Font Size: a A A

Research On Public Key Cryptography Of Generalized Conic Curve Over Z_n

Posted on:2017-04-16Degree:MasterType:Thesis
Country:ChinaCandidate:L L JiangFull Text:PDF
GTID:2348330518972320Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Cloud storage is a new network storage technology, and digital signature is important to ensure the security of network communication and the successful trading of electric systems.Therefore research a good cloud storage platform of digital signature technology is vital to protect the network information. This paper mainly work is to build high-performance public key cryptography based on the platform of digital signature.Firstly, the paper demonstrates the additive operation of generalized conic Zn constituted a finite Abelian group according to applying the Chinese remainder theorem which lay the foundation to build the public key cryptography of generalized conic curve over Zn. In order to improve the operation speed, the paper improves the addition algorithm defined by coordinate method. For the discrete logarithm problem, the article puts forward the discrete logarithm of generalized conic curve and plaintext embedding algorithm which guarantee the security of the public key cryptography of generalized conic curve. Based on standard binary algorithm,the thesis simulates the calculation process of integer times through applying the element division algorithm, establishes the foundation of cryptography with the generalized conic curve.Secondly, analyzed the classical RSA, the EIGamal cipher algorithm and the threat of security, the paper constructs the RSA cipher algorithm and ElGamal cipher algorithm, proves the validity of improved public key cryptography. At last the thesis builds a public key cryptography with smaller calculated amount, higher operation speed, smaller storage space,lower bandwidth and higher safety coefficient.Finally, according to the theory and structure model of the cloud storage, the thesis designs the cloud storage implementation model of the digital signature in cloud storage application interface layer, analyzes the services that security can provide. These studies can provide people the theoretical reference and decision-making basic related to the information communication security system of the actual cloud storage.
Keywords/Search Tags:Public key cryptography, Digital signature, Generalized conic curve, Security cloud storage
PDF Full Text Request
Related items