Font Size: a A A

Research On Bidirectional Authentication Scheme Based On Certifcateless Hybrid Signcryption Algorithm

Posted on:2017-12-09Degree:MasterType:Thesis
Country:ChinaCandidate:H C LiangFull Text:PDF
GTID:2428330509950197Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Today,relying on the rapid development of mobile Internet technology,the wisdom of the people to imagine the city is in the north budding.Now people can use video phone to communicate or use mobile phone to control household appliances,and in the demand of mass communication connection at the same time,both safe secret algorithm proposed is more efficient,safer and more practical performance requirements.Signcryption is one of the cornerstone of modern cryptography,based on a logical step to complete the "encryption and signation" system advantage,after put forward is widely recognized in domestic and foreign scholars.And combining with the signcryption and the certificateless of public key cryptosystems certificateless signcryption system,inherits the advantage of the two,has a good application prospect and become one of research issues of modern cryptography.1.The author puts forward a set of bilinear pairings computation need only 2 times without certificate mixed sign scheme(LCL-CS solution)and a set of effective against public key replacement attack without certificate mixed sign scheme(SCL-CS solution),and compared domestic and foreign famous solutions demonstrate the author's computational complexity.2.Directional analysis LCL-CS and SCL-CS proven safe,puts the random oracle model and demonstrate two sets of scheme of adaptive chosen-ciphertext attack with a ciphertext indistinguishable and unforgeable existence of adaptation message attack.3.Combined with the security of the EPON network authentication problem,put forward a set of two-way authentication scheme based on no certificate signing secret algorithm,the registered in EPON are presented under the authentication protocol implementation process.Combined with simulation and algorithm performance compared to analyze the efficiency of the agreement.
Keywords/Search Tags:certificateless signcryption, hybird signcryption, Random oracle model, Security authentication protocol
PDF Full Text Request
Related items