Font Size: a A A

Research On Merkle Authentication Tree Traverse And The Application In Digital Signature

Posted on:2010-07-15Degree:MasterType:Thesis
Country:ChinaCandidate:F LiuFull Text:PDF
GTID:2178360275451216Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In this time, the network is to make our life changing a lot. E-commerce activities have gradually entered the lives of ordinary people, but in e-commerce activities, how to ensure the well-off development of business activities and the security of electronic information, are questions that can not be ignored. Digital signature, which is one of an important security technology, plays an important role in ensuring data integrity and non-repudiation in network communication, and with the development and diffusion of the network technology, Digital signatures will be more and more important. Merkle authentication tree is arose to solve authentication problem in the one time signature, Merkle authentication tree have remarkable advantages in authentication, because it can authenticate a lot of data using only one signature. Today, Merkle tree structure has been widely applied to many security fields, such as certificate revocation, multicast source authentication, group key agreement and so on. Besides that, the security of Merkle authentication tree signature is only dependent on the security of hash function, and it is not needed too much theories and assumptions, which makes the Merkle authentication tree signature more secure and practical. Fully up, we can see that the research of Merkle authentication tree and Merkle authentication tree signature will have the theoretical and practical value.In this paper, basing on the existing studies, the thesis makes a systematic and deep research on using Merkle authentication tree in digital signature technology and enhancing the efficiency and security of the Merkle authentication tree. The main work and innovation are as follows.The thesis presents a optimize time and space scheme in the Merkle tree traversal, in the traversal scheme we described the way using to improve the time and space efficiency in detail.and we described the traversal process, then, we prove the correctness and we analyzed its time and security performance, the result shows that it has the best time performance and its space performance is reasonable.The thesis presents an encryption scheme using the bilinear pairing technology, the encryption scheme has the function of two-way authentication and we proved the correctness and analyzed performance. This encryption scheme will be applied to the Merkle authentication tree signature. This is the first time that Merkle authentication tree signatures and identity-based authentication mechanism is combined, it is to improve the flaws that Merkle authentication tree signature can not be authenticated. In addition, this paper improves the security of the Merkle authentication tree signature which should not resist an attacker to replay attacks.A dynamic Merkle authentication tree signature scheme is presented. We improve the infects in the original signature that the number of the signature influence the scale of the authentication-tree, and the increasing of the number of signature makes lower efficient. In our scheme, the number of signature is not affected by the scale of the authentication-tree. In addition, we do a safety analysis to our scheme, the results show that our scheme is as safe as the original Merkle authentication signature tree, and because of the using of the key management according the time, the signature also has forward-security.
Keywords/Search Tags:merkle authentication tree, digital signature, identity-based authentication, traversal
PDF Full Text Request
Related items