Font Size: a A A

Research On Secure Authentication Mechanism From Bilinear Pairings

Posted on:2011-02-28Degree:MasterType:Thesis
Country:ChinaCandidate:S S HuangFull Text:PDF
GTID:2178360305498812Subject:Systems analysis and integration
Abstract/Summary:PDF Full Text Request
Bilinear pairings are a common tool in cryptogram. According to its feature, we can design some cryptogram algorithms which are adapted to many kinds of network. In this paper, we focus on the research of application of bilinear pairing in the network. And based on its feature, we design two kind of algorithms. One is used in large network and the other is used in Ad-hoc network. We analyze their security.The major contributions of the paper are as follows:●An scalability authentication protocol based on bilinear paring is proposed, which can be used in internet with strong authentication. To solve the problem that most users can't protect their authentication certificate correctly, the authentication proto-col can leverage this problem through using partial user's authentication certificate stored in the server. There are several advantages over the former protocol, in-cluding:(1) By using the bilinear group, the length of public parameter and keys decreases with the same security level, hence we reduce bandwidth needed in com-munication, thus the protocol is more suitable for the huge internet system. (2) it incorporates a 3-factor authentication mechanism used in detecting compromise. (3)The password can be canceled by user's requirement. (4) The protocol has great efficiency and scalability implement.●an bilinear-pairing based hybrid threshold signature which is used in Ad-hoc net-work. This scheme, which focus on many disadvantages in Ad-hoc network such as limitative resource, mutative topology and lower bandwidth, uses bilinear-pairing and combined with hybrid threshold signature to design an bilinear-pairing based hybrid threshold signature used in Ad-hoc network. The proposed scheme resolves the problem of security of signature and key in Ad-hoc network. The scheme can not only improve the network transmission efficiency and save bandwidth, but also make the security and efficiency more suitable for the Ad-hoc network. The scheme analysis and the simulation statistics demonstrate the efficiency of the proposed scheme.This paper designs two algorithms which is based on bilinear pairings, analyzes the security of two algorithms and design a emulator.
Keywords/Search Tags:digital signature, bilinear pairing, Ad-hoc network, identity authentication, threshold signature
PDF Full Text Request
Related items