Font Size: a A A

Research On Security Transport Protocol Based On The Decentralized Digital Signature Authentication

Posted on:2019-09-17Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y RenFull Text:PDF
GTID:2428330593951057Subject:Computer technology
Abstract/Summary:PDF Full Text Request
A secure transport protocol is a set of rules,which can realize message passing between two or more nodes through the physical channel in communication technology.This protocol defines the rules of data transmission,synchronous communication strategies and possibly error recovery methods.Main target of secure transport protocol is to provide secure and trusted communications in unsafety channel.However,faced with the ever-changing network technology,the traditional security transport protocol cannot reach the original target.When users interact with each other,attackers not only often access data or access service without authorization,but also obstruct legal user to obtain data or receive services through certain means.For the security problems of traditional transport protocols to be solved,this paper proposes a security transport protocol based on the decentralized digital signature authentication,which introduces cache database based on access control into the distributed system to improve the storage technologies of blockchain.First of all,the paper puts forward a decentralized digital signature authentication protocol based on ECDSA and chain database.This protocol builds an elliptic curve group E_p(a,b)based on y~2=(x~3+ax+b)mod p in finite field F_p to generate private key and public key.Then the protocol sign and verify the digital signature based on ECDSA and signature broadcast,which not only increases non-repudiation of data but also improve the system security.Next,the paper puts forward a security transport protocol based on the decentralized digital signature authentication.The protocol utilizes AES algorithm to encrypt plaintext data and ECC algorithm to encrypt AES key,which not only increase data privacy but also improve the efficiency of system services.Moreover,this paper introduces cache database based on access control into security transport protocol to guard that only target user can obtain ciphertext and related digital signature.Comparison and analysis show that the protocol of this paper reaches high maturity,high security,high speed and less consumption,which not only has properties of scalability,robustness,maintainability but also can resist exhaustive attack,guessing attack,Eavesdrop attack,forgery attack.
Keywords/Search Tags:Decentralization, Blockchain, Secure Transport Protocol, Digital Signature, Data Encryption and Decryption
PDF Full Text Request
Related items