A Fault-Tolerant Distributed Conference Key System
碩士 === 國立交通大學 === 資訊科學系 === 87 === When some members want to hold a conference over the open Internet, maybe there are some passive attackers trying to eavesdrop the communication. So those conference participants should establish a common conference key before the conference, and then th...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
1999
|
Online Access: | http://ndltd.ncl.edu.tw/handle/52810789868653078673 |
id |
ndltd-TW-087NCTU0394072 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-087NCTU03940722016-07-11T04:13:35Z http://ndltd.ncl.edu.tw/handle/52810789868653078673 A Fault-Tolerant Distributed Conference Key System 具容錯性質的分散式會議金鑰系統 Chung-Hsuan Kuo 郭仲軒 碩士 國立交通大學 資訊科學系 87 When some members want to hold a conference over the open Internet, maybe there are some passive attackers trying to eavesdrop the communication. So those conference participants should establish a common conference key before the conference, and then they could use the conference key to encrypt the communication messages during the conference. But when those conference participants are executing a conference key agreement protocol, some malicious participants would try to cheat other participants, and let the honest participants fail to get a common conference key. We proposed a distributed conference key agreement protocol without any trusted authentication center. If the majority of participants are honest, the honest participants will establish a common conference key. Our protocol is zero-knowledge against a passive attacker. Wen-Guey Tzeng 曾文貴 1999 學位論文 ; thesis 54 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 資訊科學系 === 87 === When some members want to hold a conference over the open Internet, maybe there are some passive attackers trying to eavesdrop the communication. So those conference participants should establish a common conference key before the conference, and then they could use the conference key to encrypt the communication messages during the conference.
But when those conference participants are executing a conference key agreement protocol, some malicious participants would try to cheat other participants, and let the honest participants fail to get a common conference key.
We proposed a distributed conference key agreement protocol without any trusted authentication center. If the majority of participants are honest, the honest participants will establish a common conference key. Our protocol is zero-knowledge against a passive attacker.
|
author2 |
Wen-Guey Tzeng |
author_facet |
Wen-Guey Tzeng Chung-Hsuan Kuo 郭仲軒 |
author |
Chung-Hsuan Kuo 郭仲軒 |
spellingShingle |
Chung-Hsuan Kuo 郭仲軒 A Fault-Tolerant Distributed Conference Key System |
author_sort |
Chung-Hsuan Kuo |
title |
A Fault-Tolerant Distributed Conference Key System |
title_short |
A Fault-Tolerant Distributed Conference Key System |
title_full |
A Fault-Tolerant Distributed Conference Key System |
title_fullStr |
A Fault-Tolerant Distributed Conference Key System |
title_full_unstemmed |
A Fault-Tolerant Distributed Conference Key System |
title_sort |
fault-tolerant distributed conference key system |
publishDate |
1999 |
url |
http://ndltd.ncl.edu.tw/handle/52810789868653078673 |
work_keys_str_mv |
AT chunghsuankuo afaulttolerantdistributedconferencekeysystem AT guōzhòngxuān afaulttolerantdistributedconferencekeysystem AT chunghsuankuo jùróngcuòxìngzhìdefēnsànshìhuìyìjīnyàoxìtǒng AT guōzhòngxuān jùróngcuòxìngzhìdefēnsànshìhuìyìjīnyàoxìtǒng AT chunghsuankuo faulttolerantdistributedconferencekeysystem AT guōzhòngxuān faulttolerantdistributedconferencekeysystem |
_version_ |
1718343444260192256 |