短签名算法研究及其在移动云计算中的应用
[Abstract]:With the wide popularity of mobile terminals such as smart phones and tablets, the mobile Internet (MI,Mobile Internet) came into being, but mobile terminals have a series of defects such as small storage space, weak computing power, cloud computing (CC,). The rise of Clouding Computing) provides a new computing model to solve the limitation of mobile terminals, which leads to the combination of the advantages of mobile Internet and cloud computing service-Mobile Cloud Computing (MCC,Mobile Clouding Computing). As a super computing model, mobile cloud computing enables users to access the corresponding computers and storage systems according to their needs through the mobile Internet, obtain the required resources and services at any time, anywhere and easily realize data exchange. Therefore, the performance requirements of mobile terminals are reduced, and mobile Internet is developed rapidly. Although the introduction of cloud computing has solved the limited resources of mobile terminals, because the data in cloud computing is stored in the "cloud" end and monopolized by enterprises, they can only provide commercial credit protection, and users no longer have the ability to control the data. And if malicious users access cloud computing, it will pose a great threat to the security of data in the cloud. Therefore, how to realize the secure access of users and the secure storage of data in cloud computing has become a hot research topic. This paper focuses on improving some security problems in mobile cloud computing access authentication protocol. In this paper, a certificate free short signature algorithm is proposed, which has the following advantages: firstly, the pair operation in the signature phase is eliminated, only two pairs of operations are required in the verification phase, and the signature length is reduced to 160 bits, so it has an efficient computing efficiency. Secondly, the user's public key is bound to its corresponding private key, which not only avoids the public key substitution attack, but also the malicious KGC attack is difficult to implement. Thirdly, it is proved that the new scheme is unforgeable to the adaptive selection message attack under the random oracle model. Finally, the simulation and evaluation of the certificateless short signature algorithm proposed in this paper is carried out in the software environment, which proves that the new algorithm has high security and execution efficiency. Based on the above algorithms, we improve the security problems in the open identity (Open ID) authentication protocol in mobile cloud computing services, and propose a new user security access authentication protocol. The protocol has the advantages of simple flow, low computational complexity, user anonymity, non-repudiation, bidirectional authentication, key establishment and so on, and improves the access efficiency and security of users.
【学位授予单位】:西安电子科技大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TN918.91
【相似文献】
相关期刊论文 前10条
1 潘星;一种压缩签名算法及其性能分析[J];计算机应用与软件;1992年06期
2 马春光;石岚;汪定;;基于访问树的属性基签名算法[J];电子科技大学学报;2013年03期
3 徐邢启;潘进;陈志广;刘小琼;;基于身份的无证书高效签名算法研究[J];计算机工程与设计;2011年10期
4 李琥,陈黄海,诸鸿文;路由认证方案中一次性签名算法的应用[J];通信技术;2001年01期
5 吴佳英;李平;;基于弱信任关系的可证实签名算法[J];计算机工程与设计;2007年02期
6 刘庆华;宋余庆;刘毅;;一种高效的无证书内容可提取签名算法[J];计算机科学;2013年08期
7 郑建国;游林;;基于椭圆曲线密码体制的电子交易算法[J];海南师范大学学报(自然科学版);2007年01期
8 武滨;吴道强;;扩展RSA签名算法 实现双人签名、验证[J];华南金融电脑;2009年04期
9 牛淑芬;王彩芬;刘雪艳;;抵御污染攻击的双源网络编码签名算法[J];计算机应用;2011年06期
10 贺健;张健航;白文华;;一种同时基于多个数学难题的签名算法[J];电子科技;2011年04期
相关博士学位论文 前1条
1 曾晟珂;保护用户隐私的可否认的密码算法研究[D];电子科技大学;2013年
相关硕士学位论文 前8条
1 王彩学;基于身份及无证书聚合签名算法的分析与设计[D];西南交通大学;2015年
2 武慧超;短签名算法研究及其在移动云计算中的应用[D];西安电子科技大学;2014年
3 刘彪;环签名算法研究与应用[D];西安电子科技大学;2012年
4 严文杰;网络编码签名算法[D];武汉理工大学;2010年
5 赵继宁;基于云计算的数据存储安全协议的设计与分析[D];电子科技大学;2013年
6 刘幼萍;Waters签名算法及应用研究[D];杭州电子科技大学;2013年
7 贺健;移动自组网中环签名算法的研究与应用[D];西安电子科技大学;2012年
8 王兴平;UOV签名算法的一种硬件设计与实现[D];华南理工大学;2014年
,本文编号:2388990
本文链接:https://www.wllwen.com/kejilunwen/wltx/2388990.html