Font Size: a A A

A Study Of Identity Based On Visual Cryptography

Posted on:2015-12-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2308330464968686Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the popularity of network and technology, the number of web users become more and more lager, information security is particularly important. The identity authentication as an important component of information security theory, is the first hurdle to ensure the safety of system. Authentication refers to the verifier by verifying certified attribute of an object(for example, passwords, digital signatures, mathematical proof process, fingerprints and other physical characteristics), to confirm the certified object is valid and true. In fact, authentication is the process of validation of some secret information.Visual cryptography which develops slowly up in nearly ten years, is a new branch of cryptography. It is different from traditional cryptography which handles digital information, it encrypts and decrypts images. And when you use visual cryptography scheme to encryption, you don’t need to process a large number of complex operations, you only need to overlap the share images, and then decrypted using the human visual system. For all kinds of cryptography technology which must deal with a large number of complicated calculations, visual cryptography is a novel and interesting, worthy of further research areas.Based on the preliminary understanding of the several main under the premise of the identity authentication technology, chose a simple password authentication and wide application of zero knowledge proof authentication has carried on the thorough understanding. With analyzing the advantages and disadvantages of password authentication and zero knowledge proof authentication, combining with visual cryptography, we put forward the smart card password authentication scheme based on visual cryptography and zero knowledge proof identity authentication scheme based on visual cryptography, and has carried on the simulation, the performance and security of the scheme are analyzed. The proposed scheme is compared with the original plan, low computing complexity and high safety.
Keywords/Search Tags:Visual Cryptography, Authentication, Zero-knowledge Proof, Password authentication
PDF Full Text Request
Related items