Round-efficient Distributed Conference Key Systems

碩士 === 國立交通大學 === 資訊科學系 === 88 === When some members want to hold a conference via an open Internet, there may have passive attackers eavesdropping the communication. Therefore, all participants should establish a common conference key to encrypt the entire communication session during the conferenc...

Full description

Bibliographic Details
Main Authors: Chia-Hong Su, 蘇家弘
Other Authors: Wen-Guey Tzeng
Format: Others
Language:zh-TW
Published: 2000
Online Access:http://ndltd.ncl.edu.tw/handle/68748987833457668395
id ndltd-TW-088NCTU0394067
record_format oai_dc
spelling ndltd-TW-088NCTU03940672015-10-13T10:59:52Z http://ndltd.ncl.edu.tw/handle/68748987833457668395 Round-efficient Distributed Conference Key Systems 有效減少通訊回合數的分散式會議金鑰系統 Chia-Hong Su 蘇家弘 碩士 國立交通大學 資訊科學系 88 When some members want to hold a conference via an open Internet, there may have passive attackers eavesdropping the communication. Therefore, all participants should establish a common conference key to encrypt the entire communication session during the conference. Futhermore, when the participants execute the conference key agreement protocol, some malicious participants may not follow the protocol and try to cheat the honest participants to compute the different conference keys. So how to make sure that the honest participants get a common conference key is one of the major concerns. Besides these, the efficiency of the protocol is also very important. Thus, we proposed three round-efficient conference agreement protocols. No matter how many malicious participants there are, the honest participants will get a common conference key. Wen-Guey Tzeng 曾文貴 2000 學位論文 ; thesis 54 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 資訊科學系 === 88 === When some members want to hold a conference via an open Internet, there may have passive attackers eavesdropping the communication. Therefore, all participants should establish a common conference key to encrypt the entire communication session during the conference. Futhermore, when the participants execute the conference key agreement protocol, some malicious participants may not follow the protocol and try to cheat the honest participants to compute the different conference keys. So how to make sure that the honest participants get a common conference key is one of the major concerns. Besides these, the efficiency of the protocol is also very important. Thus, we proposed three round-efficient conference agreement protocols. No matter how many malicious participants there are, the honest participants will get a common conference key.
author2 Wen-Guey Tzeng
author_facet Wen-Guey Tzeng
Chia-Hong Su
蘇家弘
author Chia-Hong Su
蘇家弘
spellingShingle Chia-Hong Su
蘇家弘
Round-efficient Distributed Conference Key Systems
author_sort Chia-Hong Su
title Round-efficient Distributed Conference Key Systems
title_short Round-efficient Distributed Conference Key Systems
title_full Round-efficient Distributed Conference Key Systems
title_fullStr Round-efficient Distributed Conference Key Systems
title_full_unstemmed Round-efficient Distributed Conference Key Systems
title_sort round-efficient distributed conference key systems
publishDate 2000
url http://ndltd.ncl.edu.tw/handle/68748987833457668395
work_keys_str_mv AT chiahongsu roundefficientdistributedconferencekeysystems
AT sūjiāhóng roundefficientdistributedconferencekeysystems
AT chiahongsu yǒuxiàojiǎnshǎotōngxùnhuíhéshùdefēnsànshìhuìyìjīnyàoxìtǒng
AT sūjiāhóng yǒuxiàojiǎnshǎotōngxùnhuíhéshùdefēnsànshìhuìyìjīnyàoxìtǒng
_version_ 1716835413965930496