Font Size: a A A

Research And Design Of Authentication Based On Hierarchical Identity-Based Encryption

Posted on:2020-08-14Degree:MasterType:Thesis
Country:ChinaCandidate:S S SuFull Text:PDF
GTID:2428330578973733Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In cryptography,public key encryption is widely applied in information system.Hierarchical Identity-Based Encryption system(HIBE)working principle of a certain group user identity information is divided into different levels.The previous layer distributes private keys to the next layer by delegating algorithms.HIBE is a kind of Identity-Based Encryption(IBE).Both types of encryption schemes weaken the function of Private Key Generator(PKG)to authenticate public-private key pairs,so that the security of the key in the encryption system is controlled within the layered encryption system.Any system that involves user privacy information includes the link of user identity authentication,especially the information system in the Internet.Now,two schemes are proposed to improve the authentication protocol of lightweight layered information system and lightweight shared item cipher lock.The first improvement scheme of this paper is the research on HIBE scheme.The improved HIBE scheme can distinguish the user identity of the system internal decryption,so as to further improve the security of the information system.Dual system encryption technology is used to prove the security and anonymity of the improved scheme.This paper compares the above proposed HIBE encryption scheme with the original scheme in terms of parameters and performance through experiments,which indicates that this scheme has certain application value and advantages.The second proposed scheme is the improvement of the bicycle sharing authentication scheme.The scheme uses the principle of clock synchronization dynamic password to improve the existing lightweight shared item electronic password lock identity authentication protocol.The improved authentication scheme is compared with the original clock synchronization dynamic password scheme,and the security analysis explains why the improved scheme is applicable to the password lock of lightweight shared items.The scheme mainly aims at improving the identification defects of small Shared items with low cost,such as Shared bicycles,effectively improving the risk that a single password is easy to be violently cracked and the problem that dynamic password computing consumes a lot of power and is fast.
Keywords/Search Tags:Hierarchical Identity-Based Encryption, Identity authentication mechanism, Segmentation strategy, Dual system encryption, Clock synchronization, Dynamic password
PDF Full Text Request
Related items