On Key Escrow System for One-way and Two-way Communications
碩士 === 國立臺灣科技大學 === 電子工程系 === 88 === The LEAF arrangement of conventional key escrow systems confines LEA can only listen from the transmitter. So, when the suspect is the receiver in a one-way communication, LEA cannot get the suspect’s receiving message. When communication sy...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2000
|
Online Access: | http://ndltd.ncl.edu.tw/handle/50738372285983301442 |
id |
ndltd-TW-088NTUST428089 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-088NTUST4280892016-01-29T04:18:55Z http://ndltd.ncl.edu.tw/handle/50738372285983301442 On Key Escrow System for One-way and Two-way Communications 適用單雙向通訊之金鑰託管系統之研究 YANG TAI YUEH 楊泰岳 碩士 國立臺灣科技大學 電子工程系 88 The LEAF arrangement of conventional key escrow systems confines LEA can only listen from the transmitter. So, when the suspect is the receiver in a one-way communication, LEA cannot get the suspect’s receiving message. When communication system allows both users decide their session key differently in a two-way communication, LEA cannot get the conversation. Due to the confinements described above, conventional key escrow systems do not listen secretly in a suspect- -oriented way. Because it is difficult to revise former systems to be suspect-oriented, we built a new KES to meet the following needs: (1) To be suspect-oriented. LEA can intercept communication at suspect’s end and recover message solely by suspect’s secret key components returning from KEAs. (2) LEA can get the information in both one-way and two-way communication. Even both users decide their own session keys in a two-way communication, LEA can get the whole contents. (3) LEA can only eavesdrop in an authorized duration. (4) This system stipulates a threshold to recover user’s secret key. LEA can calculate interim value while waiting KEAs’ returning values, and can get session key after the number of returning value is over the threshold. (5) This system can resist key conversion attack, squeezing attack, and bogus LEAF attack. (6) This system can protect user’s secret key from revealing to LEA, KEA, and KMC. Chiu, Jung-Hui 邱榮輝 2000 學位論文 ; thesis 76 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣科技大學 === 電子工程系 === 88 === The LEAF arrangement of conventional key escrow systems confines LEA can only listen from the transmitter. So, when the
suspect is the receiver in a one-way communication, LEA cannot
get the suspect’s receiving message. When communication system
allows both users decide their session key differently in a
two-way communication, LEA cannot get the conversation. Due to
the confinements described above, conventional key escrow
systems do not listen secretly in a suspect- -oriented way.
Because it is difficult to revise former systems to be
suspect-oriented, we built a new KES to meet the following
needs:
(1) To be suspect-oriented. LEA can intercept communication at
suspect’s end and recover message solely by suspect’s secret
key components returning from KEAs.
(2) LEA can get the information in both one-way and two-way
communication. Even both users decide their own session keys in
a two-way communication, LEA can get the whole contents.
(3) LEA can only eavesdrop in an authorized duration.
(4) This system stipulates a threshold to recover user’s
secret key. LEA can calculate interim value while waiting
KEAs’ returning values, and can get session key after the
number of returning value is over the threshold.
(5) This system can resist key conversion attack, squeezing
attack, and bogus LEAF attack.
(6) This system can protect user’s secret key from revealing
to LEA, KEA, and KMC.
|
author2 |
Chiu, Jung-Hui |
author_facet |
Chiu, Jung-Hui YANG TAI YUEH 楊泰岳 |
author |
YANG TAI YUEH 楊泰岳 |
spellingShingle |
YANG TAI YUEH 楊泰岳 On Key Escrow System for One-way and Two-way Communications |
author_sort |
YANG TAI YUEH |
title |
On Key Escrow System for One-way and Two-way Communications |
title_short |
On Key Escrow System for One-way and Two-way Communications |
title_full |
On Key Escrow System for One-way and Two-way Communications |
title_fullStr |
On Key Escrow System for One-way and Two-way Communications |
title_full_unstemmed |
On Key Escrow System for One-way and Two-way Communications |
title_sort |
on key escrow system for one-way and two-way communications |
publishDate |
2000 |
url |
http://ndltd.ncl.edu.tw/handle/50738372285983301442 |
work_keys_str_mv |
AT yangtaiyueh onkeyescrowsystemforonewayandtwowaycommunications AT yángtàiyuè onkeyescrowsystemforonewayandtwowaycommunications AT yangtaiyueh shìyòngdānshuāngxiàngtōngxùnzhījīnyàotuōguǎnxìtǒngzhīyánjiū AT yángtàiyuè shìyòngdānshuāngxiàngtōngxùnzhījīnyàotuōguǎnxìtǒngzhīyánjiū |
_version_ |
1718168108582043648 |