Font Size: a A A

Research On Signcryption Schemes Under The Heterogeneous Cryptographic Environment

Posted on:2019-04-02Degree:MasterType:Thesis
Country:ChinaCandidate:H WangFull Text:PDF
GTID:2428330545981749Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information,people have higher requirements to the network.The existing 4G network is no longer to meet people's needs.The 5G network has become a hot spot area in current global research,where ultra-dense heterogeneous network is one of the key technologies in 5G network.The analysis and design of signcryption schemes in heterogeneous cryptographic environments has become an urgent need of the research in 5G heterogeneous network.Signcryption is an efficient cryptographic technology that simultaneously achieves confidentiality and authentication communication.Meanwhile,it is used to solve the problem of confidentiality and authentication of messages.Moreover,the computational and communication cost are low so it gradually becomes the core technology for ensuring information security.Most of the existing signcryption schemes are based on the same cryptographic environment,namely the homogeneous cryptographic environment.For multiple communication modes and data privacy protection requirements of 5G heterogeneous network,it is necessary to research and design data privacy protection cryptographic schemes which are suitable for heterogeneous cryptographic environments.In the 5G heterogeneous network environment,in order to ensure the confidentiality and authentication of messages under the heterogeneous cryptographic environments between Traditional Public Key Cryptography(TPKI)and Certificateless Public Key Cryptography(CLPKC),this paper has done with the following three parts:? The security of a two-way heterogeneous signcryption scheme is analyzed and improved.The paper analyzes the security of the TPKI-CLPKC two-way heterogeneous signcryption scheme proposed by Liu et al.in 2016.The paper points out that there is the second type of enemy attack in the schemes,and analyzes the reasons for the second type of enemy attack.Finally,two new schemes are improved.The improved schemes overcome the shortcomings of the original schemes.? A heterogeneous aggregation signcryption scheme from Traditional Public Key Cryptography to Certificateless Public Key Cryptography is designed.In order to improve the verification efficiency of multiple senders,it is necessary to aggregate signatures.The thesis defines the formal definition and security model of Traditional Public Key Infrastructure to Certificateless Public Key Cryptography heterogeneous aggregate signcryption scheme,and proposes a provable and secure TPKI-CLPKC heterogeneous aggregation signcryption scheme.In the random oracle model,it is proved that the scheme satisfies confidentiality and unforgeability.The scheme does not require bilinear pairing for verification when it is aggregated,so it has high efficiency.? The heterogeneous hybrid signcryption scheme of Traditional Public Key Cryptography to Certificateless Public Key Cryptography is designed.Hybrid signcryption can handle messages with unlimited length,and the encryption speed is fast.The paper combines the concepts of heterogeneous signcryption and hybrid signcryption,and proposes a provable and secure TPKI-CLPKC heterogeneous hybrid signcryption scheme that can be verified and secure.The scheme can handle messages with any length in a heterogeneous environment and has higher computational efficiency.
Keywords/Search Tags:Traditional Public Key Infrastructure, Certificateless Public Key Cryptography, Heterogeneous Signcryption, Aggregation Signcryption, Hybrid Signcryption
PDF Full Text Request
Related items