Dissertation > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory

Algorithm Design and Application Research of the Improved ECC-based Self-Certified Public Key

Author ZuoXiaoFang
Tutor SuJinHai
School PLA Information Engineering University
Course Military Communication
Keywords Self-certified Public Key Key Renew Explicit Authentication Threshold Secret Sharing Key Distribution
CLC TN918.1
Type Master's thesis
Year 2010
Downloads 20
Quotes 0
Download Dissertation

The guarantee of public key is a key problem in public key cryptosystem. The guarantee is the public key in self-certified public key cryptosystem, which avoids the certificate management problem in certificate-based public key cryptosystem and the key escrow problem in identity-based public key cryptosystem. At the same time, the complexity of key renewing and repudiability of public key still exist in self-certified public key cryptosystem. With the development of the distributed network, it is necessary to do research on the distributed key distribution of self-certified public key.To solve these problems above, we mainly do research on the user-controlled key renewing technology, the explicit authentication of public key and the threshold key distribution technology. A self-renewed key generation algorithm of self-certified public key is proposed by using the idea of user-controlled key renewing. The algorithm achieves that user can renew its self-certified public key by itself. The key still has the self-certified property. The self-certificate is presented which providing explicit authentication of self-certified public key.To solve the single point of failure and the bottleneck of management problems in single center cryptosystem, we design a threshold key distribution scheme of self-certified public key by using the idea of verifiable secret sharing and blind signature. The scheme is applicable to multi-centers. Compared with the existing schemes alike, the proposed scheme is no need of the trusted combiner, which increases the scheme’s usability.The proposed self-certified public key is different from the traditional ECC-based self-certified public key. We design the corresponding application algorithms and protocols. We present the encryption algorithm, digital signature algorithm and key agreement protocol of the proposed self-certified public key. The computation costs and security of the proposed algorithms and protocols are also analyzed.In the end, we verify the computation costs of the proposed algorithms and protocols in this thesis by experiment. Our study takes on theoretical and practical significance in the application research of self-certified public key.

Related Dissertations
More Dissertations