Font Size: a A A

Research Of Distributed Digital Signature Based On P2P Network

Posted on:2011-10-16Degree:MasterType:Thesis
Country:ChinaCandidate:H F ChengFull Text:PDF
GTID:2178330302462079Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Recently,P2P (Peer-to-Peer)has been used widely, and has become one of the most important applications in Internet. P2P is different from the traditional Client/Server (C/S)mode,without limiting the network size, and unfixed network topology. There is no centralized server in the network,and all nodes are equal.You can join or leave the network at any time.Since the decentralized nature of P2P network node is dynamic, autonomous,self-organization,and heterogeneous,it makes the P2P network system To provide digital signature very difficultly with no central node in the circumstances.Thus the digital signature key distribution also faces security problems.At present,domestic and foreign scholars take studying authentication, digital signature in P2P environment as an important one of the topics.So,it has great significance to study digital signature in the distributed P2P environment.Based on the research of elliptic curve digital signature algorithm and threshold cryptography share technology,the article designs elliptic curve threshold digital signature scheme on P2P environment which has the trust node and enhances safty.Its main work is described as follows:1.Firstly,the international research status of P2P network and distributed digital signature based on P2P network is illustrated.It analyses elliptic curve cryptography theory,threshold signature technology, verifiable secret sharing scheme,proactive secret sharing scheme,sub signature technology,and elliptic curve digital signature algorithm and (n, k) threshold scheme based on elliptic curve cryptosystem.2.The threshold program having the trust node and enhancing safty based on the elliptic curve digital signature is provided in P2P environment,which uses elliptic encryption technology and safe elliptic curves, combining with the threshold system,verifiable secret sharing and proactive secret sharing system.The trust node is different from the past, which is only responsible for producing the key, the sub-key and distributing sub-key.Then it revokes the key immediately to ensure key security.3.Program provides the trust nodes which the trust model gives, selecting the node that has a higher authority as server CA, followed by the node as an upgrade server, and the node that has trust as a Share CA. The whole system consists of the higher level server CA, upgrade servers,Share CA and combiner servers.4.All PDDSS(Peer-to-Peer Distributed Digital Signature System, PDDSS)system performance is analyzed:PDDSS over all system safety analysis,program stability analysis,PDDSS overall system fault analysis. The various stages of PDDSS system safety analysis is discussed,including the key distribution phase of safety analysis,digital signature stage of security analysis,PSS take the initiative to upgrade the key stages of safety analysis,sub-signature verification phase of security analysis,Combiner server security issues.System complexity analysis is discussed,including the key distribution phase of complexity analysis,digital signature stage of complexity analysis,PSS key stage of upgrading complexity analysis, sub-signature verification phase of complexity analysis. 5.A distributed network environment is built which on the threshold elliptic curve digital signature program,and PDDSS digital signature system is realized in this article.Thus the system model is given,which tests signing various stages of the process analyses experimental data. Experimental results show that the program can ensure the confidentiality, integrity and availability.
Keywords/Search Tags:elliptic curve, digital signature, threshold cryptography, verifiable secret sharing, proactive secret sharing
PDF Full Text Request
Related items