Font Size: a A A

The Research Of Identity Based Encryption

Posted on:2008-03-21Degree:MasterType:Thesis
Country:ChinaCandidate:F QiuFull Text:PDF
GTID:2178360212996324Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development and popularity of the Internet, the advancement of the Internet technology and the application of the Web-based system, the network security received more and more regards. Especially the appearance of the finance transaction or other finance processes on the network let people understand the importance of the transaction security and the information security of the data delivery.Using the technology of cryptography to encrypt the data to be transferred is the easiest and most directive method to ensure the security of information.The appearance of PKI well resolved the management and modification of the keys. This system uses the regime of certification to distribute the key. Thus, the distribution, modification, revocation, maintenance, and management of the key correspond with the requirement of systematization. Among all these functions mentioned above, the most cardinal is the management and authentication of the certification. Furthermore, the whole regime operates smoothly. At the same time, the level certification is also taken into consideration. However, PKI has some shortcomings, cumbersome and complex, the high costs, the immense amounts data of the certification, and the inconvenience of internet transmission. Along with the development of internet technology, these shortcomings expose more and more.Due to the widespread application of the Internet, the former slack practice of security facing Internet cannot sufficiently ensure the security of information. PKI proved not to be a reliable system. The business community is aware of this, at least the cumbersome and complex, the high cost exiting in the process of the implementation and use. As a newer technology of encryption in the cryptography, the appearance of IBE provides the communication of information with more convenience.Since the emergence of IBE, the application of it in the internet security has been attracting the notice of many experts. People want to combine the IBE technology with the exploitation of e-commerce and e-government systems. All of them hope to achieve the security of the data transmission and the normal operation of e-commerce by the use of new technology and new mode. It is precisely because of the importance of the IBE, it is necessary to study it.IBE technology is mainly use arbitrary string as a public key to encryption. And as other non-symmetric encryption technology, it solves the problem of thekey's quantity. Its main characteristic is the choice for the public key, it can use arbitrary strings. It relieves the emergence of the certificate, This is obviously to reduce the amount of authentication information among entities during data transmission process .It also reduce the need for cross-certification by the joint structure, decrease the demand for the bandwidth of net, decrease the communication entity authentication calculation which narrow the space of the storage certificate and achieved the function of decryption offline.Using IBE technology to resolve the problem such as certification and authentication in the network has the following advantages:First of all, it reduces the amount of authentication information among entities during data transmission process and decrease the cost of certificate maintenance. Second one, it is more natural to keep the identity and the public key together to achieve the original purpose of the certificate. At last, it is the simpler method to resolve the problem of authentication in trusted domain with levels; it is more efficient than PKI system to achieve the same function.The process of IBE system model implementation is using AES encryption technology to encrypt the data delivering on the net, Using IBE technology to encrypt the AES key "through the opponent's identity". And decrypt cipher text must know AES key, to solve AES key must have the private key relative to the identification of the receiver. And this private key is calculated by the PKG, using system the overall parameters on initialization time and the identification of receiver.Technology continues to improve, thereby, people's demand of it also increases. Traditional technologies have not been able to adapt to the new needs of market. The problems exiting in the PKI system has begun restricting the development of network applications. To resolve this, the new technology must be integrated to bring about the new energy in order to better serve the network applications.This paper describes the IBE technology in details, analyses the advantages of it and proposes the realization of IBE model system. Implementation of IBE simplified model system can be used for the safe transmission of data. Its application is widespread, especially for the online transactions and e-commerce; it could keep the better safeguard of data.
Keywords/Search Tags:Encryption
PDF Full Text Request
Related items