Round-efficient Distributed Conference Key Systems
碩士 === 國立交通大學 === 資訊科學系 === 88 === When some members want to hold a conference via an open Internet, there may have passive attackers eavesdropping the communication. Therefore, all participants should establish a common conference key to encrypt the entire communication session during the conferenc...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2000
|
Online Access: | http://ndltd.ncl.edu.tw/handle/68748987833457668395 |
id |
ndltd-TW-088NCTU0394067 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-088NCTU03940672015-10-13T10:59:52Z http://ndltd.ncl.edu.tw/handle/68748987833457668395 Round-efficient Distributed Conference Key Systems 有效減少通訊回合數的分散式會議金鑰系統 Chia-Hong Su 蘇家弘 碩士 國立交通大學 資訊科學系 88 When some members want to hold a conference via an open Internet, there may have passive attackers eavesdropping the communication. Therefore, all participants should establish a common conference key to encrypt the entire communication session during the conference. Futhermore, when the participants execute the conference key agreement protocol, some malicious participants may not follow the protocol and try to cheat the honest participants to compute the different conference keys. So how to make sure that the honest participants get a common conference key is one of the major concerns. Besides these, the efficiency of the protocol is also very important. Thus, we proposed three round-efficient conference agreement protocols. No matter how many malicious participants there are, the honest participants will get a common conference key. Wen-Guey Tzeng 曾文貴 2000 學位論文 ; thesis 54 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 資訊科學系 === 88 === When some members want to hold a conference via an open Internet, there may have passive attackers eavesdropping the communication. Therefore, all participants should establish a common conference key to encrypt the entire communication session during the conference.
Futhermore, when the participants execute the conference key agreement protocol, some malicious participants may not follow the protocol and try to cheat the honest participants to compute the different conference keys. So how to make sure that the honest participants get a common conference key is one of the major concerns.
Besides these, the efficiency of the protocol is also very important. Thus, we proposed three round-efficient conference agreement protocols. No matter how many malicious participants there are, the honest participants will get a common conference key.
|
author2 |
Wen-Guey Tzeng |
author_facet |
Wen-Guey Tzeng Chia-Hong Su 蘇家弘 |
author |
Chia-Hong Su 蘇家弘 |
spellingShingle |
Chia-Hong Su 蘇家弘 Round-efficient Distributed Conference Key Systems |
author_sort |
Chia-Hong Su |
title |
Round-efficient Distributed Conference Key Systems |
title_short |
Round-efficient Distributed Conference Key Systems |
title_full |
Round-efficient Distributed Conference Key Systems |
title_fullStr |
Round-efficient Distributed Conference Key Systems |
title_full_unstemmed |
Round-efficient Distributed Conference Key Systems |
title_sort |
round-efficient distributed conference key systems |
publishDate |
2000 |
url |
http://ndltd.ncl.edu.tw/handle/68748987833457668395 |
work_keys_str_mv |
AT chiahongsu roundefficientdistributedconferencekeysystems AT sūjiāhóng roundefficientdistributedconferencekeysystems AT chiahongsu yǒuxiàojiǎnshǎotōngxùnhuíhéshùdefēnsànshìhuìyìjīnyàoxìtǒng AT sūjiāhóng yǒuxiàojiǎnshǎotōngxùnhuíhéshùdefēnsànshìhuìyìjīnyàoxìtǒng |
_version_ |
1716835413965930496 |