Study of Identity-Based Public Key Cryptosystems

碩士 === 華梵大學 === 資訊管理學系碩士班 === 90 === With the prevalence of the Internet applications and the growth of electronic transactions, the government has devoted itself to the promotion of E-commerce. To make more profits from the market, more and more companies set up their Websites to enable shopping on...

Full description

Bibliographic Details
Main Authors: Shu-Hui Kao, 高淑惠
Other Authors: Tzong-Sun Wu
Format: Others
Language:zh-TW
Published: 2003
Online Access:http://ndltd.ncl.edu.tw/handle/72918609214169502729
id ndltd-TW-091HCHT0396005
record_format oai_dc
spelling ndltd-TW-091HCHT03960052015-10-13T17:01:33Z http://ndltd.ncl.edu.tw/handle/72918609214169502729 Study of Identity-Based Public Key Cryptosystems 身分基底公開金鑰密碼系統之研究 Shu-Hui Kao 高淑惠 碩士 華梵大學 資訊管理學系碩士班 90 With the prevalence of the Internet applications and the growth of electronic transactions, the government has devoted itself to the promotion of E-commerce. To make more profits from the market, more and more companies set up their Websites to enable shopping on-line. Consequently, many researchers have devoted themselves to the security issues over the distributed environment. In addition to the digital signature and encryption mechanism which achieve the requirements of confidentiality, data integrity, authenticity, and non-repudiation, user authentication in the Internet application is also vital. The traditional approach that a trust authority distributes the certificate to guarantee the authenticity of the user’s identifier or the public key is inefficient, which increase the costs of the communication, the computation complexity and storage space requirement. Therefore, an identity-based public key system which is referred to as an ID-based public key system is proposed. In such a system, each user’s public key is regarded as his identifier, e.g., the name or the network address which can be used to uniquely identify him. That is, the public key is not required to be verified. To strengthen the application of the ID-based public key system, this thesis proposes an ID-based public key system containing ID-based signature, key exchange and encryption schemes. Tzong-Sun Wu 吳宗杉 2003 學位論文 ; thesis 59 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 華梵大學 === 資訊管理學系碩士班 === 90 === With the prevalence of the Internet applications and the growth of electronic transactions, the government has devoted itself to the promotion of E-commerce. To make more profits from the market, more and more companies set up their Websites to enable shopping on-line. Consequently, many researchers have devoted themselves to the security issues over the distributed environment. In addition to the digital signature and encryption mechanism which achieve the requirements of confidentiality, data integrity, authenticity, and non-repudiation, user authentication in the Internet application is also vital. The traditional approach that a trust authority distributes the certificate to guarantee the authenticity of the user’s identifier or the public key is inefficient, which increase the costs of the communication, the computation complexity and storage space requirement. Therefore, an identity-based public key system which is referred to as an ID-based public key system is proposed. In such a system, each user’s public key is regarded as his identifier, e.g., the name or the network address which can be used to uniquely identify him. That is, the public key is not required to be verified. To strengthen the application of the ID-based public key system, this thesis proposes an ID-based public key system containing ID-based signature, key exchange and encryption schemes.
author2 Tzong-Sun Wu
author_facet Tzong-Sun Wu
Shu-Hui Kao
高淑惠
author Shu-Hui Kao
高淑惠
spellingShingle Shu-Hui Kao
高淑惠
Study of Identity-Based Public Key Cryptosystems
author_sort Shu-Hui Kao
title Study of Identity-Based Public Key Cryptosystems
title_short Study of Identity-Based Public Key Cryptosystems
title_full Study of Identity-Based Public Key Cryptosystems
title_fullStr Study of Identity-Based Public Key Cryptosystems
title_full_unstemmed Study of Identity-Based Public Key Cryptosystems
title_sort study of identity-based public key cryptosystems
publishDate 2003
url http://ndltd.ncl.edu.tw/handle/72918609214169502729
work_keys_str_mv AT shuhuikao studyofidentitybasedpublickeycryptosystems
AT gāoshūhuì studyofidentitybasedpublickeycryptosystems
AT shuhuikao shēnfēnjīdǐgōngkāijīnyàomìmǎxìtǒngzhīyánjiū
AT gāoshūhuì shēnfēnjīdǐgōngkāijīnyàomìmǎxìtǒngzhīyánjiū
_version_ 1717778332334948352