Font Size: a A A

Research And Implementation On The Application Of Identity-based Encryption Architecture

Posted on:2009-08-02Degree:MasterType:Thesis
Country:ChinaCandidate:B H LingFull Text:PDF
GTID:2198360245475096Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of computer technology and popularization of internet, the office systems online of the organizations such as enterprise, government and school develop rapidly, the services like e-business and email and the technology like net communication are used widely. The online systems bring not only the effectiveness and convenience, but also the security problems during the transmission; cryptology is such a science to solve the network security problem. Currently, PKI is the most popular solution on security, but the PKI involves a series of operation and management on certificate, such as certificate signature, issue, revocation, validation and so on. The flaw of complex deployment and inconvenience in use prevents PKI to be widely used. Identity-based encryption is a new form of asymmetrical encryption; it uses the identity information as the public key and avoids the opertions on certificate, it's a new approach to solve the security problems for network with IBE.Firstly, this paper introduces the basic theories on cryptology, analyzes the IBE model, IBE schemes and the security problems in IBE(including authentication, private key management on PKG server, private key trusteeship and so on) and proposes our solution. Then this paper proposes a secure application architecture with IBE, designing all parts of the architecture and giving the analysis about security. Finally, based on the BF-IBE code, we design and implement the above architecture on email, giving the demo system and some analysis.
Keywords/Search Tags:Identity-based Encryption, Private Key Generator, bilinear maps, Private Key distribution, IBE client
PDF Full Text Request
Related items