Font Size: a A A

(t, N) Threshold Signature Authentication Access Control Technology And Applications

Posted on:2006-11-19Degree:MasterType:Thesis
Country:ChinaCandidate:M LuoFull Text:PDF
GTID:2208360182968979Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the popularization and the development of computer network, information security becomes the hotspot in IT filed. Access control technology is an important research project, it is very significant for guarantee the integrality and authentication of information.(t,n) threshold signature extends from the common signature, it means that any t of the group including n participators can signature the files representing the group, while less than t participators can not. The research of (t,n) threshold signature access control technology is utility, for it can be widely used in some environment.The research contents of this paper is the application of (t,n) threshold signature authentication access control technology. The paper combined the theory with practice, using the developing tools such as VC,Delphi and SQL Server Database constructed a project censor system.The paper include firstly analyses the research background of threshold signature authentication access control technology and introduces the evolvement of theory and practice in the world. After introducing public key cryptology, signatures, and the concept of threshold signatures, this paper introduces several representative (t,n) threshold signatures, which are combined the Shamir secret sharing and public key cryptology. Selecting one of these schemes (an improved threshold RSA signatures scheme) the paper designs and implements a system, in which the USBKey is used as a digital key. During the implanting process, a lot of new research productions are used for improving the big integer operation efficiency. An project using the threshold signature authentication access control technology is also introduced in the paper. Finally it concludes the work of the paper and presents some expectation.
Keywords/Search Tags:information security, threshold signatures, authentication, access control
PDF Full Text Request
Related items