Font Size: a A A

Study On The Protocols Of Location-proof And Authentication Based On Bilinear Pairing

Posted on:2015-02-28Degree:MasterType:Thesis
Country:ChinaCandidate:X L ChenFull Text:PDF
GTID:2268330431954555Subject:Basic mathematics
Abstract/Summary:PDF Full Text Request
The emergency of Elliptic Curves Cryptography(ECC) in the min-1980s greatly accelerated the development of Public-Key Cryptography. Currently,the most widely used three types of Public-Key Cryptography are ECC, RSA, ElGamal. ECC supports shorter secret key,higher efficiency and safety than other Public-Key Cryptography.160bits of ECC provide the same security as the1024bits of RSA. ECC can provide the same functionality which other Public-Key Cryptography supports, its security is based on the elliptic curve discrete logarithm problem(ECDLP). Over the past two decades, ECC got a lot of achievements in theory and technology. In2000, Joux first discovered that drawing support from ECC and Weil pairing could construct a protocol for tripartite key agreement. From then on, people apply the Weil pairing and Tate pairing to construct various cryptosystem and cryptographic protocol. In this paper, we mainly discuss the research of Location-proof and identity authentication.Consequently, we raise relevant cryptographic protocol and discuss their validity and security.(1)With the popularity of the smartphone, the power of smartphone has grown more and more rapidly. Smartphone becomes an integral part of people’s lives.For example, we can obtain our location information from smartphone conveniently,this help us to enjoy the services based on location(i.e. Location-Based services, LBS). Location-Proof presents that one side prove his/her location information at sometime to the other side with the help of the trusted third party. We propose a protocol of location-proof which use smartphone and WiFi to prove location information to the verifier. By using the cryptography technology and appropriate parameters,our protocol ensure validity and security. Compared to other similar protocols, our scheme has more advantages in terms of secret key and efficiency.(2)The rapid development and wide application of computer and data communication networks makes how to ensure network security becoming hotpots. In the open network environment, identity authentication is a very import field of application. Mutual authentication can make sure that the two parties in the communication are both legal. Communication with the desired partners is critical in good faith, mutual authentication can be obtained by cryptography.The confidentiality and timeliness are import problems in the process of identity authentication. In this paper, we propose two identity authentication protocols by using the bilinear pairing. They have higher security and realize not only one-way authentication but also mutual authentication. We can adopt appropriate style of authentication in the different background.
Keywords/Search Tags:bilinear pairing, elliptic curves, authentication, protocol, smartphone, Hash function
PDF Full Text Request
Related items