Font Size: a A A

Research And Implementation Of Direct Anonymous Authentication Base On Goppa Codes

Posted on:2010-07-03Degree:MasterType:Thesis
Country:ChinaCandidate:H J ZhuFull Text:PDF
GTID:2178360308490732Subject:Computer applications
Abstract/Summary:PDF Full Text Request
At present, information security issues become increasingly complex due to the rapid development of information technology. In trusted computing, trusted computing technology is increasingly becoming a new researched focus in the field of information security, it is to solve security issues. Trusted Computing Platform is consisted by the computer's hardware and software entities in addressing information security risks. The user's privacy protection is an essential factor in the credibility of the system. Computer terminal security is an important guarantee for the protection of users'privacy. Anonymous authentication is the important functions of trusted computing platform, it protects the users'privacy better, while it has become a current research focus.This paper studies the key technology of digital signatures, especially for the blind signature technology conducted in-depth study. In the analysis on the basis of several blind signature, based on Goppa codes and McEliece public key cryptosystem,this paper proposed a new blind signature schemes - The blind signature scheme based on McEliece public key cryptosystem, and does the analysis of the program's security.Secondly, this paper deeply studies the direct anonymous authentication scheme, such as: its'research background, stage of development, implementation mechanisms and specific agreements. At present, direct anonymous authentication program is mostly based on large integer factorization and discrete logarithm problem.However, with the emergence of quantum computers, We can go to solve large integer factorization and discrete logarithm problem that we can't do before.Therefore, the traditional post-quantum (Post-Quantum) encryption technology becomes hotspot.After researching Goppa codes and McEliece public key cryptosystem, combining Goppa codes with the direct anonymous authentication scheme, this paper proposes a direct anonymous authentication system based on Goppa codes, at the same time does the analysis of the new program's security.
Keywords/Search Tags:trusted computing, trusted computing module, Goppa codes, direct anonymous authentication
PDF Full Text Request
Related items