Font Size: a A A

Research And Application On Identity-Based Encryption

Posted on:2007-12-20Degree:MasterType:Thesis
Country:ChinaCandidate:M HuFull Text:PDF
GTID:2178360182977686Subject:Cryptography
Abstract/Summary:PDF Full Text Request
The Identity-Based Encryption (IBE) is a form of public key encryption for which the public key can be an arbitrary string, and in particular, a publicly available string or identifier that identifies a user, such as the user's name, Email address, etc. Any publicly available information that is uniquely associated with the user can be used to construct a public key, there is no need to retrieve it from the public key certificate. However, there are some problems in IBE such as identity authentication, private key distribution, key escrow and so on.Email is one of the most widely used and the most important applications on the Internet, it is simple and speedy, convenient for people to communicate with each other. Because the Internet is an open system, the Email message on it would be attacked here and there. To prevent the Email from all kinds of attacks, secure Email solutions should be proposed and used in specific fields.This paper concentrates on the theory and technique of identity-based encryption and its application on Eamil system. We use symmetrical cryptography, bilinear mapping, hash function, identity-based encryption as basic knowledge tools. The key contributions follow below.1. The Identity-Based Encryption(IBE) based on bilinear mapping which proposed by Boneh and Franklin(BF-IBE) is analyzed in detail. Some applications of IBE are achieved with simple variations of BF-IBE.2. A scheme for solving the problems of authenticating the user's identity and distributing the user's private keys in IBE is proposed. An encryption scheme and its security analysis are given.3. The key escrow from a new perspective through some improvements to IBE is solved. An improvement scheme in view of monitor is designed.4. The interaction model and security design of a secure Email system based on IBE ia analyzed. Using this skill, the system is implemented.
Keywords/Search Tags:Identity-Based Encryption, Identity Authentication, Key Escrow, Secure Email
PDF Full Text Request
Related items