Study of Identity-Based Public Key Cryptosystems
碩士 === 華梵大學 === 資訊管理學系碩士班 === 90 === With the prevalence of the Internet applications and the growth of electronic transactions, the government has devoted itself to the promotion of E-commerce. To make more profits from the market, more and more companies set up their Websites to enable shopping on...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/72918609214169502729 |
id |
ndltd-TW-091HCHT0396005 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-091HCHT03960052015-10-13T17:01:33Z http://ndltd.ncl.edu.tw/handle/72918609214169502729 Study of Identity-Based Public Key Cryptosystems 身分基底公開金鑰密碼系統之研究 Shu-Hui Kao 高淑惠 碩士 華梵大學 資訊管理學系碩士班 90 With the prevalence of the Internet applications and the growth of electronic transactions, the government has devoted itself to the promotion of E-commerce. To make more profits from the market, more and more companies set up their Websites to enable shopping on-line. Consequently, many researchers have devoted themselves to the security issues over the distributed environment. In addition to the digital signature and encryption mechanism which achieve the requirements of confidentiality, data integrity, authenticity, and non-repudiation, user authentication in the Internet application is also vital. The traditional approach that a trust authority distributes the certificate to guarantee the authenticity of the user’s identifier or the public key is inefficient, which increase the costs of the communication, the computation complexity and storage space requirement. Therefore, an identity-based public key system which is referred to as an ID-based public key system is proposed. In such a system, each user’s public key is regarded as his identifier, e.g., the name or the network address which can be used to uniquely identify him. That is, the public key is not required to be verified. To strengthen the application of the ID-based public key system, this thesis proposes an ID-based public key system containing ID-based signature, key exchange and encryption schemes. Tzong-Sun Wu 吳宗杉 2003 學位論文 ; thesis 59 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 華梵大學 === 資訊管理學系碩士班 === 90 === With the prevalence of the Internet applications and the growth of electronic transactions, the government has devoted itself to the promotion of E-commerce. To make more profits from the market, more and more companies set up their Websites to enable shopping on-line. Consequently, many researchers have devoted themselves to the security issues over the distributed environment. In addition to the digital signature and encryption mechanism which achieve the requirements of confidentiality, data integrity, authenticity, and non-repudiation, user authentication in the Internet application is also vital. The traditional approach that a trust authority distributes the certificate to guarantee the authenticity of the user’s identifier or the public key is inefficient, which increase the costs of the communication, the computation complexity and storage space requirement. Therefore, an identity-based public key system which is referred to as an ID-based public key system is proposed. In such a system, each user’s public key is regarded as his identifier, e.g., the name or the network address which can be used to uniquely identify him. That is, the public key is not required to be verified. To strengthen the application of the ID-based public key system, this thesis proposes an ID-based public key system containing ID-based signature, key exchange and encryption schemes.
|
author2 |
Tzong-Sun Wu |
author_facet |
Tzong-Sun Wu Shu-Hui Kao 高淑惠 |
author |
Shu-Hui Kao 高淑惠 |
spellingShingle |
Shu-Hui Kao 高淑惠 Study of Identity-Based Public Key Cryptosystems |
author_sort |
Shu-Hui Kao |
title |
Study of Identity-Based Public Key Cryptosystems |
title_short |
Study of Identity-Based Public Key Cryptosystems |
title_full |
Study of Identity-Based Public Key Cryptosystems |
title_fullStr |
Study of Identity-Based Public Key Cryptosystems |
title_full_unstemmed |
Study of Identity-Based Public Key Cryptosystems |
title_sort |
study of identity-based public key cryptosystems |
publishDate |
2003 |
url |
http://ndltd.ncl.edu.tw/handle/72918609214169502729 |
work_keys_str_mv |
AT shuhuikao studyofidentitybasedpublickeycryptosystems AT gāoshūhuì studyofidentitybasedpublickeycryptosystems AT shuhuikao shēnfēnjīdǐgōngkāijīnyàomìmǎxìtǒngzhīyánjiū AT gāoshūhuì shēnfēnjīdǐgōngkāijīnyàomìmǎxìtǒngzhīyánjiū |
_version_ |
1717778332334948352 |