Algorithm Design and Application Research of the Improved ECC-based Self-Certified Public Key
|School||PLA Information Engineering University|
|Keywords||Self-certified Public Key Key Renew Explicit Authentication Threshold Secret Sharing Key Distribution|
The guarantee of public key is a key problem in public key cryptosystem. The guarantee is the public key in self-certified public key cryptosystem, which avoids the certificate management problem in certificate-based public key cryptosystem and the key escrow problem in identity-based public key cryptosystem. At the same time, the complexity of key renewing and repudiability of public key still exist in self-certified public key cryptosystem. With the development of the distributed network, it is necessary to do research on the distributed key distribution of self-certified public key.To solve these problems above, we mainly do research on the user-controlled key renewing technology, the explicit authentication of public key and the threshold key distribution technology. A self-renewed key generation algorithm of self-certified public key is proposed by using the idea of user-controlled key renewing. The algorithm achieves that user can renew its self-certified public key by itself. The key still has the self-certified property. The self-certificate is presented which providing explicit authentication of self-certified public key.To solve the single point of failure and the bottleneck of management problems in single center cryptosystem, we design a threshold key distribution scheme of self-certified public key by using the idea of verifiable secret sharing and blind signature. The scheme is applicable to multi-centers. Compared with the existing schemes alike, the proposed scheme is no need of the trusted combiner, which increases the scheme’s usability.The proposed self-certified public key is different from the traditional ECC-based self-certified public key. We design the corresponding application algorithms and protocols. We present the encryption algorithm, digital signature algorithm and key agreement protocol of the proposed self-certified public key. The computation costs and security of the proposed algorithms and protocols are also analyzed.In the end, we verify the computation costs of the proposed algorithms and protocols in this thesis by experiment. Our study takes on theoretical and practical significance in the application research of self-certified public key.