天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

部分盲簽名研究及其在移動(dòng)群體感知信譽(yù)管理系統(tǒng)中的應(yīng)用

發(fā)布時(shí)間:2018-05-02 16:12

  本文選題:部分盲簽名 + 移動(dòng)群體感知系統(tǒng); 參考:《西安電子科技大學(xué)》2014年碩士論文


【摘要】:近年來,隨著科學(xué)技術(shù)的不斷創(chuàng)新,人們溝通交流、共享信息和獲取服務(wù)的主要媒介已經(jīng)從面對面交流轉(zhuǎn)變?yōu)槭褂靡苿?dòng)電話、智能手機(jī)和平板電腦等典型的移動(dòng)設(shè)備,在這些移動(dòng)設(shè)備中集成了適用于各個(gè)方面的傳感器,通過已經(jīng)廣泛普及的WiFi、3G等移動(dòng)網(wǎng)絡(luò)技術(shù)可以將傳感器采集的感知信息上傳給服務(wù)器,經(jīng)服務(wù)器分析和處理,并最終反作用于用戶,這一新興領(lǐng)域被稱為移動(dòng)群體感知系統(tǒng)。在感知數(shù)據(jù)采集和信息上傳的過程中不可避免的會(huì)涉及到用戶的隱私信息,對用戶安全構(gòu)成一定的威脅,因此該系統(tǒng)的安全機(jī)制是決定移動(dòng)群體感知系統(tǒng)能否走向大規(guī);年P(guān)鍵技術(shù)。本文的主要研究對象是部分盲簽名算法,并結(jié)合信譽(yù)管理機(jī)制的安全架構(gòu),將本文提出的部分盲簽名算法作為隱私保護(hù)技術(shù)應(yīng)用于移動(dòng)群體感知系統(tǒng)中,并對本文所提出的新算法進(jìn)行了仿真實(shí)驗(yàn)和性能比較。盲簽名主要應(yīng)用于電子現(xiàn)金和電子投票等匿名系統(tǒng)中,它可以有效的保護(hù)用戶的隱私,但是它存在著匿名性和可控性之間的矛盾。為了解決這一困難問題,人們提出在盲簽名的簽名數(shù)據(jù)中添加用戶和簽名者共同協(xié)商的信息,這種算法即部分盲簽名算法。在本文中,根據(jù)現(xiàn)有的理論,首先提出了一種新的可證明安全的基于身份的部分盲簽名算法,繼而闡明該算法滿足部分盲性,并在隨機(jī)預(yù)言機(jī)模型下證明了該算法對自適應(yīng)選擇消息和身份攻擊存在不可偽造性,其安全性最終可歸約于CDH困難性問題,最后從理論上對本文算法與其他現(xiàn)有算法在計(jì)算復(fù)雜度上進(jìn)行比較,說明本文算法具有較高的計(jì)算效率和較少的通信量。本論文對所提出的基于身份的部分盲簽名算法和現(xiàn)有的兩種算法在Linux系統(tǒng)下使用PBC數(shù)據(jù)庫進(jìn)行了仿真實(shí)驗(yàn),仿真包括算法各階段的運(yùn)行時(shí)間、簽名者和用戶計(jì)算所用的時(shí)間以及算法的計(jì)算能耗,最終將仿真結(jié)果繪制到柱狀圖中,可以更直觀的觀察到:本論文提出的部分盲簽名算法的計(jì)算復(fù)雜度更低、交互信息量更少以及計(jì)算效率更高。信譽(yù)管理機(jī)制是確保協(xié)議可以順利執(zhí)行的重要機(jī)制,同時(shí)也是對個(gè)人的隱性激勵(lì)機(jī)制,其中身份管理技術(shù)是信譽(yù)機(jī)制中的關(guān)鍵技術(shù),信譽(yù)管理系統(tǒng)為了保護(hù)用戶的隱私性需要隱藏用戶身份信息和其信譽(yù)值的關(guān)聯(lián)性,并且如果用戶出現(xiàn)異常行為,信譽(yù)管理系統(tǒng)能夠追蹤到用戶真實(shí)身份信息。根據(jù)本文提出的基于身份的部分盲簽名算法和參與式感知PEPSI安全架構(gòu),本文設(shè)計(jì)了移動(dòng)群體感知系統(tǒng)中的信譽(yù)管理系統(tǒng),并給出了用戶注冊和登錄該系統(tǒng)的具體流程,最后對系統(tǒng)涉及的安全算法進(jìn)行證明,說明了該系統(tǒng)滿足匿名性和不可偽造性的安全性要求,并可以通過計(jì)算得到用戶真實(shí)身份信息,實(shí)現(xiàn)對惡意用戶的追蹤,以達(dá)到激勵(lì)良好行為和懲罰不恰當(dāng)行為的目的。
[Abstract]:In recent years, with the continuous innovation of science and technology, the main media of communication, communication, information sharing and service have changed from face-to-face to mobile phones, smartphones and tablet computers, which have integrated all kinds of sensors in these mobile devices. The mobile network technology such as WiFi and 3G can upload the perceptual information collected by the sensor to the server, analyze and deal with the server, and finally counter the user. This emerging field is called the mobile group perception system. The user's privacy information is inevitably involved in the process of sensing data collection and information uploading. The security mechanism of the system is the key technology to determine whether the mobile group perception system can move towards a large scale. The main object of this paper is a partial blind signature algorithm, and a part of the blind signature algorithm proposed in this paper is used as a privacy protection technology, combining the security architecture of the reputation management mechanism. The simulation experiment and performance comparison of the new algorithm proposed in this paper are applied to the mobile group perception system. The blind signature is mainly used in the anonymous systems such as electronic cash and electronic voting. It can effectively protect the user's privacy, but it has the contradiction between anonymity and controllability. In order to solve this problem, the blind signature is a problem. In this paper, a new ID based partial blind signature algorithm is proposed in this paper. In this paper, a new ID based partial blind signature algorithm is proposed based on the existing theory, and then the algorithm satisfies partial blindness and is random. The oracle model proves that the algorithm has non Forgability for adaptive selection message and identity attack, and its security can be attributed to CDH difficulty. Finally, the computational complexity of this algorithm and other existing algorithms is compared theoretically, which shows that the algorithm has high computational efficiency and less communication. In this paper, an identity based partial blind signature algorithm and two existing algorithms are used to simulate the use of the PBC database under the Linux system. The simulation includes the running time of the algorithm at all stages, the time used by the signers and the users, and the calculation of the algorithm. Finally, the simulation results are drawn to the histogram. It can be more intuitively observed that the computational complexity of the partial blind signature algorithm proposed in this paper is lower, the amount of interactive information is less and the computing efficiency is higher. The reputation management mechanism is an important mechanism to ensure the smooth execution of the protocol, and it is also a recessive incentive mechanism for individuals, in which the identity management technology is the key to the reputation mechanism. Technology, credit management system needs to hide the association between user identity information and its reputation value in order to protect the privacy of users, and if the user appears abnormal behavior, the credit management system can track the user's real identity information. Based on the identity based partial blind signature algorithm and the participatory PEPSI security framework proposed in this paper In this paper, the credit management system in mobile group perception system is designed, and the specific process of user registration and login to the system is given. Finally, the security algorithm involved in the system is proved, which shows that the system satisfies the security requirements of anonymity and unforgery, and the real identity information of the user can be obtained by calculation. To track malicious users in order to motivate good behavior and punish inappropriate behavior.

【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TN918.91

【共引文獻(xiàn)】

相關(guān)期刊論文 前10條

1 張紅祥;花麗;;校園網(wǎng)安全身份認(rèn)證技術(shù)綜述[J];長春理工大學(xué)學(xué)報(bào)(高教版);2010年02期

2 宋維平;RSA密碼體制的數(shù)字簽名[J];長春理工大學(xué)學(xué)報(bào);2005年02期

3 熊紹強(qiáng);;一種基于混沌變換的圖像加密算法[J];重慶科技學(xué)院學(xué)報(bào)(自然科學(xué)版);2009年06期

4 郭z殃,

本文編號(hào):1834598


資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/wltx/1834598.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶638c3***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請E-mail郵箱bigeng88@qq.com