Font Size: a A A

Research On Identity-Based Cryptography

Posted on:2010-06-14Degree:DoctorType:Dissertation
Country:ChinaCandidate:Z ZhangFull Text:PDF
GTID:1118360275986796Subject:Information security
Abstract/Summary:PDF Full Text Request
Rapid development of network services, information security is becoming increasingly prominent, and has become an important constraining factor in network development. Cryptography is a one of the core technology of the information security. In the traditional public key cryptosystem, the association between an entity's identity and his public key is obtained through a digital certificate issued by a Certifying Authority (CA). However, the process of certificate management leads communication and storage overhead. In order to simplify the management of certificates, Shamir proposed public key cryptosystem based on the concept of identity in 1984.In Identity based public key cryptography, Although the concept of identity was put forward long ago, until 2001,Boneh and Franklin proposed a practical and secure identity based encryption using Weil pairing,which makes the ID-PKC become a research hot again. Since then, many identity based cryptosystems have been proposed.Therefore; it is not need the certificate to authenticate the use's public key. However, Identity based public key cryptography still have some unsettled open issues,such as key escrow,key revocation,security model building problem and so on.Study of existing solutions of key escrow problem in the identity based cryptography, the existing definition and security notions for certificateless public key encryption scheme are not so rigorous. So, in this paper we reformalize the definition and security notions for certificateless encryption scheme, and then propose an improved certificateless public key encryption scheme. We proved our secheme is secure against adaptive chosen-ciphertext attack in the standard model. Proposed scheme inhert the merits of identity cryptography and overcome the inherent limitations of key escrow problem. Moreover, proposed certificateless encryption scheme can not only external enemies but also to resist the passive resistance of the key management center (KGC) attacks.In order to resolve the existing key revocation problems in identity-based cryptosystem, many researchers have done much work. But these current scheme are limited by the use of Public Key Infrastructures (PKI) that need more computation overhead or by their scalability, requiring a number of communication rounds linear in the number of group members. To overcome the above deficiency, construct a mediated certificateless public key encryption scheme in the standard model. The mediated certificateless public key encryption scheme not only can overcome the key escrow limitation in existing identity based cryptography but also able to provide fast user certificate revocation mechanism. The existed identity based revocation schemes are proven secure in random oracle model. However, the provable secure scheme in the random oracle machine can only be seen as a heuristic argument, will not guarantee the security in realization. Therefore, we proposed the security model in the standard model, constructed a certificateless encryption scheme, and gives proof in the standard model.proposed certificateless encryption scheme can provide higher security.Further extend mediated certificateless public key cryptography to authentication scheme. On the one hand, mediated certificateless public key authentication scheme can provide fast user certificate revocation mechanism and overcome the key escrow limitation in existing identity based cryptography, and on the other hand, it can provide flexibility and efficiency. In addition, the security of our proposed scheme can be proved without resorting to the random oracle model.For mobile IPv6 network access authentication,we proposed a secure identify access authentication scheme which considers inters domain reputation relationship between mobile node home domain and the access domain in the pre-handoff procedure and realizes effective mutual authentication between mobile node(MN) and the access domain. Authentication can be accomplished by double private key, HA and MN signing the home registration messages respectively, the access authentication can be accomplished in the visited network instead of the home network, and the handover procedure integrating authentication only needs one round trip. The scheme will not only effectively reduce the latency of system certification, and double private key pairs based on CPK program can solve the problem of key escrow.
Keywords/Search Tags:Identity-based cryptography, Standard model, Certificateless public key cryptography, Key escrow, Key revocation, Mobile IPv6, Access authentication
PDF Full Text Request
Related items