Font Size: a A A

Study On Signcryption Schemes In Different Public Key Cryptosystems

Posted on:2019-11-03Degree:MasterType:Thesis
Country:ChinaCandidate:C LiuFull Text:PDF
GTID:2428330545982386Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With more and more complex systems and structures of networks appear,every countries highlight the network security and even put it into military altitude.How to ensure that users in different Public Key Cryptosystems can communicate with each other securely and design schemes which can satisfy practical situation is one of the hot areas in academics,such as,researching on secure schemes in different Public Key Cryptosystems in 5G,wireless sensor and cloud.Some work has been done as below.? This paper designs an authenticated key agreement protocol between Traditional Public Key Infrastructure and Identity-based Cryptosystem.At first,the users in the system must authenticate with each other by using signcryption scheme,and then they can share a session key in the process of key exchange.However,existing schemes are all in the same Public Key Cryptosystem,even though some papers have proposed the concept of the cross-domain,actually,the users are still in the same cryptosystem.In these papers,they just use different Certificate Authorities or the multiple Key Generation Centers.In this paper,we design a novel authenticated key agreement protocol.In the phase of authentication,signcryption can guarantee the security of the authentication.Meanwhile,the schemes can resist kinds of the attacks,such as,known-session key attack,forge key attack,and the known temporal key attack.? A multi-message and multi-receiver signcryption scheme for ad-hoc network is proposed.The multi-message and multi-receiver signcryption schemes are widely used in the wire telecommunication system and broadcast communication system,and it can be regraded as a important method to protect messages transmission.Meanwhile,it can ensure that the senders broadcast multiple messages to the multiple legal users via secure tunnel.Considering there are multiple receivers in the ad-hoc networks,it is combined with the multi-receiver approach and is used in the cross-domain system.A lot of implementations and a actual application show that this scheme is practical.? This paper proposes a two way signcryption scheme which is anonymous and between Public Key Infrastructure and Identity-based Cryptosystem.Compared with existing schemes which have the same theme,this scheme improves the efficiency,and adds the ciphertext anonymity.At the same time,the implementation and efficiency have shown that this scheme has higher efficiency and practicality than others.
Keywords/Search Tags:Authenticated key agreement protocol, Multi-message and multi-receiver, Ad-hoc network, Anonymity
PDF Full Text Request
Related items