Font Size: a A A

Application Research Of Certificateless Signcryption System Based On Elliptic Curve Finite Field

Posted on:2019-01-14Degree:MasterType:Thesis
Country:ChinaCandidate:M ShaoFull Text:PDF
GTID:2428330545974154Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The research of certificateless signcryption system based on the finite field of elliptic curve is a hot field in the research of cryptology.One of the aims of this kind of research is to adapt to the mobile environment of current e-commerce,promote the safe and efficient development of e-commerce activities,and establish a low power,high security information signcryption system.In this paper,the elliptic curve cryptosystem in the public key cryptosystem is used as the breakthrough point to study the certificateless public key cryptosystem.It focuses on the research and application of the certificateless signcryption based on the elliptic curve finite field and its development.,studies the formalized model of the certificateless signcryption scheme,which is used to format the cryptosystem.The random oracle model is used as the research object and research carrier with some specific certificateless signcryption schemes to analyze and compare their internal algorithms,efficiency and security problems.On this basis,the main research works completed in this paper are:(1)A more in-depth study of a certificateless signcryption scheme without bilinear pairing operation.Combined with the modular FO conversion,a certain improvement signcryption scheme is made from the security point of view,then discusses and demonstrate it.(2)Comparing the improved scheme and other related schemes,the emphasis is on the analysis and comparison of the two schemes improved before and after.It focus on the signature combination method and implementation technology.The present conclusion is that the improved scheme has higher security,although the amount of operations in the signcryption phase is increased.
Keywords/Search Tags:Elliptic curve finite field, Certificateless signcryption, Provable security
PDF Full Text Request
Related items