Font Size: a A A

An Improvement And Exploration For Digital Signature Technology Based On Convex Hull Theory And Information Hiding

Posted on:2009-05-29Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhangFull Text:PDF
GTID:2178360272981001Subject:Financial and trade e-commerce
Abstract/Summary:PDF Full Text Request
With the rapid development and extensive application of the computer software/hardware technology, communication technology and the network technology (especially represented by the Internet), the traditional work methods and business model has encountered a huge impact, at the same time, e-commerce model and system came into being. One of the important cores of e-commerce is that we can transfer the commercial information and conduct the network transactions through the network. Along with the implementation of e-commerce, the basic characteristics that it is highly dependent on the computer and the security of computer network technology become obvious increasingly, however, the Internet is so free and open that the e-commerce system will inevitably be faced with a variety of the security hiding dangers and threats from the internet. As one part of the security content, the commercial transaction security must prevent the information from being read secretly and tampered with through the network transmission, prevent the third parties which act as the fake identity from doing the fraud in the online transaction, guarantee that the commercial credit and the business act undeniable, and ensure that the transaction and information which has been done can not be denied by the business parties, and so on. In order to achieve the monitor of commercial transaction security, we have to use the digital signature technology, and the digital signature technology has got great achievement in several aspects, in which ensure the integrity, security, timeliness, privacy and irreversibility of the business information through the transmission. Naturally, the business parties mostly conduct the transactions non-face-to-face under the virtual cyberspace in the e-commerce transactions. Clearly, the e-commerce activities, such as how to let the business parties trust each other in the virtual cyberspace and how to arbitrate the parties'specific obligation while occurring the business disputes, will inevitably involve the identity confirmation of the business parties and the information attribution. The digital signatures, which exist in the whole process of the e-commerce transactions, resolve the uncertain factors strongly and server as the basis and the starting point of the security. Thus, the digital signature technology, which achieves the rapid spread and the extensive application gradually, becomes an important link of the creation of a safe, reliable online transaction environment. However, as a means of the network security technology, digital signatures also exist a lot of security hiding troubles and weaknesses while guaranteeing the e-commerce security; Therefore, it is necessary to research the digital signature technology and discuss the digital signature technology improvement program under the different transaction demands from various angles.Digital signature which is relative to the handwritten signature plays a major, approval and the effective role. It uses the certain data exchange protocol and encryption algorithm to treat the data attached itself to data unit with special data disposal and equivalent cryptogram transformation, which allow the receivers to confirm the source and integrity of the trading information, and protect the trading information from being forged by someone such as the receivers. So, The digital signature is an information authentication technology based on encryption technology. The concept of digital signature was raised in 1976. Since then, it has aroused cryptography experts'and computer experts'widespread concern. With the rapid development of computer technology, network communication technology and the complexity of application needs, the digital signature technology extends from the initial sense of the single signature, single verification model to the more signature, comprehensive verification area. Therefore, according to the various application needs under the network environment, some experts and scholars has designed a variety of digital signature schemes which contain other additional functions, such as: undeniable signature, blind signature, double signature, group signature, batch signature, proxy signature. All of these signature schemes have greatly enriched the application and practice basis of the digital signature, and have promoted the continuous development, the growing popularity and the wide application of digital signature.As a core technology of the Internet era, Digital signature is absolutely necessarily, its popularization and application also need the support and protection of the law. Some countries and regions such as the United States, Singapore, Japan, Korea, the European Union, which developed e-commerce earlier than any other countries and regions, have adopted laws to endow digital signature with force adeffect. And, in our country, the" Electronic Signature Law of the People's Republic of China" went into effect as of April 1, 2005.In this paper, the basic framework and main contents are:First, the paper starts with the security hiding troubles and security needs of e-commerce, introduces the security technology of e-commerce in more detail, and thus leads to the digital signature technology;Secondly, the paper expatiates the definition, security characteristics, classification, as well as the process of digital signature, analyzes the various security hiding troubles appearing in the realization process of the digital signatures (such as: interception Reading, attack easily for the obvious storage location of the ciphertext) and different users'demands for the transactions, discusses the non-hiding-improvement of the digital signature, and introduces the information hiding technology into the digital signature research, raises the concept and method of the hiding digital signature, then designs the whole encrypted digital signature and local encrypted digital signature which based on the asymmetric encryption and information hiding technology;Thirdly, in order to fractionizes and chooses the digital signature schemes fine, the paper raises a "safety/speed ratio "evaluation indicator;Finally, the paper introduces the related concepts and application background of the convex hull theory, as well as some classical convex hull generating algorithm, and points out the advantages and disadvantages of the convex hull generating algorithm. On this basis, the paper raises a digital signature improving scheme which based on the convex hull theory. It elaborates that how to choose and establish the coordinate of the coordinate axis which is the base of the convex hull generation, the realization process of the digital signature improving scheme which based on the convex hull generating algorithm, and the evaluation of the scheme.
Keywords/Search Tags:Digital signature, Information hiding, Convex hull
PDF Full Text Request
Related items