Font Size: a A A

Web-based Applications For Funds, The Proxy Signature Technology

Posted on:2007-05-08Degree:MasterType:Thesis
Country:ChinaCandidate:H Y LiuFull Text:PDF
GTID:2208360185953562Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Fund application System in Internet is a new running model that use modern information and network technology, it leads the direction of modern electronic government affair. With the prevalence of Internet and the development of information technology, Chinese electronic government affair resembled mushrooms in rapidity of growth. It will be propitious to break the localization of traditional government affair, to reduce the tache of government's task, to cut down working time and to save manpower and material resources. But many things working against the security of a Web system are unavoidable facts of the Internet.The Internet and the machines that connect to it are inherently insecure. The Internet was not built on a secure foundation. For much of the Internet's history, data traveled between hosts in an unencrypted, plaintext form. This data could readily be intercepted and read by a third party, potentially compromising passwords or important content. With the advent of security protocols, such as the Secure Sockets Layer (SSL), this problem of insecure data transmission has been largely remedied since data can now travel over the Internet in an encrypted form. Nonetheless, other Internet security concerns remain. The third party may camouflage one part of the two communicational parties by imitating the other. If it would have any knottiness after the event, no one tell who will answer for the result. Therefore, there must be a mechanism that could make sure it can distinguish the identity of entity (maybe a person, a company or a host) on the Internet. Digital Signature is to the moment.Digital Signature is used to ensure the origin and the integrality of data unit, it protects data from being imitated (by receiver) and it is a method for signing electronic information. We can acquire Digital Signature based on public key system or private key system and what we used most time is the former. Public key system includes common Digital Signature and special Digital Signature. Thelatter is related with some idiographic application. Such as Blind Signature, Proxy Signature, Group signature, Undeniable signature, Threshold Proxy Signature and the Signature that can resume information.In Fund Application System of my project, I searched deeply in multi-proxy multi-signature scheme and carried out the signature of personal information from authoritative organ to expert or fund proposers. At first, I analyzed the system as a whole by analyzing the integer security and the applied security of the Web system. After the embedded research of proxy signature, I design particularly a whole scheme for the register sub-system of AnHui province, natural science Fund application system. What's more, compare the scheme I adopted with some proxy Signature, I advanced two new proxy signature methods and discussed the security of them.
Keywords/Search Tags:Web security, Unsymmetrical encrypt, Multi-Proxy Multi-Signature, Multi-Threshold Proxy Signature, Multi-level Multi-Signature
PDF Full Text Request
Related items