Font Size: a A A

Anonymous Authentication System Optimization Design And Verification

Posted on:2010-01-14Degree:MasterType:Thesis
Country:ChinaCandidate:X W LiFull Text:PDF
GTID:2208360275498430Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the development of the mobile communication,the safety of the communication among mobile nodes is becoming a hot spot,especially the security in Ad-Hoc network.PKI(Public Key Infrastructure) is a security-structure in the communication field which is used commonly.PKI is a infrastructure which offers security service by using Public-key theory and technology.But the traditional PKI used the Centralized CA(Certificate Authority).When it comes to the mobile self-organized networks among the mobile nodes,a mobile node should be chosen to hold the position of CA.If there is something wrong with the CA node, the entire communication field will break down.The nodes deviated from the communication field is possible because of the strong mobility of the nodes,and this can affect the normal operation of the entire mobile communication field.In order to improving the inapplicability of the traditional PKI for the self-organized networks among the mobile nodes,a distributed anonymous certification system which is based on PKI is designed in this paper.The certification system inherits the frame of PKI and is more suitable for the the mobile nodes.The anonymous certification system designed in this paper is using the threshold theory to change the traditional single CA system into distributed multi-CA system.The protocols of anonymous certification system are designed and optimized in the dissertation,and the content of the protocols is described in detail.Meanwhile,aiming at the trait of the strong mobility of the nodes,another chain type authentication method is introduced,which makes the system taking a composite authentication method.And the success rate of authentication is rised by using the composite authentication method.This dissertation raised a blueprint which can endue the distributed CA nodes different weights and is more suitable for the practical application.The USB KEY is combined to the system,and the safety and the operation efficiency are increased.The physical authentication in the process of adding a new node,the generation of the RSA parameters,and the encryption and decryption of the information, all of above need the participation of the USB KEY.At last,the safety and the capability of the protocols are analyzed and validated, which is compared to the traditional protocals.
Keywords/Search Tags:RSA, threshold theory, distributed PKI, protocol design, variable weight, USB KEY
PDF Full Text Request
Related items