On Key Escrow System for One-way and Two-way Communications

碩士 === 國立臺灣科技大學 === 電子工程系 === 88 === The LEAF arrangement of conventional key escrow systems confines LEA can only listen from the transmitter. So, when the suspect is the receiver in a one-way communication, LEA cannot get the suspect’s receiving message. When communication sy...

Full description

Bibliographic Details
Main Authors: YANG TAI YUEH, 楊泰岳
Other Authors: Chiu, Jung-Hui
Format: Others
Language:zh-TW
Published: 2000
Online Access:http://ndltd.ncl.edu.tw/handle/50738372285983301442
id ndltd-TW-088NTUST428089
record_format oai_dc
spelling ndltd-TW-088NTUST4280892016-01-29T04:18:55Z http://ndltd.ncl.edu.tw/handle/50738372285983301442 On Key Escrow System for One-way and Two-way Communications 適用單雙向通訊之金鑰託管系統之研究 YANG TAI YUEH 楊泰岳 碩士 國立臺灣科技大學 電子工程系 88 The LEAF arrangement of conventional key escrow systems confines LEA can only listen from the transmitter. So, when the suspect is the receiver in a one-way communication, LEA cannot get the suspect’s receiving message. When communication system allows both users decide their session key differently in a two-way communication, LEA cannot get the conversation. Due to the confinements described above, conventional key escrow systems do not listen secretly in a suspect- -oriented way. Because it is difficult to revise former systems to be suspect-oriented, we built a new KES to meet the following needs: (1) To be suspect-oriented. LEA can intercept communication at suspect’s end and recover message solely by suspect’s secret key components returning from KEAs. (2) LEA can get the information in both one-way and two-way communication. Even both users decide their own session keys in a two-way communication, LEA can get the whole contents. (3) LEA can only eavesdrop in an authorized duration. (4) This system stipulates a threshold to recover user’s secret key. LEA can calculate interim value while waiting KEAs’ returning values, and can get session key after the number of returning value is over the threshold. (5) This system can resist key conversion attack, squeezing attack, and bogus LEAF attack. (6) This system can protect user’s secret key from revealing to LEA, KEA, and KMC. Chiu, Jung-Hui 邱榮輝 2000 學位論文 ; thesis 76 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺灣科技大學 === 電子工程系 === 88 === The LEAF arrangement of conventional key escrow systems confines LEA can only listen from the transmitter. So, when the suspect is the receiver in a one-way communication, LEA cannot get the suspect’s receiving message. When communication system allows both users decide their session key differently in a two-way communication, LEA cannot get the conversation. Due to the confinements described above, conventional key escrow systems do not listen secretly in a suspect- -oriented way. Because it is difficult to revise former systems to be suspect-oriented, we built a new KES to meet the following needs: (1) To be suspect-oriented. LEA can intercept communication at suspect’s end and recover message solely by suspect’s secret key components returning from KEAs. (2) LEA can get the information in both one-way and two-way communication. Even both users decide their own session keys in a two-way communication, LEA can get the whole contents. (3) LEA can only eavesdrop in an authorized duration. (4) This system stipulates a threshold to recover user’s secret key. LEA can calculate interim value while waiting KEAs’ returning values, and can get session key after the number of returning value is over the threshold. (5) This system can resist key conversion attack, squeezing attack, and bogus LEAF attack. (6) This system can protect user’s secret key from revealing to LEA, KEA, and KMC.
author2 Chiu, Jung-Hui
author_facet Chiu, Jung-Hui
YANG TAI YUEH
楊泰岳
author YANG TAI YUEH
楊泰岳
spellingShingle YANG TAI YUEH
楊泰岳
On Key Escrow System for One-way and Two-way Communications
author_sort YANG TAI YUEH
title On Key Escrow System for One-way and Two-way Communications
title_short On Key Escrow System for One-way and Two-way Communications
title_full On Key Escrow System for One-way and Two-way Communications
title_fullStr On Key Escrow System for One-way and Two-way Communications
title_full_unstemmed On Key Escrow System for One-way and Two-way Communications
title_sort on key escrow system for one-way and two-way communications
publishDate 2000
url http://ndltd.ncl.edu.tw/handle/50738372285983301442
work_keys_str_mv AT yangtaiyueh onkeyescrowsystemforonewayandtwowaycommunications
AT yángtàiyuè onkeyescrowsystemforonewayandtwowaycommunications
AT yangtaiyueh shìyòngdānshuāngxiàngtōngxùnzhījīnyàotuōguǎnxìtǒngzhīyánjiū
AT yángtàiyuè shìyòngdānshuāngxiàngtōngxùnzhījīnyàotuōguǎnxìtǒngzhīyánjiū
_version_ 1718168108582043648