Font Size: a A A

Based On Elliptic Curve Cryptosystem Door The Signcryption Study

Posted on:2008-10-10Degree:MasterType:Thesis
Country:ChinaCandidate:G F HuangFull Text:PDF
GTID:2208360215966544Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Dissertation introduces cryptographic technology to the research background, the actuality of home-abroad research and significance,and the application at present field with the developing direction in information safety in future. In the dissertation, we analyse Elliptic Curve Cryptosystem, symmetrical cryptosystem, the threshold secret sharing scheme and the threshold digital signature scheme based on ECC. Then we investigate the signcrytion scheme and the threshold signcrytion based on ECC, propose a (t,n) threshold sharing unsigncryption scheme with CA based on the ECC consulting the principle threshold and signcrption. It is did the crucial research to the scheme:(1) The arithmetic of Elliptic Curve is created by used the standard parameter, and the rand and the basic point of EC were determined by the arithmetic of Elliptic Curve formed.(2) The encryption and decryption of message based on DES is realized.(3) The digital digest is produced.(4) The signcryption arithmetic is generated.(5) The threshold sharing unsigncryption arithmetic is verified.(6) The database is designed.The proposed scheme combines the advantages of symmetric cryptogram, Shamir's threshold scheme and Junng's scheme. It not only provides the low computation and communication cost, but also secrecy, authentication, resisitance of malicious recipient's members cheating, thus it satisfies the request of group's communication and has great threoretic value and application prospect for the restriction of storage and computation developed hardware. Except for the common characters of the signcryption scheme, the proposed scheme comes true the complete anonymity of the sender, which mostly protects the privacy of senders.Finally the (t,n) threshold sharing unsigncryption scheme was realized using Java based on the ECC according to the theoretic result of the dissertation. It is elucidated that the proposed scheme not only is feasible, but also the better secrecy, the better safety, the better authentication.
Keywords/Search Tags:Elliptic Curve Discrete Logarithm Problem(ECDLP), Elliptic Curve Cryptosystem(ECC), Signcryption, Unsigncryption, Threshold Cryptosystem
PDF Full Text Request
Related items