Font Size: a A A

Research On High-performance Distributed Verifiable Threshold Signature System Based On Ad Hoc Network

Posted on:2010-09-14Degree:MasterType:Thesis
Country:ChinaCandidate:C WangFull Text:PDF
GTID:2178360272482602Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Mobile Ad hoc network is made up of a number of wireless mobile nodes, they can communicate with each other without any network infrastructure and centralized management and it has great practical value. The network, however, itself is extremely vulnerable to be attacked due to its own characteristics. Therefore, the protection of mobile Ad hoc network security is especially important. Based on public key cryptography to build the public key infrastructure is one of the most feasible and most effective solutions to the exciting Ad hoc network security issues. Designing available the key service system is the key technology. In this paper, we discussed how to protect the key in the Ad hoc mobile network through researching high-performance distributed verifiable threshold signature schemes and introduced mobile Ad hoc network of the basic concepts, characteristics, and applications. After in the analysis of the exciting mobile Ad hoc network security research, compared systematically a variety of threshold signature schemes applied in the key service system of the existing Ad hoc network, designed suitable Ad hoc network of high-performance distributed verifiable threshold signature scheme. The paper finished a key service system based on the achievement of a program.The main contributions of this paper include:(1) The paper described systematically the threshold signature verifiable system at this stage, compared the safety and efficiency of a number of effective programs;(2) The paper designed a high-performance distributed verifiable threshold signature scheme that is suitable for the key service system of ad hoc network, described the program and part of the features, included in verifying part of the key, updating part of the key, verifying part of the signature, generating threshold signature. The program, to some extent, resolved the mobile Ad hoc network key security issues in Ad hoc network key service system;(3) Designed and implemented a distributed key authentication service system of mobile Ad hoc network, and introduced explicitly the function of the system components and modules designed process.
Keywords/Search Tags:Mobile Ad Hoc Network, Key sharing, Security Certification, Threshold signature
PDF Full Text Request
Related items