Font Size: a A A

Study And Implement Of A Secure E-Mail Scheme On Identity-Based Encryption

Posted on:2011-11-04Degree:MasterType:Thesis
Country:ChinaCandidate:X D ZhaoFull Text:PDF
GTID:2178360305960725Subject:Cryptography
Abstract/Summary:PDF Full Text Request
The convenience of e-mail makes it an important part of daily contact. However, e-mails transmitting via the Internet will suffer various kinds of attacks. Therefore, designing a secu-re e-mail system is a topic worthy of studying. The security of traditional e-mail system is based on certificate. To ensure the security of e-mail, traditional e-mail systems have to perf-orm a series of operations to certificates, such as signature, retrieval, validation, storage, rev-ocation, etc. And these shortcomings limit its further use. The identity-based crypto-systems directly use the user identity as a public key which must be accessed from a certificate in the traditional e-mail system. So, the identity-based crypto-system simplifies the operations and management of public keys. Therefore, constructing identity-based e-mail system has beco-me a new approach to solve secure problem of e-mail.How to ensure the security of private key distribution is always an intractable problem that identity-based system can not resolve. This paper detailed analysis of a detachable anon-ymous identity-based key distribution scheme, named SAKI, and its improved scheme SAK-Ⅰ-Ⅱ. However, due to its security vulnerabilities, these two schemes do not guarantee the integrity of the message utilized by users to apply for the private key. Finally, this paper will propose an improved scheme which can not only guarantee the integrity of the message used to apply for private key, but also be proved more secure.In the analysis on Boneh-Franklin scheme based on bilinear pairing mapping on Elliptic Curves and identity-based chameleon digital signature scheme, an identity-based encryption secure e-mail scheme was proposed. Finally this scheme was implemented on visual studio 2008.net platform, and the functions such as encryption, decryption, signature and validation of the e-mail message were realized.
Keywords/Search Tags:bilinear paring, private key generation center, identity-based encryption, chameleon hash
PDF Full Text Request
Related items