Font Size: a A A

Analysis And Research On Certificateless Signature Verification Scheme

Posted on:2015-12-18Degree:MasterType:Thesis
Country:ChinaCandidate:M TangFull Text:PDF
GTID:2208330431474927Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Identity-based cryptosystem, in which an entity’s public key is derived directly from certain aspects of its identity, simplifies the key management process in the traditional certificate-based cryptosystems, has been one of the most active area of research and currently is of great interest to the cryptographic society. Users’private keys are generated by a trusted third party called PKG, which introduces the key escrow problem. One of the efficient ways of solving the key escrow problem in IBC is using multiple PKGs, another is using certificateless cryptosystem.In the open network environment, trust and security through the operation of the system is to establish elements of a comprehensive confidentiality, authentication, data integrity and authorization mechanisms, involving key establishment, encryption, digital signatures, authentication and other technologies organic integration of computing and communications in ensuring higher efficiency, but also to ensure their safety.This paper mainly about signcryption and generalized signcryption. The study includes the analysis of signcryption,and the formal definition of certificateless generalized signcryption. Design and analysis of the new scheme, the main research work is as follows:Summary the existing signcrypted system, analyzed the strengths and weaknesses between PKI signcrypted system, identity-based signcryption and generalized signcryption system.We also analy the situation of this signcrypted system.This paper based on the Yu et al, proxy Unsigncryption scheme, and combined with Certificateless Generalized Signcryption proposed Certificateless Generalized Signcryption Scheme with Proxy Unsigncryption.We also proposeda new scheme basedon the front, theimprovement schemecan revocationof authorized agent.The scheme is based on bulletin-board,The originalunsigncryptioncan use thebulletin boardtoterminate theagencyunsigncryptionpersonsauthority.In the last we analyze the scheme from its accuracy and security,and proves its security.
Keywords/Search Tags:certificatelesscryptography, generalizedsigncryption, proxyunsigncryption, secu ritymodel
PDF Full Text Request
Related items