Computation and Application for ID-based Cryptosystems in Mobile Network
博士 === 國立交通大學 === 資訊工程系所 === 94 === In the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main c...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/87555687598296026718 |
id |
ndltd-TW-094NCTU5392013 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-094NCTU53920132015-10-13T11:53:33Z http://ndltd.ncl.edu.tw/handle/87555687598296026718 Computation and Application for ID-based Cryptosystems in Mobile Network 行動網路上身份導向公鑰密碼系統之計算與應用 Jing-Shyang Hwu 胡鈞祥 博士 國立交通大學 資訊工程系所 94 In the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main concern in a public-key setting is the authenticity of the public key. This issue can be resolved by identity-based (ID-based) cryptography where the public key of a user can be derived from public information that uniquely identifies the user. The first complete and efficient ID-based encryption scheme was proposed by Boneh and Franklin. They use a bilinear map (the Weil pairing) over elliptic curves to construct the encryption/decryption scheme. However, in the existing ID-based cryptosystem, the pairing computing has significant overhead. Therefore, efficient algorithm for computing bilinear pairing is essential for implementation. In this dissertation, we will study the bilinear pairings over elliptic curves and design improved algorithms for the computation of pairing over different finite fields. This will provide efficient implementations for ID-based cryptosystems in mobile devices to construct end-to-end security mechanisms. Rong-Jaye Chen Yi-Bing Lin 陳榮傑 林一平 2005 學位論文 ; thesis 73 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
博士 === 國立交通大學 === 資訊工程系所 === 94 === In the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main concern in a public-key setting is the authenticity of the public key. This issue can be resolved by identity-based (ID-based) cryptography where the public key of a user can be derived from public information that uniquely identifies the user. The first complete and efficient ID-based encryption scheme was proposed by Boneh and Franklin. They use a bilinear map (the Weil pairing) over elliptic curves to construct the encryption/decryption scheme. However, in the existing ID-based cryptosystem, the pairing computing has significant overhead. Therefore, efficient algorithm for computing bilinear pairing is essential for implementation. In this dissertation, we will study the bilinear pairings over elliptic curves and design improved algorithms for the computation of pairing over different finite fields. This will provide efficient implementations for ID-based cryptosystems in mobile devices to construct end-to-end security mechanisms.
|
author2 |
Rong-Jaye Chen |
author_facet |
Rong-Jaye Chen Jing-Shyang Hwu 胡鈞祥 |
author |
Jing-Shyang Hwu 胡鈞祥 |
spellingShingle |
Jing-Shyang Hwu 胡鈞祥 Computation and Application for ID-based Cryptosystems in Mobile Network |
author_sort |
Jing-Shyang Hwu |
title |
Computation and Application for ID-based Cryptosystems in Mobile Network |
title_short |
Computation and Application for ID-based Cryptosystems in Mobile Network |
title_full |
Computation and Application for ID-based Cryptosystems in Mobile Network |
title_fullStr |
Computation and Application for ID-based Cryptosystems in Mobile Network |
title_full_unstemmed |
Computation and Application for ID-based Cryptosystems in Mobile Network |
title_sort |
computation and application for id-based cryptosystems in mobile network |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/87555687598296026718 |
work_keys_str_mv |
AT jingshyanghwu computationandapplicationforidbasedcryptosystemsinmobilenetwork AT hújūnxiáng computationandapplicationforidbasedcryptosystemsinmobilenetwork AT jingshyanghwu xíngdòngwǎnglùshàngshēnfèndǎoxiànggōngyàomìmǎxìtǒngzhījìsuànyǔyīngyòng AT hújūnxiáng xíngdòngwǎnglùshàngshēnfèndǎoxiànggōngyàomìmǎxìtǒngzhījìsuànyǔyīngyòng |
_version_ |
1716850359241015296 |