Study on System of Electronic Documetnt Security Signature
|School||Harbin Institute of Technology|
|Course||Instrument Science and Technology|
|Keywords||Digital signature Zero-knowledge proof Right-management Database technique|
With the rapid development of the computer and network technology, it is easy and quick for people to transfer and exchange information by using the network technology. Of course, there is some important and confidential information in these transmitted information. So it is important how to deal with these important information before transferring, and it also become the key of information security. In order to transfer electronic documents in security, we must make sure that the information not to be damaged, changed, and revealed by accident or malicious reason during transmitting. It means that we must make sure the electronic documents availability, integrity and confidentiality, and we can also confirm the identity of the transmitter of information and the origin of information, it means that we must ensure the authenticity of electronic documents. At the same time we can verify popedom of transmitter of information. Therefore it significant to studying the technology of electronic document security signature. It ensure the security of document transmission under the network.Firstly the thesis analysis the requirement of system, and design the collective scheme of system. According the requirement of system function, the author design and analysis the scheme of technique which adopt cryptography in detail. A new signature scheme base on the identity-based signature and a new identity-authentication base on the Zero-knowledge are advanced.The author discuss arithmetic security and efficiency for two schemes. In succession the author design the module of user’s right management base on the ADO technique of database.At the last the paper realize a system of electronic document security signature. The operation show that the scheme can achieve the function of document signature and signature verification, and prove that the identity-authentication scheme content to the requirement of user security enters. At the same time the system achieve the function of management for user’s right.