Font Size: a A A

Research On Software Protection Technology Based On HIBE

Posted on:2012-03-29Degree:MasterType:Thesis
Country:ChinaCandidate:Y N HuangFull Text:PDF
GTID:2178330335952296Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the spread of computer application software industry speed the development.The software also will be rampant piracy to chase great benefits.Software piracy damages the interests of software developers and against the initiatives of the developers.it great harm to the healthy development of the software industry. Software protection technology research and development is motivated in order to maintain the normal order of the software industry and promote the rapid development of the software industry.Among the many software protection technology, encryption technology is a traditional and practical protection.In recent years,identity-based encryption (IBE) is gradually taken seriously.lt improves the existing public key encryption system which is based on the PKI with complex certificate management.The certificate that bind a valid public key and identity information to certify the user's identity is not need inIBE system.This is the biggest advantage of identity-based encryption in which the identification information is directly used as a public key to encrypt the plaintext.In reality, the key will not be able to avoid the occurrence of leakage.The basic identity-based encryption scheme display powerless when key leakage take place, because it can not complete the operation of public key revocation. In basic identity-based encryption scheme there is only one PKG which will be overburdened and become a major target of attack. The leakage of master key will make the encryption system failed. Hierarchical identity-based encryption(HIBE) is proposed to solve the shortcomings of basic identity-based encryption system with one PKG. Key-isolated scheme is based on the key evolution to reduce the harm of key leakage.This paper focuses on hierarchical identity-based encryption scheme and key-isolated scheme to explore a more secure and efficient identity-based encryption which can renew the private key without revoking the public.We are striving to improve the software protection technology.Main tasks are as follows:(1)In identity-based encryption schemes,the security of PKG is the lifeline of the whole encryption.The PKG is responsible for calculating the private key. HIBE is used to reduce the burden of PKG and risk of being attacked, then improve the safety. In the paper,the proof of security is also provided.(2)Based on the studying of key-isolated and the key evolution idea, key update of identity-based encryption was deeply studied. After that, the process and the concrete algorithm description of key update in IBE are given.The key update is an effective method to ensure the security of IBE, because the public key can not be deleted directly after leaking the key.The key-isolated encryption is proved to be chosen ciphertext secure that provide a reliable basis to integrate with the HIBE model.(3)HIBE-IKE encryption scheme is provided based on the integration of HIBE and key-isolated encryption. In this model, the burden and the risk of PKG is reduced by using hierarchical idea.At the same time, the key update is completed with less interaction.lt also support for offline update.(4)The experiment shows a variety of identity-based encryption algorithms will be more extensive research and application. This will produce a more far-reaching impact in Cryptography. IBE also can respond to the software protection technology challenges of development.
Keywords/Search Tags:Software Protection, HIBE, Key-Isolated Encryption, Key Update, HIBE-IKE
PDF Full Text Request
Related items