资源预览内容
第1页 / 共5页
第2页 / 共5页
第3页 / 共5页
第4页 / 共5页
第5页 / 共5页
亲,该文档总共5页全部预览完了,如果喜欢就下载吧!
资源描述
Electronic Document Safe Exchange Technology Based on Identi Abstract: In this paper, in accordance with the current difficulties in the document and data exchange between different departments of an enterprise, the authors carry on analysis on the identity authentication and authorization problems in the document transmission system at the present time, and design a scheme for the electronic document exchange platform which is based on the cryptography algorithm of identity, and finally put forward an electronic document safe exchange platform based on the identity, which provides a security guarantee for the implementation of the free flow and conversion of the electronic documents among different intranets. In addition, the identity authentication and authorization access control with safety and higher reliability can be realized for the electronic documents transmission system in the applications of network as well. 下载论文网 https:/www.szxuexiao.com/uploadimages/C:U15er15A1136ini15AraAorDe15kAop作文/Electronic Document Safe Exchange Technology Based on Identi_标签自增ID.comKey words: Identity Cryptography, Electronic Documents, Safe ExchangeI. IntroductionAlong with the accelerated development of Chinas governmental Internet engineering, the construction and application of the e-government systems have attained a speedy development and popularization. When the enterprises and institutional organizations witness the effects of e-government systems and the low-carbon environmental protection concept is advocated universally, all of them enlarge the office automation applications in their departments. However, the core of the office automation touches upon the confidential information of these units as well as the highly-sensitive information. This is why that no real data exchange channel has been established between different departments, and also the documents between these departments are still made with paper and transferred manually. Therefore, the data exchange between different departments is highly difficult, and also the development of the office automation suffers from restrictions. Hence, in order to drive the development of the office automation further, an important problem which is necessary to be resolved is how to implement a safe electronic document exchange scheme with efficiency, making the documents within an enterprise flow and convert highly efficient across departments. To solve the difficulties of exchanging the electronic documents and data among different problems, the authors design a scheme for the electronic document exchange system, and also put forward a safe exchange model which is based on the identity cryptography, and hence provide a security guarantee for the implementation of the free flow and conversion of the electronic documents among different intranets.II. Electronic Document Security and TheoryTo simplify the key management of the traditional public key system, Israeli scientist A. Shamir, who was a famous inventor of the RSA system, first put forward the ID-based cryptography concept 1, 2: The identity information such as E-mail addresses, IP address, name or a hardware device ID which are released by users are used as the public key of users, while the private key is generated by a trusted center of the so-called private key generator. The extraction of the public key in this paper is obtained from the cryptography 3 of the combination of the ID code based on USB password with a character code. The principle of the ID-based cryptography is shown as the following. Step 1: There are our outputs when the parameters generate algorithm, which are the big prime (q), two groups of order (G1 and G2), and the mapping (e: G1G1G2).Step 2: Select a generating element (P), and randomly select the sZq*, and order the Ppub=sP.Step 3: Select a positive integer (n), and define the message space M=0, 1n and the cryptogram space C=G1*0, 1n.Define the hash function H1:0, 1*G1* and H2:G20,1n.The ultimately-released system parameter param=, masterkey s Zq*.Extract: Give ID0, 1* as the input,Calculate QID=H1 (ID) =G1* first, and then calculate the private key dID=sQID.Encrypt: calculate QID=H1 (ID) G1*, and randomly select rZq*, and calculate gID=e (QID, Ppub) G2*, C= (rP, M?H2 (gIDr)Decrypt: based on C = (U, V), calculate M =H2 (e (dID, U) ?VIn the above, the consistence is tenable.III. Identity Authentication and Implementation of the Electronic Document Exchange SystemWhen the users try to access the electronic document exchange system, the client will make a communication with both the identity authentication server and the authorization check server; then, the authentication server will complete the authentication of the identities of the users, while the authorization check server will control the strategic information and determines the
收藏 下载该资源
网站客服QQ:2055934822
金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号