Font Size: a A A

Proxy Signature Schemes Based On ECC

Posted on:2006-11-29Degree:MasterType:Thesis
Country:ChinaCandidate:H LinFull Text:PDF
GTID:2168360155954897Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Proxy signature systems have great applications in e-business whose secure-ty is based on the difficulty of integer factoring or the difficulty of solving the common discrete logarithm problem. As the development of integer factoring and the parallel computing technology, the public key cryptographies used today have to enlarge key-size which slows their speed and increases their complexity. Also, there are many attacking methods to solve the gene of a big integer and the common discrete logarithm problem.This thesis introduces the concept and the property of a Proxy signature system, we analyse two comparatively representative systems and find that there exist some disadvantages in the length of their keys, the speed of their disposal and their security.This thesis also compares RSA and the cryptosystem based on discrete logarithm problem with ECC (Elliptic Curve Cryptosystem), from the comparison we can draw a conclusion that ECC has a particular advantage in the security, the length of key, the speed of disposal, the system parameter and the demand of bandwidth. The thesis makes use of those advantages and constructs the Proxy signature system based on ECC.We also analyse and demonstrate the system whose security is based on ECDLP (elliptic curve discrete logarithm problem). Comparing with the two former systems, our system has the merits of improved security, much less key-length, faster speed of disposal, much less system parameter and much less demand of bandwidth.All of the existing Proxy signature systems suppose the communications channel maintain secure in their systems. In fact, the absolute secure channel doesn't exist. To solve the security problem, we present a new authentication protocol whose security is based on DCDLP.At the same time, the system has the characteristic of zero knowledge proof. Compare with the other systems, the system has the merits of improved security, much less key-length, faster speed of disposal, much less system parameter and much less demand of bandwidth.The system alone can also be applied to resolve the normal authenticcation problem.
Keywords/Search Tags:Proxy signature, discrete logarithm problem, cryptography
PDF Full Text Request
Related items