Font Size: a A A

Key Technology Reasearch On Mobile Digital Signature

Posted on:2015-03-08Degree:MasterType:Thesis
Country:ChinaCandidate:H Y ZhengFull Text:PDF
GTID:2298330467463887Subject:Electronic Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of science and technology, mobile terminal has multiple functions. Meanwhile, a variety of security and privacy issues on mobile terminal have been exposed. On the mobile terminal, identity authentication or other measures should be taken to solve the related information security issues, ensuring the data security and reliability. Digital signature technology is a kind of identity authentication technology, and can solve the forgery, tampering, posing, repudiation problem, and also has high security. Digital signatures have been more in-depth research, and have been used in a variety of scenarios. This paper focuses on the digital signature on mobile terminal.This paper based on studying the characteristics of mobile terminal, designs the scheme of mobile characteristic digital signature. The main research work and innovation points are as follows.Firstly, according to the mobile terminal properties, this paper determines the study object of mobile terminal characteristics are location information and mobile information device. This paper studies system structure which is suitable for digital signature on mobile terminal, and also optimizes basic algorithm of the implementation process of elliptic curve digital signature algorithm.Secondly, according to the characteristics of mobile terminal, based on research location information and mobile terminal information, this paper combines them with digital signature into mobile characteristics digital signature scheme. This paper proves its correctness and with high security as well.Thirdly, according to mobile characteristics digital signature scheme and mobile digital signature system structure, the mobile digital signature client is realized. The contents are mainly divided into the access authentication, digital signature and authentication, data encryption and decryption. In the digital signature and authentication, and in data encryption and decryption part, on the basis of implementing respective processing functions, this paper makes special designs and implements for different type files.
Keywords/Search Tags:Mobile Characteristic, Access authentication, LocationInformation, Digital Signature
PDF Full Text Request
Related items