Font Size: a A A

Research On Efficient Signcryption Technology And Application In Manufacturing Production Process

Posted on:2013-05-13Degree:MasterType:Thesis
Country:ChinaCandidate:X G YanFull Text:PDF
GTID:2248330395465491Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Nowadays, more and more the storage, transmission and processing of the informationon the openning network, it will cause these information vulnerable to eavesdropping,interception, tampering, forgery and replay of threats and other attacks. In the modernmanufacturing process, the communications, contacts, collaborative works betweenenterprises, between enterprises, between departments and between workshops, manycommercially sensitive information will be produced andused inevitably. However, nowinformation systems used commonly in enterprises do not give sufficient security support. Itsfeatures are too simple to satisfy the needs of enterprise information security and theprotective capability of traditional encryption and signature for information is lacking.Researching and developing the efficient signcryption algorithm for manufacturing processwould greatly improve enterprise security and authentication mechanisms and catalyse theprocess of enterprise informatization.The cipher algorithm build based on bilinear pairing in special elliptic curve not only hasthe advantages of high security, short keys and implementation speedy, but also has thefunctions to achieve hard by traditional algorithms. This paper designs an efficientcertificateless ID-based signcrption scheme using bilinear pairing as a tool. And designs asigncryption framework of PDM for product data management in the enterprises hopes toapply information security management in the manufacturing process. The main researchcontents of this paper are as follows:Firstly, after analyzing signature scheme based on identity, then presented an efficientcertificateless ID-based signcrption scheme using bilinear pairing. The scheme can becomplete the encryption and signature functions for information in a logical step and itscalculation is smaller, communication cost is low, security is improved significantly.Secondly, through in-depth study of efficient ID-based signcryption system, designed asequential multi-signcryption scheme. On this basis, the scheme solves the problems ofsignature and encryption at one time without key escrow. Through the verification andanalysis, this scheme is safety in the random Oracle model of security. Concurrently, the scheme obviously improves the efficiency via compared with the several current classicschemes.Finally, under the premise of security guarantee, this paper designed off-line signcryptionserver using efficient certificateless ID-based signcrption system, and offered the user whofirst connected system a private key. In this way, the user can communicate with other onesindependently without server in open network environment and the encryption server alreadynot was a communication bottle-neck for reducing the pressure. Achieving both digitalsignature and public key encryption in one logical step, enhancing the efficiency of security,the system can be used widely because of its little computation and low communication costin enterprises or security departments such as factories、 governments、banks, etc.
Keywords/Search Tags:PDM, Bilinear Pairing, ID-based Cryptographic, SequentialMulti-Signcryption, Signcryption server
PDF Full Text Request
Related items