Dissertation > Excellent graduate degree dissertation topics show

Identity-Based Authentication System Research and Implementation

Author: ZhuZuo
Tutor: CuiGuoHua
School: Huazhong University of Science and Technology
Course: Information Security
Keywords: Public-key cryptosystem Identity-Based Cryptography Authentication and encryption Role-based access control
CLC: TN918.1
Type: Master's thesis
Year: 2011
Downloads: 12
Quote: 0
Read: Download Dissertation


Public key cryptosystem is the development of cryptography has opened a new direction , it also brings a broader research platform. Identity-based cryptography simplifies the traditional public key cryptography in the certificate management . With a variety of scientific advances in the identity-based cryptographic techniques are more mature, until now various identity-based programs have been released . In identity-based authentication system , the user 's private key generated by the key distribution center unity , which caused its inherent security risks : key escrow problem . For a single key escrow problem caused by KGC proposed scheme using multiple authentication entities , this program can withstand KGC or KPA untrusted brought crisis, but if the KGC and KPA conspired user's private key security can not be guaranteed. To this end, the improvement program for each user to add a long-term private key factor selected by the user alone and preservation , and the KPA KGC can resist collusion attack . And because identity-based authentication system can only authenticate the user identity confidentiality can not be guaranteed expressly taken to combine the characteristics of the formation of identity-based authentication and encryption certified encryption scheme. Encrypted using a symmetric encryption algorithm , key information can be calculated using the communicating parties . Access control is an important direction for information security , primarily to restrict user access to system resources . For the current mainstream access control model - role-based access control, identity-based authentication combined with encryption system , the authentication encryption scheme to transform to apply to the access control model is proposed with identity authentication access control model , making this model can not only ensure the confidentiality of information transmitted users can also ensure that the user identity is authenticated . Based on the above characteristics have identity -based access control model that combines authentication and encryption schemes are implemented .

Related Dissertations

  1. Research and Design of a High-Performance Scalable Public Key Cryptographic Coprocessor,TN918.1
  2. Research of the Identity-based Encryption and Signature,TN918.1
  3. Research and Design of Secure Comunication of NVD on Demand System,TP309
  4. Mobile terminal identity digital signature scheme based on research,TN918.1
  5. For cross-border exchange of information visualization analysis of access control policy,TP393.08
  6. Extended model based on RBAC rights management system design and implementation,TP311.52
  7. Research on Policy Integration Mechanism of Hybrid Hierarchy Based Multi-domains,TP393.08
  8. Research and Implementation based the gray theory algebra encryption algorithm,TP393.08
  9. Research and Application on Access Control Model Based on Workflow,TP393.08
  10. Constraint-based study commissioned by authorized,TP393.08
  11. Development and Security Research of Traffic Management Information System,TP311.52
  12. Design and Realization of Security Email System Based on PKI and USBKEY Technology,TP393.098
  13. Research on Extended Role Graph Model Based on Hybrid Hierarchy,TP393.08
  14. Key technology research initiative recommendation system based on collaborative filtering,TP311.52
  15. Based on the net of human resource systems design and implementation of,TP311.52
  16. Dongsheng Human Resource Management System Design and Development,TP311.52
  17. Science and Research Information Management System of TJAU,TP311.52
  18. Research on Automatic Security Proof Approach of Public-key Cryptographic Schemes Based on Process Calculus,TN918.1
  19. Provably Secure Password Authenticated Key Exchange Protocols Based on RSA,TN918.1
  20. RBAC-based Design and Implementation of Party System,TP393.08
  21. Design and Implementation of Web enterprise competitive intelligence system permissions components and messaging system,TN929.5

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net  Mobile