Font Size: a A A

Design And Analysis Of Security Protocol

Posted on:2003-04-14Degree:DoctorType:Dissertation
Country:ChinaCandidate:H Z TongFull Text:PDF
GTID:1118360092970573Subject:Electronic Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of the Information industry,much technical progress take place in scope and means of communication.people take advantage of network,nevertheless more and more people feel insecurity during information communication.Virus,intruder and network crime threaten them and do cause lot damage. It goes without saying the Importance of network and Information se-curity.now,about Communication and Information security has come to people's attention.Study cryptographic algorithms and protocols is a very important research subject,which is the core technique of the Information security-Cryptography. This paper focus on the following research work:1. Analyze the existing basic Public-Key Encryption schemes,After that An efficient Certificate-Associated public key encryption scheme is povided and implemented. The scheme is more efficient than the basic Cramer-Shoup's encryption scheme while its security against adaptive chosen cipher-text attack can be proved under the hardness assumption of decisional DifHe-Hellman problem.2. Study existing digital signature and develop an efficient digital signature based on certificate data. It is provably secure in the random oracle paradigm and its computation cost is just one exponent and one multiplication together with on addition at the signer side and the online computation is one multiplication together with one addition. It is more efficient than the RSA based signature scheme in the random oracle paradigm and suitable for smart card applications.3. Look into basic identification schemes,present and implement a identification scheme based on Certificate data.The scheme is provably secure if the underlying primitive-discrete logarithm problem is a hard problem,together with the existence of collision free hash functions.4. Study existing key-exchange protocols,promote and implement a key exchange protocol under the hardness assumption of the decisional Diffie-Hellman problem as well as the existence of collision-free hash functions.5. Extended above schemes to elliptic curve and implement them.6. Analyze advance signature and identification scheme,A deniable authentication scheme is developed.This Deniable authentication is suitable for argy-bargy prototype.
Keywords/Search Tags:Decisional Diffie-Hellman problem, encryption, signature, key-exchange, identification, deniable authentication
PDF Full Text Request
Related items