatures as after the increase in the number of nodes increases, the corresponding authentication time increases; (3) a new node to join in the network, the other nodes of the existing need to update their public key list; Since nodes may join at any time, often, the public key list updates may be very frequent, causing a large burden on the network. Problem (1), (2) to study the online / offline multi-signature, which combines online / offline signature, as well as multi-signature characteristics of multiple users on the same message can quickly generate a multi-signature verification pursuant to which the signature can determine the identity of the signer. Most of the computation required signature generation process before the signature of the message given, that is, pre-op; given the news, simply line a small amount of transportation can count derived signature, so you can solve the problem (1) . Multiple users to sign a single multi-signature replaces the n-signer generates n signatures, just once to verify, so you can solve the problem (2). This article in the online / offline signature scheme given by Guo et al. Based on the use of the method of Lu et al. Constructed multi-signature, an online / offline multi-program and can prove the security of the scheme in the standard model Statute to the computational Diffie-Hellman problem. Then discuss the dynamic source routing protocol DSR their security needs, and gives the program the dynamic source routing protocol DSR. The second option proposed to help solve the problem (1) and (3) the identity-based online / offline signature, which combines the advantages of identity-based cryptography and online / offline signature: the elimination of the public key certificate; closing to the message before the the offline stage pre-op, to be able to quickly generate the signature of the message in the message arrives. Existing nodes do not need to update the public key list for the new node is added, so as to solve the problem (3); message comes after the signature generation does not need a lot of computing to solve the problem (1). , Based on the strong Diffie-Hellman problem in the random oracle model, security certification program to meet the unforgeable under adaptive chosen message and identity attacks existence. Relative to existing programs, the signature verification algorithm requires only once a pairing operation and therefore has a higher efficiency. Finally, the application programs in on-demand the plane distance vector routing protocol AODV in wireless ad hoc networks.

Related Dissertations

  1. Resrarch on Multisignatures and Multisigncryptions from Identity-based,TN918.1
  2. Study on System of Electronic Documetnt Security Signature,TN918.2
  3. The Research on the Divisibility of E-Cash,F713.36
  4. The Design and Implementation of Student Information Management System Based on Workflow,TP311.52
  5. IBE algorithm in wireless sensor network design and implementation,TP212.9
  6. Web service attack analysis and Security Research,TP393.08
  7. Research on Group Signature Scheme in Anonymous Communication System,TN918.1
  8. Design and Application of Electronic Payment Protocol in Electronic Commerce,TP393.08
  9. Data Collection and Communication for Online Signature Based on USB Interface Technology,TP274.2
  10. Design and Realization of Security Email System Based on PKI and USBKEY Technology,TP393.098
  11. Research on the Security Technology of E-Commerce,TP393.08
  12. Research on Security of OSPF Routing Protocol with Digital Dignature Protection,TP393.08
  13. The Shortest Non-Threshold Group Signature Scheme,TN918.1
  14. The Research of Short Signature Based on Bilinear Pairings,TN918.1
  15. Mechanisms for Accelerating Online/Offline Signature Verification,TN918.1
  16. Research on Verifiable Secret Sharing Scheme,TN918.1
  17. Rearsh and Design on Identity-Based Blind Signatures with Message Recovery,TN918.1
  18. The Research of Identity_based Designated Verifier Signature,TN918.1
  19. VANETs Security Studies,TN918.1
  20. The Application of Identity-Based Signature in Self Test Platform,TN918.1
  21. Standard model safe threshold cryptosystem without certificate,TN918.1

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security
© 2012 www.DissertationTopic.Net  Mobile