Computation and Application for ID-based Cryptosystems in Mobile Network

博士 === 國立交通大學 === 資訊工程系所 === 94 === In the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main c...

Full description

Bibliographic Details
Main Authors: Jing-Shyang Hwu, 胡鈞祥
Other Authors: Rong-Jaye Chen
Format: Others
Language:en_US
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/87555687598296026718
id ndltd-TW-094NCTU5392013
record_format oai_dc
spelling ndltd-TW-094NCTU53920132015-10-13T11:53:33Z http://ndltd.ncl.edu.tw/handle/87555687598296026718 Computation and Application for ID-based Cryptosystems in Mobile Network 行動網路上身份導向公鑰密碼系統之計算與應用 Jing-Shyang Hwu 胡鈞祥 博士 國立交通大學 資訊工程系所 94 In the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main concern in a public-key setting is the authenticity of the public key. This issue can be resolved by identity-based (ID-based) cryptography where the public key of a user can be derived from public information that uniquely identifies the user. The first complete and efficient ID-based encryption scheme was proposed by Boneh and Franklin. They use a bilinear map (the Weil pairing) over elliptic curves to construct the encryption/decryption scheme. However, in the existing ID-based cryptosystem, the pairing computing has significant overhead. Therefore, efficient algorithm for computing bilinear pairing is essential for implementation. In this dissertation, we will study the bilinear pairings over elliptic curves and design improved algorithms for the computation of pairing over different finite fields. This will provide efficient implementations for ID-based cryptosystems in mobile devices to construct end-to-end security mechanisms. Rong-Jaye Chen Yi-Bing Lin 陳榮傑 林一平 2005 學位論文 ; thesis 73 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 博士 === 國立交通大學 === 資訊工程系所 === 94 === In the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main concern in a public-key setting is the authenticity of the public key. This issue can be resolved by identity-based (ID-based) cryptography where the public key of a user can be derived from public information that uniquely identifies the user. The first complete and efficient ID-based encryption scheme was proposed by Boneh and Franklin. They use a bilinear map (the Weil pairing) over elliptic curves to construct the encryption/decryption scheme. However, in the existing ID-based cryptosystem, the pairing computing has significant overhead. Therefore, efficient algorithm for computing bilinear pairing is essential for implementation. In this dissertation, we will study the bilinear pairings over elliptic curves and design improved algorithms for the computation of pairing over different finite fields. This will provide efficient implementations for ID-based cryptosystems in mobile devices to construct end-to-end security mechanisms.
author2 Rong-Jaye Chen
author_facet Rong-Jaye Chen
Jing-Shyang Hwu
胡鈞祥
author Jing-Shyang Hwu
胡鈞祥
spellingShingle Jing-Shyang Hwu
胡鈞祥
Computation and Application for ID-based Cryptosystems in Mobile Network
author_sort Jing-Shyang Hwu
title Computation and Application for ID-based Cryptosystems in Mobile Network
title_short Computation and Application for ID-based Cryptosystems in Mobile Network
title_full Computation and Application for ID-based Cryptosystems in Mobile Network
title_fullStr Computation and Application for ID-based Cryptosystems in Mobile Network
title_full_unstemmed Computation and Application for ID-based Cryptosystems in Mobile Network
title_sort computation and application for id-based cryptosystems in mobile network
publishDate 2005
url http://ndltd.ncl.edu.tw/handle/87555687598296026718
work_keys_str_mv AT jingshyanghwu computationandapplicationforidbasedcryptosystemsinmobilenetwork
AT hújūnxiáng computationandapplicationforidbasedcryptosystemsinmobilenetwork
AT jingshyanghwu xíngdòngwǎnglùshàngshēnfèndǎoxiànggōngyàomìmǎxìtǒngzhījìsuànyǔyīngyòng
AT hújūnxiáng xíngdòngwǎnglùshàngshēnfèndǎoxiànggōngyàomìmǎxìtǒngzhījìsuànyǔyīngyòng
_version_ 1716850359241015296