Font Size: a A A

Design And Implementation Of An Important Document Management System Based On Special Cryptography

Posted on:2020-08-30Degree:MasterType:Thesis
Country:ChinaCandidate:Z Q WeiFull Text:PDF
GTID:2428330596473315Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In some specific areas,management of the important information document is in great demand,and it's difficult to implement.It's faced with many threats such as theft,falsification and forgery.In view of the advantage of cryptographic technique in identity authentication,security isolation,information secrecy,integrity protection and non-reputation,this paper discusses the Security technology based on the special cryptography,and realizes the safety control of document creation,storage,sharing,use and destruction in full life circle to achieve the goal of preventing,protecting,and auditing.The specific research work is as follows:(1)A proxy signature scheme is designed and implemented.Focusing on the requirement of authentication function of important document management system,this paper researches the electronic signature technology based on proxy signature,and implements the electronic signature function of important document in special scenarios.(2)The important document realizes fine-grained access control model.In the document,considering the management authority requirements of important document security levels and the attribute of confidentiality,the document is hierarchically processed.The CP-ABE attribute encryption algorithm is implemented based on SM2 and SM4.The fine-grained access control scheme of important documents is proposed,the problems of hierarchical encryption access and the efficient sharing of documents are solved.(3)An important document security management system is implemented.According to the above scheme and the process of software design and development,an important document security management system based on special cryptography technology is designed and implemented.By testing and analysis of the system,the system can preferably solve the basic security requirements of the important document.
Keywords/Search Tags:Safety management system, Important document, Proxy signature, SM cryptographic algorithms, Access control
PDF Full Text Request
Related items