Data defense and secrete sharing of the National military
碩士 === 國防大學中正理工學院 === 電子工程研究所 === 91 === Transmitting documents in the computer network is generally unsafe due to the open structure of the network. In the depth defense point of view, the document defense is the last line of defense. However, the key management is an essential factor in the docume...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/79789264324493569479 |
id |
ndltd-TW-091CCIT0428026 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-091CCIT04280262016-06-13T04:16:29Z http://ndltd.ncl.edu.tw/handle/79789264324493569479 Data defense and secrete sharing of the National military 國軍資料防禦策略與秘密分享技術之研究 Ming-Wu Lin 林明武 碩士 國防大學中正理工學院 電子工程研究所 91 Transmitting documents in the computer network is generally unsafe due to the open structure of the network. In the depth defense point of view, the document defense is the last line of defense. However, the key management is an essential factor in the document defense. Using the technology and the strategy of secrete sharing can help to disperse and reduce the hazards of key management. In this thesis, the verifiable multi-secret sharing scheme is proposed to realize the threshold strategy of secret reconstruction in hierarchical organizations. In our proposed scheme, participants are classified into several hierarchical disjoint levels. Each participant on the defined level provides a secret sharing via a pre-defined threshold. When the number of the presence participants is less than the predefined threshold at a target level, the participants on the higher levels are requested to support them for reconstructing the shared secret. Thus, the high level participants who have authorities and responsibilities higher than that of the low level participants can help to reconstruct the shared secrets. Yi-Bin Lu 陸儀斌 2003 學位論文 ; thesis 62 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國防大學中正理工學院 === 電子工程研究所 === 91 === Transmitting documents in the computer network is generally unsafe due to the open structure of the network. In the depth defense point of view, the document defense is the last line of defense. However, the key management is an essential factor in the document defense. Using the technology and the strategy of secrete sharing can help to disperse and reduce the hazards of key management.
In this thesis, the verifiable multi-secret sharing scheme is proposed to realize the threshold strategy of secret reconstruction in hierarchical organizations. In our proposed scheme, participants are classified into several hierarchical disjoint levels. Each participant on the defined level provides a secret sharing via a pre-defined threshold. When the number of the presence participants is less than the predefined threshold at a target level, the participants on the higher levels are requested to support them for reconstructing the shared secret. Thus, the high level participants who have authorities and responsibilities higher than that of the low level participants can help to reconstruct the shared secrets.
|
author2 |
Yi-Bin Lu |
author_facet |
Yi-Bin Lu Ming-Wu Lin 林明武 |
author |
Ming-Wu Lin 林明武 |
spellingShingle |
Ming-Wu Lin 林明武 Data defense and secrete sharing of the National military |
author_sort |
Ming-Wu Lin |
title |
Data defense and secrete sharing of the National military |
title_short |
Data defense and secrete sharing of the National military |
title_full |
Data defense and secrete sharing of the National military |
title_fullStr |
Data defense and secrete sharing of the National military |
title_full_unstemmed |
Data defense and secrete sharing of the National military |
title_sort |
data defense and secrete sharing of the national military |
publishDate |
2003 |
url |
http://ndltd.ncl.edu.tw/handle/79789264324493569479 |
work_keys_str_mv |
AT mingwulin datadefenseandsecretesharingofthenationalmilitary AT línmíngwǔ datadefenseandsecretesharingofthenationalmilitary AT mingwulin guójūnzīliàofángyùcèlüèyǔmìmìfēnxiǎngjìshùzhīyánjiū AT línmíngwǔ guójūnzīliàofángyùcèlüèyǔmìmìfēnxiǎngjìshùzhīyánjiū |
_version_ |
1718302315958501376 |