Font Size: a A A

Qr Qr Code Security Implementation And Design Analysis

Posted on:2014-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:Y S GaoFull Text:PDF
GTID:2248330395982809Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Two-dimensional code is a black-and-white distribution in the two-dimensional space. It mainly used to represent the data and has the advantages of convenient and fast. So far, It is widely used in e-commerce and ticketing systems. However, two-dimensional code is also faced with security threats such as information disclosure and information altered. We research the main problem faced by the two-dimensional code. For example, when we generated the QR code, we encrypt the source data and digital signature is mainly in order to prevent information leakage and improved security. As follows two parts:In this paper, the first section is based on the RC4encryption algorithm and combined with the international standard of the QR code. At last, generating the RC4encryption of QR code. On the basis of the design module and fully homomorphic encryption system, we design a new method is used to generate a QR code model. Its advantage is that the data completely confidential and does not affect the normal function.The content of the second part is about the signature of QR code. In this paper, we research the signature of QR code that based on the multivariate public key cryptosystems. In the future, multivariate public key cryptosystems(MPKC)is a hot candidate to resist quantum computer attacks. According to the basic structure and property of multi-variable, consider the Rainbow system. We proposed a new strong designated verifier signature scheme that base on Rainbow. Its security is based on Rainbow’s security. The purpose of add disturbance factor in the signature and interact with each other is make sure only designated verify and improve security. We consider the designated verifier signature in the widely application of proxy signature, the advantage is to prevent the proxy signature abuse of power. We proposed a new strong designated verifier proxy signature scheme that base on Rainbow, and at the same time to verify its safety. This scheme is effective to prevent the abuse agent of power. Finally, we use of the two schemes designed to QR code. In order to improve the security of QR code and use of electronic commerce.
Keywords/Search Tags:QR code, Rainbow, RC4, FHE, SDVS, proxy signature
PDF Full Text Request
Related items