Font Size: a A A

Identity Based Threshold Proxy Signature System On Cloud Platform

Posted on:2014-07-24Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y QiaoFull Text:PDF
GTID:2268330392469570Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the arrival of the era of cloud computing and the rapid developmentinformation technology, information security has become a growing concern, identityauthentication as an important branch of the field of information security is becomingmore and more important for people. The electronic signature is a common means ofidentity authentication. In real life, people often want to delegate own signature rightsto their trust assistants, so that these assistants can take his place to complete thetedious affairs. What is said above is proxy signature. Threshold proxy signaturedeveloped in the proxy signature basis, the original signer can delegate his or hersignature right to a group of people, while do not need all these people involved inwill be able to do signature on behalf of the original signer. In addition, Identity-basedpublic key cryptography gets a wide range of development and application because ofits advantages.Firstly, this paper analyzes the existing research of the identity based proxysignature and the identity based threshold proxy signature. Then this paper focuses onLiu threshold proxy signature algorithm, and makes the detailed analysis for theirspecific procedure and performance. We found that communication complexity andcomputational complexity of these existing algorithms are relatively high, it seriouslyhampers identity based threshold proxy signature becoming an application to our reallife.Then, based on the insufficiency of these existing algorithms, main works of thispaper are as follows:(1) Make the identity based threshold proxy signature algorithminnovatively applied to cloud platform, and design identity based threshold proxysignature algorithm process on the cloud platform.(2) Adapt the existing algorithm tothe cloud platform, and greatly reduce the communication complexity andcomputational complexity of existing algorithms.(3) Implement the identity basedthreshold proxy signature system on cloud platform using the improved algorithm.(4)Finally, prove the efficiency and feasibility of the scheme through the detailed theorycontrast analysis and experimental data.
Keywords/Search Tags:cryptography, identity based, threshold proxy signature, identity authentication, cloud platform
PDF Full Text Request
Related items