Electronic Document Safe Exchange Technology Based on Identi

上传人:人*** 文档编号:469142578 上传时间:2023-10-02 格式:DOCX 页数:5 大小:15.06KB
返回 下载 相关 举报
Electronic Document Safe Exchange Technology Based on Identi_第1页
第1页 / 共5页
Electronic Document Safe Exchange Technology Based on Identi_第2页
第2页 / 共5页
Electronic Document Safe Exchange Technology Based on Identi_第3页
第3页 / 共5页
Electronic Document Safe Exchange Technology Based on Identi_第4页
第4页 / 共5页
Electronic Document Safe Exchange Technology Based on Identi_第5页
第5页 / 共5页
亲,该文档总共5页,全部预览完了,如果喜欢就下载吧!
资源描述

《Electronic Document Safe Exchange Technology Based on Identi》由会员分享,可在线阅读,更多相关《Electronic Document Safe Exchange Technology Based on Identi(5页珍藏版)》请在金锄头文库上搜索。

1、Electronic Document Safe Exchange Technology Based on Identi Abstract: In this paper, in accordance with the current difficulties in the document and data exchange between different departments of an enterprise, the authors carry on analysis on the identity authentication and authorization problems

2、in the document transmission system at the present time, and design a scheme for the electronic document exchange platform which is based on the cryptography algorithm of identity, and finally put forward an electronic document safe exchange platform based on the identity, which provides a security

3、guarantee for the implementation of the free flow and conversion of the electronic documents among different intranets. In addition, the identity authentication and authorization access control with safety and higher reliability can be realized for the electronic documents transmission system in the

4、 applications of network as well. 下载论文网 https:/ Document Safe Exchange Technology Based on Identi_标签自增ID.comKey words: Identity Cryptography, Electronic Documents, Safe ExchangeI. IntroductionAlong with the accelerated development of Chinas governmental Internet engineering, the construction and app

5、lication of the e-government systems have attained a speedy development and popularization. When the enterprises and institutional organizations witness the effects of e-government systems and the low-carbon environmental protection concept is advocated universally, all of them enlarge the office au

6、tomation applications in their departments. However, the core of the office automation touches upon the confidential information of these units as well as the highly-sensitive information. This is why that no real data exchange channel has been established between different departments, and also the

7、 documents between these departments are still made with paper and transferred manually. Therefore, the data exchange between different departments is highly difficult, and also the development of the office automation suffers from restrictions. Hence, in order to drive the development of the office

8、 automation further, an important problem which is necessary to be resolved is how to implement a safe electronic document exchange scheme with efficiency, making the documents within an enterprise flow and convert highly efficient across departments. To solve the difficulties of exchanging the elec

9、tronic documents and data among different problems, the authors design a scheme for the electronic document exchange system, and also put forward a safe exchange model which is based on the identity cryptography, and hence provide a security guarantee for the implementation of the free flow and conv

10、ersion of the electronic documents among different intranets.II. Electronic Document Security and TheoryTo simplify the key management of the traditional public key system, Israeli scientist A. Shamir, who was a famous inventor of the RSA system, first put forward the ID-based cryptography concept 1

11、, 2: The identity information such as E-mail addresses, IP address, name or a hardware device ID which are released by users are used as the public key of users, while the private key is generated by a trusted center of the so-called private key generator. The extraction of the public key in this pa

12、per is obtained from the cryptography 3 of the combination of the ID code based on USB password with a character code. The principle of the ID-based cryptography is shown as the following. Step 1: There are our outputs when the parameters generate algorithm, which are the big prime (q), two groups o

13、f order (G1 and G2), and the mapping (e: G1G1G2).Step 2: Select a generating element (P), and randomly select the sZq*, and order the Ppub=sP.Step 3: Select a positive integer (n), and define the message space M=0, 1n and the cryptogram space C=G1*0, 1n.Define the hash function H1:0, 1*G1* and H2:G2

14、0,1n.The ultimately-released system parameter param=, masterkey s Zq*.Extract: Give ID0, 1* as the input,Calculate QID=H1 (ID) =G1* first, and then calculate the private key dID=sQID.Encrypt: calculate QID=H1 (ID) G1*, and randomly select rZq*, and calculate gID=e (QID, Ppub) G2*, C= (rP, M?H2 (gIDr

15、)Decrypt: based on C = (U, V), calculate M =H2 (e (dID, U) ?VIn the above, the consistence is tenable.III. Identity Authentication and Implementation of the Electronic Document Exchange SystemWhen the users try to access the electronic document exchange system, the client will make a communication with both the identity authentication server and the authorization check server; then, the authentication server will complete the authentication of the identities of the users, while the authorization check server will control the strategic information and determines the

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 办公文档 > 活动策划

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号