Font Size: a A A

Public Key Authentication And Its Application Research

Posted on:2013-01-03Degree:MasterType:Thesis
Country:ChinaCandidate:J DuanFull Text:PDF
GTID:2248330395969027Subject:Basic mathematics
Abstract/Summary:PDF Full Text Request
Self-certified cryptosystem,as an intermediate type betweencertificate cryptosystem and id-based cryptosystem,doesn’t need explicitauthentication to public key by certificate which exists in the formerone,and avoids the key escrow problem that exists in the later one.That is,Self-certified cryptosystem has some advantages as follow:1.The public key is generated by both the user and the certificateauthority.The certificate authority calculates the partial private key of theuser,then the user utilizes the partial private key to generate his ownprivate key,then the key escrow problem is overcome in identity-basedsignature schemes.Therefor Self-certified cryptosystem is much safer;2. The verifier can verify the validity of the signature and theauthenticity of public key simultaneously in a single step.No certificate isrequired for verifying the authenticity of thepublic key.Therefor,the costof caculation is lower;3.During the process of verifying, no certificate storage is needed.Sothe storage space is saved;4. During the process of verifying, no certificate transmission isneeded.So the cost of caculation is lower.Based on Merging Self-certified public key scheme,we do some workas follow:1. A new self-certified proxy key distribution scheme is proposed.Wefirst give its formal model and then describe the proposedscheme.Finally,we analyze its security and correctness.2. Based on Merging Self-certified public key scheme,a new blindparameters signature scheme is proposed.we then prove its security andcorrectness.3. Merging Self-certified public key scheme and short signature,wepropose a new short signature,and then prove its security and correctness.4.Merging Self-certified public key scheme and the former twoschemes,we first propose a new short blind signature,and then prove itssecurity and correctness.
Keywords/Search Tags:Self-certified public key, Proxysignature, Key distribution, Blindsigncryption, short signature
PDF Full Text Request
Related items