Font Size: a A A

Based On Elliptic Curve Cryptosystem Door The Signcryption Study

Posted on:2009-02-28Degree:MasterType:Thesis
Country:ChinaCandidate:F W ChengFull Text:PDF
GTID:2208360278470569Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of information technology, the advanced information security is eagerly desired. However, the elliptic curve cryPtosystem(ECC thereafter) is widely concerned due to the highest security of the same lengthbit. In addition,ECC also has many other merits such as less computation overheads, shorter key size, considerable bandwidth savings, and so on. So the ECC is especially suitable for situations which are limited by capability of calculation, space, bandwidth and requirement of high implementation.In this thesis, study the implcmentation of the ECC algoirthm from Practical asPect. Based on mathematics and cryPtography theory, the threshold technology was used to devis a secure ID—based signcryption scheme. Because the threshold technology is adoted not only in the master key management but also in the group signature, the scheme can achieve high security and resist some malicious attacks under a certain threshold. The arithmetic of Elliptic Curve is created by using the standard parameter and integrated some sPecific relevant algorithm, we ascertain the signcrytion scheme and the threshold signcrytion based on ECC, propose a (t,n) threshold sharing unsigncryption scheme with CA based on the ECC consulting the principle threshold and signcrption.The proposed scheme combines the advantages of symmetric cryptogram, Shamir's threshold scheme and Junng's scheme. It not only provides the low computation and communication cost, but also secrety, authentication, resisitance of malicious recipient's members cheating, thus it satisfies the request of group's communication and has great threoretic value and application prospect for the restriction of storage and computation developed hardware. Except for the common characters of the signcryption scheme, the proposed scheme comes true the complete anonymity of the sender, which mostly protects the privacy of senders.Finally the (t,n) threshold sharing unsigncryption scheme is realized using Java based on the ECC according to the theoretic result of the dissertation. It is elucidated that the proposed scheme not only is feasible, but also the better secrecy, the better safety, the better authentication.
Keywords/Search Tags:Elliptic Curve Discrete Logarithm Problem(ECDLP), Elliptic Curve Cryptosystem(ECC), Signcryption, Unsigncryption, Threshold
PDF Full Text Request
Related items