Font Size: a A A

Research On Identity-Based Identification And Its Application

Posted on:2010-05-14Degree:MasterType:Thesis
Country:ChinaCandidate:B Y QuFull Text:PDF
GTID:2178360278969168Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the deepening research of ID-based cryptosystems, a large number of ID-based cryptographic protocols emerged. At present, there are lots of identity authentication schemes between a server and its users. However, some certain situations, such as combat identification friend or foe system, also demand for identity authentication scheme which can perform well at the user-to-user level. This thesis mainly focuses on technology of designing an user-to-user identification protocol.Firstly, we give a detailed discussion on the framework and model of pairing-based identification schemes, as well as its security. After that, a concrete ID-based identification protocol (named PIBI) was proposed using bilinear pairing, presumed the hardness of discrete logarithm problem and computational Diffie-Hellman problem. Then the correctness and security of the proposed protocol was proved. Its computational efficiency was illustrated by a concrete implementation, with the help of PBC library, under considerable secure parameters.Secondly, taking the specific situation of cooperative identification friend or foe (CIFF) system into consideration, we expand the proposed ID-based identification protocol into two CIFF suitable schemes: within one scheme the working parameters were shared among all of its trust centers; and the other one's trust centers were granted to choose working parameters for themselves.At last, some further topics concerning the application of these schemes were covered, such as the key management issue and its security in usage. The proposed identification protocol can be conducted via non-encrypted channel. Since it, on one hand, needn't convey the secret information holding by participants, and on the other hand, introduce random numbers during the interactive process for the purpose of dynamic authentication. The expenditure of maintaining trust channel for authentication sessions can thus be saved. In order to carry out key revocation, the protocol deploys symmetric key among the trust centers and their users. This key management manner, to some extent, overcomes the unsuitableness of ID-based cryptosystems for its drawback in key revocation.
Keywords/Search Tags:identity based identification, bilinear map, provable security, random oracle model, identification friend or foe
PDF Full Text Request
Related items