Font Size: a A A

Research On Trusted Time Stamp Service System Based On Authentication

Posted on:2017-01-20Degree:MasterType:Thesis
Country:ChinaCandidate:S ZhangFull Text:PDF
GTID:2308330509452146Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the continuous development of information technology, computer is increasingly involved in people’s working and learning. At the same time, more and more sensitive data are communicated through the public network and computers so that data security has been involved in politics, military, electronic commerce and a series of people closely related field. With the development of the data complexity and size, increasingly importance has been attached to the safety and efficiency of data. Therefore, the trusted time stamp service is paid more and more attention because the data is easy to tamper and damage.However, there exist few methods that place an emphasis on how to combine the information of file owner with timestamp, relating file owner with electronic file which being protected so as to both owner and the copyrighted work acquire the coequal protection. As a result, linking to the Digital authentication technology in this paper, analyzing the current time-stamp protocols, aiming at built-in problems of protocols, the current time-stamp protocols are improved and a new basic protocol based on digital time-stamp of authentication is presented.The specific research work of this paper are as follows.(1) The digital signature based on the national standard has been researched. Standard time signature verification according to the national standard can guarantee the timestamp mechanism unable to temper the standard time after obtaining the standard time;(2) Researched on the time stamp protocol, public key infrastructure PKI as well as digital certificate authentication center, the identity of files’ owner can be verified by the digital signature of the trusted third party(CA), it can prevent man in the third attack; The digital digest and owner’digital signature of the electronic files can be extracted by using one-way hash algorithm,for this, there is one to one correspondence between files’ owner and electronic files; the timestamp used to ensure the time of electronic documents authentication.(3) The simulation experiment and performances test of the RSA and the ECC encryption algorithm have been done.The test results show that the new time stamp protocol can have higher safety performance, the shorter the length of the data transmission, lower storage space requirements as well as higher effective certificate issued if the use of ECC encryption algorithm.According to the above research, this paper has carried out a study and solution of problems for time stamping service in the practical application. For the use of trust principle of the digital certificate authentication center and its identity authentication, trusted time stamp and user identity can be bound, so that the timestamp protocol effective of identity authentication,have provided the more reliable proof for e-government, e-commerce, electronic notarization,copyright protection industry and so on.
Keywords/Search Tags:Authentication, Digital Certificate, Time Stamp Authority, Certificate Authority, Public Key Infrastructure
PDF Full Text Request
Related items