具有特殊性質(zhì)的認(rèn)證協(xié)議設(shè)計及應(yīng)用研究
[Abstract]:With the development of social information process, the role of computer network and information system in social life becomes more and more important. The essence of information security is to ensure the security of information system. Cryptography is the core technology of ensuring information security in network communication. In the process of network space communication, it is used to ensure the identity of users and the authenticity and integrity of information content, which is the basis of guaranteeing the communication security of network space. In recent years, the research of safe and efficient authentication protocol is a hot topic in the field of information security, and it has important academic value and practical significance. In this paper, the authentication protocol is deeply studied. Compared with existing authentication protocols, the results of the research have greatly improved in performance, and some authentication protocols designed in this paper have an efficient practical application in the electronic medical information system. wherein the denying authentication protocol is a special authentication protocol that denies the authentication protocol so that the recipient can determine the source of a given message, but the recipient cannot prove the source of the given message to any third party. Such a feature makes it possible to deny that the authentication protocol is suitable for applications in certain privacy situations. The main research work of this thesis is as follows: 1. There is no certificate denying authentication protocol: (1) designing a certificate-free denying authentication protocol which can prove the security, effectively solving the complex management problem of the public key certificate in the authentication protocol based on PKI and the key escrow problem in the authentication protocol based on the identity. (2) A non-paired certificate-free authentication protocol that can prove safe is designed, which can be efficiently applied to E-mail and electronic vote, electronic bidding and other practical application scenarios because of the fact that calculation overhead is not used. and (3) constructing a certificate-free aggregate denial authentication protocol which can prove safe. the protocol aggregates n deny authentication codes generated by n messages of n different users into a deny authentication code and enables the receiver to be sure that the n users do authenticate the n messages, greatly reducing the computational overhead. In order to further expand the function of denying authentication protocol, this paper constructs an identity-based denial-threshold-loop authentication protocol. this protocol allows the authentication code generated by the verifier to be indistinguishable from the authentication code generated by t users in the ring. At the same time, under the assumption that the BDH (bilinear diffe-Hellman) difficult problem, under the random oracle model, the protocol satisfies the denying authentication under the adaptive selection message and the identity attack, and the protocol also guarantees the unconditional anonymity of the sender. Based on identity-based encryption protocol research, an identity-based authentication encryption protocol is designed. The protocol adopts a similar signature technique, reduces computational overhead and communication overhead, and under the random oracle model, the protocol has confidentiality under the adaptive selection cipher text attack, and has denial of authentication under the attack of the adaptive selection message. The research of RFID mutual authentication protocol based on elliptic curve: (1) Based on elliptic curve cryptosystem, an efficient mutual authentication protocol suitable for RFID (Radio Frequency Identification) system is constructed. In this protocol, the identity information of the tag is well protected, and the anonymity of the tag is ensured. the server can verify the identity information of the tag without an exhaustive search through a simple operation. In addition, the constructed protocol also meets confidentiality, mutual authentication, availability, forward security, ductility, and resistance to replay attacks, tag camouflage attacks, server phishing attacks, and the like. (2) An RFID mutual authentication protocol with external package function based on elliptic curve is designed. In this authentication system, the issuing authority packages the time-consuming computing package to a trusted third party, which greatly reduces the amount of calculation of the tag. At the same time, a similar signature technique is adopted in the protocol, so that the confidentiality of the label identity information is ensured, and mutual authentication between the tag and the reader is ensured.
【學(xué)位授予單位】:電子科技大學(xué)
【學(xué)位級別】:博士
【學(xué)位授予年份】:2016
【分類號】:TN918
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 田建波,徐勝波,王育民;認(rèn)證協(xié)議形式分析的討論[J];西安電子科技大學(xué)學(xué)報;1998年03期
2 張勇,陳涵生,白英彩;結(jié)構(gòu)化認(rèn)證協(xié)議設(shè)計方法研究[J];計算機(jī)工程;2000年12期
3 鄭東,田建波,王育民;關(guān)于BAN邏輯擴(kuò)展的注記[J];電子科學(xué)學(xué)刊;2000年01期
4 楊宇光,祝世雄;一種量子認(rèn)證協(xié)議的設(shè)計[J];通信技術(shù);2002年09期
5 段斌,王鍵;學(xué)生就業(yè)網(wǎng)簽約認(rèn)證協(xié)議設(shè)計及分析[J];計算機(jī)應(yīng)用;2004年08期
6 吳文杰,張曉光;網(wǎng)絡(luò)查詢系統(tǒng)中認(rèn)證協(xié)議的設(shè)計與分析[J];計算機(jī)工程;2005年21期
7 繆祥華;;一種分析和設(shè)計認(rèn)證協(xié)議的新邏輯[J];計算機(jī)工程;2008年02期
8 高偉;李飛;劉鋒;;基于身份的非交互可否認(rèn)認(rèn)證協(xié)議[J];計算機(jī)工程與應(yīng)用;2008年33期
9 ;私有云用戶訪問公有云的一輪認(rèn)證協(xié)議[J];科學(xué)通報;2012年19期
10 徐夢茗;肖聰;江衛(wèi);付毅;;認(rèn)證協(xié)議研究概覽[J];信息安全與通信保密;2013年04期
相關(guān)會議論文 前5條
1 石春暉;趙戰(zhàn)生;;認(rèn)證協(xié)議安全分析[A];第十三屆全國計算機(jī)安全技術(shù)交流會論文集[C];1998年
2 王英俊;徐明;;無線傳感器網(wǎng)絡(luò)交叉認(rèn)證協(xié)議研究與改進(jìn)[A];第十七屆全國青年通信學(xué)術(shù)年會論文集[C];2012年
3 仇細(xì)平;繆祥華;楊曉婕;;Otway-Rees認(rèn)證協(xié)議的分析與改進(jìn)[A];2009年研究生學(xué)術(shù)交流會通信與信息技術(shù)論文集[C];2009年
4 張兆心;方濱興;張宏莉;;基于BAN邏輯的SIP網(wǎng)絡(luò)中認(rèn)證協(xié)議安全性分析[A];2006北京地區(qū)高校研究生學(xué)術(shù)交流會——通信與信息技術(shù)會議論文集(下)[C];2006年
5 卿斯?jié)h;;關(guān)于“報文重發(fā)”型攻擊的注記[A];第十一屆全國計算機(jī)安全技術(shù)交流會論文集[C];1996年
相關(guān)重要報紙文章 前4條
1 閆冰;WLAN選擇最佳EAP[N];網(wǎng)絡(luò)世界;2006年
2 郭勇;無線安全八手絕活[N];網(wǎng)絡(luò)世界;2005年
3 那罡;無線安全跨越“線”制[N];中國計算機(jī)報;2008年
4 記者 胡英;為中國移動提供Wi-Fi公共熱點[N];計算機(jī)世界;2003年
相關(guān)博士學(xué)位論文 前10條
1 劉亞麗;面向隱私保護(hù)的RFID安全認(rèn)證協(xié)議研究[D];南京航空航天大學(xué);2014年
2 鄧江;新型認(rèn)證協(xié)議研究[D];電子科技大學(xué);2015年
3 金春花;具有特殊性質(zhì)的認(rèn)證協(xié)議設(shè)計及應(yīng)用研究[D];電子科技大學(xué);2016年
4 田建波;認(rèn)證協(xié)議的分析設(shè)計[D];西安電子科技大學(xué);1998年
5 黃尹;認(rèn)證協(xié)議及其在網(wǎng)絡(luò)安全系統(tǒng)中的應(yīng)用研究[D];武漢大學(xué);2010年
6 趙鑫;面向應(yīng)用的無線傳感器網(wǎng)絡(luò)廣播認(rèn)證協(xié)議研究[D];國防科學(xué)技術(shù)大學(xué);2010年
7 鄭麗娟;身份與位置分離網(wǎng)絡(luò)中認(rèn)證協(xié)議的研究與設(shè)計[D];北京交通大學(xué);2014年
8 楊衛(wèi)東;IEEE802.11無線網(wǎng)絡(luò)媒體訪問控制及認(rèn)證協(xié)議研究[D];西安電子科技大學(xué);2008年
9 王惠斌;安全認(rèn)證協(xié)議的設(shè)計與分析[D];解放軍信息工程大學(xué);2010年
10 曹雪菲;基于身份的認(rèn)證協(xié)議的理論及應(yīng)用研究[D];西安電子科技大學(xué);2008年
相關(guān)碩士學(xué)位論文 前10條
1 王海清;新型互聯(lián)網(wǎng)接入認(rèn)證協(xié)議的設(shè)計與實現(xiàn)[D];北京交通大學(xué);2016年
2 彭彥彬;醫(yī)療無線體域網(wǎng)輕量認(rèn)證協(xié)議的研究[D];太原理工大學(xué);2016年
3 張榮;一種安全高效的RFID批量認(rèn)證協(xié)議的研究與實現(xiàn)[D];北京理工大學(xué);2016年
4 胡可欣;FIDO UAF認(rèn)證協(xié)議的安全性研究[D];中國科學(xué)技術(shù)大學(xué);2016年
5 汪自旺;基于可信別名交換的VANET認(rèn)證協(xié)議研究[D];貴州師范大學(xué);2016年
6 侯倩;RFID安全認(rèn)證協(xié)議在移動終端上的軟件實現(xiàn)[D];北京交通大學(xué);2016年
7 譚皓文;輕量級RFID多標(biāo)簽認(rèn)證協(xié)議研究[D];南京信息工程大學(xué);2016年
8 溫俊偉;RFID認(rèn)證協(xié)議的研究與設(shè)計[D];電子科技大學(xué);2016年
9 張媛;可否認(rèn)的認(rèn)證協(xié)議的研究與分析[D];山東大學(xué);2012年
10 范成瑜;非交互式可否認(rèn)認(rèn)證協(xié)議的研究[D];電子科技大學(xué);2009年
,本文編號:2298989
本文鏈接:http://sikaile.net/shoufeilunwen/xxkjbs/2298989.html