Font Size: a A A

Research On Lattice-Based Certificateless Proxy Cryptography Scheme And Its Applications

Posted on:2024-09-24Degree:MasterType:Thesis
Country:ChinaCandidate:B B ZhangFull Text:PDF
GTID:2568307064955909Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of information technology,its security increasingly relies on cryptography,especially public key cryptography,which can provide a strong guarantee for information security.In public key cryptosystems,digital signatures can be used to authenticate users and ensure data integrity.Digital signcryption combines encryption and signature,and can be implemented at a low cost while satisfying confidentiality,integrity,authentication,and non-repudiation.However,the impact brought by the development of quantum computers on traditional public key cryptography based on number theory puzzles cannot be underestimated.In this context,lattice cryptography has gradually become the dominant paradigm for constructing post quantum cryptography schemes due to its ability to withstand quantum computer attacks.This article focuses on two special forms of lattice ciphers: hierarchical certificateless proxy signature and certificateless proxy re-signcryption.The innovative research results obtained include:In view of the existing certificateless proxy signature schemes that cannot resist quantum computer attacks,which may have problems such as single point failure and difficulty in expansion when applied to systems with a large number of users,this paper constructs a hierarchical certificateless proxy signature scheme based on lattice.Firstly,the computational efficiency of key generation is improved by using reject sampling technology and trapdoor-free technology;Secondly,different levels of original signers and proxy signers achieve proxy authorization purposes by exchanging random extraction matrices for mutual authentication;Finally,the security of this scheme is proved under the assumption of a small integer solution difficulty problem in the random oracle model.The proposed scheme is the first proxy signature scheme that allows signers to come from different levels and belong to different key generation centers.The performance evaluation experiment results show that the public key size of the scheme is a constant,the proxy signature and verification costs are independent of the hierarchy,and the proxy key and signature sizes are not linear quantities of the hierarchy.Therefore,this scheme can better meet the load balancing requirements of large-scale distributed heterogeneous networks,and is efficient and feasible.Due to the fact that unmanned aerial vehicle(UAV)networks need to perform the task of collecting sensitive data in many application scenarios and frequently distribute data,their open environment can increase the risk of data leakage.Realizing privacy protection and secure data transmission with strict delays has become a very challenging and important issue in UAV network communication.However,existing security solutions for UAV networks mainly use traditional public key cryptography to construct,which on the one hand brings a heavy computational burden to resource constrained drone devices,and on the other hand,it also makes them unable to withstand quantum attacks.Aiming at the issues of security data outsourcing,privacy protection,and efficiency in UAV assisted data collection scenarios,this paper proposes an end-to-end fog to cloud secure data communication architecture for UAV networks using lattice-based certificate proxy re-signcryption technology for the first time,and designs a secure and efficient data transmission and sharing scheme.In the proposed scheme,the UAV first signs up the sensed data and sends it to a nearby fog node,which is responsible for verifying and caching the encrypted data.When intelligent end users want to access data,the fog node sends encrypted data to the cloud platform.The cloud platform converts ciphertext into ciphertext encrypted by the public key of intelligent end users through proxy re-encryption to provide secure data sharing services.At the same time,neither the fog node nor the cloud platform can obtain any information about the data plaintext.Using a combination of Gaussian sampling and trapdoor technology,the UAV only needs to perform lightweight linear operations such as matrix and vector multiplication and vector addition,achieving low latency data processing.Theoretical analysis and experimental results show that the proposed scheme is provable secure,efficient,and feasible,and is suitable for deployment in a computing resource constrained UAV networks environment.
Keywords/Search Tags:Proxy Signature, Proxy Re-Signcryption, Rejection Sampling, Certificateless, Unmanned Aerial Vehicle
PDF Full Text Request
Related items