Font Size: a A A

Research On Application Model And Implementation Of Proxy Signature In Distance Education

Posted on:2012-12-28Degree:DoctorType:Dissertation
Country:ChinaCandidate:F Y LiFull Text:PDF
GTID:1118330335464601Subject:Education Technology
Abstract/Summary:PDF Full Text Request
Distance education lies in open network and it is that the openness of the network brings many conveniences to education and learning. However, more open the network is, more attacks and menaces the data and information of distance education in the network will suffer from. How to protect the intellectual property of education resources? How to prevent education information from being stolen? How to avoid education information not to be forged and distorted? How to confirm the realness of senders and receivers? How to guarantee that senders and receivers can't deny their doings? How to guarantee that during the transmission of education information the power of digital signature is safely authorized? All of these problems have been key security problems in distance education.As one latest research achievement of digital signature, the technology of proxy signature is the most efficient and potential for the kind of problems. As far as to solve the key security problem of distance education is concerned, it is not be replaced.According to the special acquirements of the domain of distance education, kinds of application models of proxy signature applicable for distance education, schemes and principles for designing are proposed, and partial application schemes are implemented by software.The major innovations of the research work of the paper are stated as follows.1. Research of application of normal proxy signature in distance educationIn the surrounding of distance education, two application models of normal proxy signature, i.e., application models of normal proxy signature for designated receivers and non-designated receivers, are constructed, analyzed and compared with each other. Aimed at some difficulties of designing proxy signature, some basic principles to design proxy signature is put forward and can guide researchers to setup safer proxy signature schemes.2. Research on application of multi-party authorization proxy signature in distance educationCombining the application in distance education, two kinds of application patterns of multi-proxy signature are proposed and analyzed by security. Based on bilinear pairing, one multi-proxy signature scheme for designated verifiers in distance education is designed. Its correctness, advantages, safety problems to solve, the comparison with other schemes and its application prospect are introduced.Aimed at the special condition of distance education, two sorts of application ways of proxy multi-signature are presented and analyzed. Proxy multi-signature schemes CC1 and CC2 (proposed by Chen, Chung and Huang) based on eclipse curve cryptosystem are applied to distance education, and its security is analyzed. Due to some advantages of CCH1 and CCH2, their improved versions are proposed. The security problems of distance education to solve by the two improved schemes are described and they are compared with the original schemes.From the view of the domain of distance education, two kinds of multi-proxy multi-signature patterns are constructed and their functions, advantages and disadvantage are compared with each other. Based on Cha and Cheon's signature scheme, one multi-proxy multi-signature scheme with designated verifiers using bilinear pairing applicable for distance education is put forward. The scheme can provide many security properties including proxy protection, verifiability, strong identification, strong undeniability, strong unforgeability, distinguishability and prevention of abusing proxy signing power.3. Application research of threshold proxy signature in distance educationTwo models of threshold proxy signature scheme are designed. According to the models, multiple threshold proxy signature instances and policies from remote education are proposed. As far as the kind of application is concerned, the main research focuses on four subjects. One is that the security of HW threshold proxy signature scheme with self-verified public key cryptosystem is analyzed. The second one is that Kuo and Chen's threshold proxy signature scheme base on RSA is cryptoanalyzed. The third one is that one threshold proxy signature scheme based on ECDLP and self-verified public key cryptosystem is proposed. The last one is that one threshold proxy signature scheme with designated verifier based on bilinear pairings is put forward. The research becomes the theory groundwork and provides applicable solution for applications from remote education, network education, mobile learning and so on.4. Application implementation of proxy signature in distance educationAs far as the concrete applications in remote education are concerned, we design electronic graduation and degree certificate management system and network online oral defense system. The two kinds of application system have many advantages such as high security, good efficiency and convenience, compared with traditional graduation and degree certificate.Because the technology of proxy signature owns lots of security properties, it has comprehensive application prospect in many surroundings such as remote education, network education, mobile learning, virtual laboratory, electronic government and electronic business. However, the theory fundamental and related technology of proxy signature does not mature. As far as practical application is concerned, related schemes, systems and framework are not setup. Deep researches on relevant theory and application patterns will bring positive and long influences to the security and application contents of remote education network.
Keywords/Search Tags:Distance Education, Signing Authorization, Proxy Signature, Model, Software Implemention
PDF Full Text Request
Related items