Font Size: a A A

The Design And Implementation Of The Identity Management System Based On IBE

Posted on:2015-06-04Degree:MasterType:Thesis
Country:ChinaCandidate:Q WangFull Text:PDF
GTID:2298330467986157Subject:Industrial engineering
Abstract/Summary:PDF Full Text Request
Internet technology and its applications have revolutionized the way people live. An increasing number of companies and institutions are rushing into the huge market created by Internet, leading to the higher-level development of the Internet technology and applications. However, safety issue has been ignored as more priority has been given to the improvement of working efficiency and living convenience. The emergence of IDM concept has been adopted to cope with the safety issue as it can effectively manage ID information of all users.However, the contemporary IDM technology is required to improve due to various reasons, the most critical one of which is that the ID information is excessively centralized on the uncontrollable third party. Therefore, the ID information of all users is exposed under potential threats such as stealing and illegal trading, etc.The paper introduces an ID management system with IBE, which is an improved RSA. Users will code their own verification information with the ID code provided by service provider when applying for verification. The piece of information will be used through the whole process, with which the ID provider will be able to recognize both users and service provider. Therefore, the IBE-based ID management system can tightly combine user verifications and service provider together. It strengthens the user information protection, as the ID provider is able to achieve verification of users, as well as supervision of service provider.The paper systematically elaborates on the theoretical basis and realistic approaches of IBE in the beginning. Then it describes the environment to achieve the IBE-based ID management system. The paper provides detailed argument on the major improvement of IBE-based ID management system, particularly on the procedure of registration, logging-in and application of attached information. The fourth part analyzes important procedures of system functions, such as the realization of PKG and IBE.
Keywords/Search Tags:ID management system, IBE, Information embezzlement
PDF Full Text Request
Related items