Font Size: a A A

Research Of Several Digital Signature Schemes And Its Application To Intelligent Home Furnishing

Posted on:2015-03-14Degree:MasterType:Thesis
Country:ChinaCandidate:T HeFull Text:PDF
GTID:2298330422984663Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the development of computer software and hardware technology, more and moreintelligent home devices and handheld devices have been widely popular. On the one handthese devices make our lives more convenient; on the other hand safety problems also exist inother equipment to be solved. The digital signature technology is the main security researchon this part, but the digital signature application is mainly in terms of online transactions andelectronic cash, intelligent devices used for digital signatures is more a lack of research in thissection. Therefore, design reliable and efficient digital signature scheme for intelligentdevices is of great significance and value. This paper studies the basic proxy signature andthreshold signature and its application has achieved some results.First analysis and research the nature of proxy signature and its characteristics. For thecase Rongliang Ge program relies on a secure channel does not apply to intelligent devices. Ifthe secure channel is stolen, the public key attack and malicious KGC attack can be used. Dueto real life does not absolutely reliable secure channel, proposed scheme does not rely onsecure channel designated verifier proxy signature. Using the properties of bilinear to improvethe efficiency of the program and can be secure communication in the ordinary channels.Then, Combined with knowledge of bilinear pairing and the think of weights fordinfferent agents, Propose a new privilege set threshold proxy signature scheme, only theagents and privilege agents reach the threshold that can produce a valid signature and achievemutual supervision. Finally, analyze and prove the correctness and security of the scheme, theresults show that the new scheme meets safety requirements of privilege set threshold proxysignature.Secondly, Analysis of existing RFID authentication protocol, found the program ofHengshan Zhang exists RFID tags track problem, and requires the use of symmetric andasymmetric cryptography computational and efficiency is relatively low. According to thedifferent requirements propose three new RFID tags agreement. Safety and correctness of thethree options were analyzed and proved, the results show that the new scheme satisfies thesecurity requirements of RFID tags.Finally, introduction the intelligent home system and its security issues, apply thescheme that given in Chapter IV to the intelligent home, proposed a simple security protocolfor intelligent home systems. Analysis its unforgeability and non-repudiation andAnti-collusion attack and privileged to participate, the results indicate that digital signaturescan correctly authentication between the user and the home gateway, meet the safety requirements of intelligent home systems.
Keywords/Search Tags:proxy signature, threshold proxy signature, bilinear pairing, RFID protocol, intelligent home furnishing
PDF Full Text Request
Related items