Font Size: a A A

Research And Application Of Server-aided Verification Signature

Posted on:2018-05-12Degree:MasterType:Thesis
Country:ChinaCandidate:Y N LiFull Text:PDF
GTID:2348330515499725Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of network technology and the continuous growth of technology in mobile communication,mobile devices become an important part of people's life,such as: mobile phones,IPad,electronic keys,etc.,which brings great convenience to people's lives,people can carry out shopping,video,access to various network resources and other activities at any time.Limit by lower computing power of terminal equipment,which affects people's good experience on some network resources.The emergence of server-aided verification technology has effectively solved this problem.With the promotion of cloud computing technology and the arrival of globalization of information,all kinds of companies,enterprises and other organizations protect their own information resources and they also need to strengthen the sharing of external network resources at the same time.These organizations have their own domain,if external users must access resources in some domain,then identity authentication is required through the domain,which produced a cross-domain authentication technology.Combining the relevant knowledge of cross-domain authentication technology and cryptography,this paper presented an efficient cross-domain identity authentication system against collusion attack.The main work of the paper is as follows:(1)By analyzing the existing server-aided verification scheme based on aggregate signature,the new security definition is given in this paper.Considering that the server is not only conspired with the legal signer,but also with the illegal signer,which presented a new server-aided verification scheme based on aggregate signature.(2)Combining the signature technology of server-aided verification and identity-based proxy re-signature scheme,this paper presented identity-based server-aided authentication proxy re-signature system and the security definition is given on its,which provides a solution to carry out cross-domain authentication for low-end devices.(3)To build a cross-domain authentication system for cloud computing,cross-domain authentication uses identity-based server-aided authentication proxy re-signature scheme.The system can be effectively applied to low-end computing devices such as mobile phones to ensure system security.
Keywords/Search Tags:ID-based sever-aided verification proxy re-signature, bilinear pairing, multi-linear maps, collusion attack, cross-domain authentication
PDF Full Text Request
Related items