Font Size: a A A

Applications Of The Secure Communication Scheme Based On The Bounded Storage Model

Posted on:2014-01-28Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y ZhangFull Text:PDF
GTID:2248330398468662Subject:Basic mathematics
Abstract/Summary:PDF Full Text Request
At the information era, the demand for secure communication was increasing intensively. The normal secure communication used the theory of modern cryp-tography, but the unproven confidentiality of modern cryptography was based on the complexity of the computation time. Only could it reach the practical security results. The Bounded Storage Model was a new encryption model, which assumed that the attacker had unlimited computing power but limited storage capacity. D-ifferent from the modern one, the security of the Bounded Storage Model could be proved in theory. Thus it could reach the semantic security.Based on the Bounded Storage Model, the researchers had given some mod-els’implementation and the proof of their security. According to this, the applica-tion of the secure communication scheme on limited storage model was discussed in this paper. During the discussion, this paper proposed a basic communication scheme using the Bounded Storage Model, and analyzed its security. In terms of secure communication scheme, this paper proposed a BSV authentication proto-col, two online key distribution protocols named BSK1and BSK2, and a secret sharing scheme. Finally, it was analyzed the limitations and prospects of the encryption scheme about the limited storage model:firstly, there were certain re-quirements of the randomness of its use of the broadcast signal; secondly, a delay was revealed for the theory of this model inevitably; thirdly, there was a strict de-mand for the when conventional system. On the other hand, due to its theoretical security could be proved, and reach a exceedingly high encrypting and decrypting speed, the encryption scheme based on the Bounded Storage Model would achieve a better development in the future.
Keywords/Search Tags:encryption, bounded storage model, authentication protocol, key distribution protocol, secret sharing scheme
PDF Full Text Request
Related items