Data defense and secrete sharing of the National military

碩士 === 國防大學中正理工學院 === 電子工程研究所 === 91 === Transmitting documents in the computer network is generally unsafe due to the open structure of the network. In the depth defense point of view, the document defense is the last line of defense. However, the key management is an essential factor in the docume...

Full description

Bibliographic Details
Main Authors: Ming-Wu Lin, 林明武
Other Authors: Yi-Bin Lu
Format: Others
Language:zh-TW
Published: 2003
Online Access:http://ndltd.ncl.edu.tw/handle/79789264324493569479
id ndltd-TW-091CCIT0428026
record_format oai_dc
spelling ndltd-TW-091CCIT04280262016-06-13T04:16:29Z http://ndltd.ncl.edu.tw/handle/79789264324493569479 Data defense and secrete sharing of the National military 國軍資料防禦策略與秘密分享技術之研究 Ming-Wu Lin 林明武 碩士 國防大學中正理工學院 電子工程研究所 91 Transmitting documents in the computer network is generally unsafe due to the open structure of the network. In the depth defense point of view, the document defense is the last line of defense. However, the key management is an essential factor in the document defense. Using the technology and the strategy of secrete sharing can help to disperse and reduce the hazards of key management. In this thesis, the verifiable multi-secret sharing scheme is proposed to realize the threshold strategy of secret reconstruction in hierarchical organizations. In our proposed scheme, participants are classified into several hierarchical disjoint levels. Each participant on the defined level provides a secret sharing via a pre-defined threshold. When the number of the presence participants is less than the predefined threshold at a target level, the participants on the higher levels are requested to support them for reconstructing the shared secret. Thus, the high level participants who have authorities and responsibilities higher than that of the low level participants can help to reconstruct the shared secrets. Yi-Bin Lu 陸儀斌 2003 學位論文 ; thesis 62 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國防大學中正理工學院 === 電子工程研究所 === 91 === Transmitting documents in the computer network is generally unsafe due to the open structure of the network. In the depth defense point of view, the document defense is the last line of defense. However, the key management is an essential factor in the document defense. Using the technology and the strategy of secrete sharing can help to disperse and reduce the hazards of key management. In this thesis, the verifiable multi-secret sharing scheme is proposed to realize the threshold strategy of secret reconstruction in hierarchical organizations. In our proposed scheme, participants are classified into several hierarchical disjoint levels. Each participant on the defined level provides a secret sharing via a pre-defined threshold. When the number of the presence participants is less than the predefined threshold at a target level, the participants on the higher levels are requested to support them for reconstructing the shared secret. Thus, the high level participants who have authorities and responsibilities higher than that of the low level participants can help to reconstruct the shared secrets.
author2 Yi-Bin Lu
author_facet Yi-Bin Lu
Ming-Wu Lin
林明武
author Ming-Wu Lin
林明武
spellingShingle Ming-Wu Lin
林明武
Data defense and secrete sharing of the National military
author_sort Ming-Wu Lin
title Data defense and secrete sharing of the National military
title_short Data defense and secrete sharing of the National military
title_full Data defense and secrete sharing of the National military
title_fullStr Data defense and secrete sharing of the National military
title_full_unstemmed Data defense and secrete sharing of the National military
title_sort data defense and secrete sharing of the national military
publishDate 2003
url http://ndltd.ncl.edu.tw/handle/79789264324493569479
work_keys_str_mv AT mingwulin datadefenseandsecretesharingofthenationalmilitary
AT línmíngwǔ datadefenseandsecretesharingofthenationalmilitary
AT mingwulin guójūnzīliàofángyùcèlüèyǔmìmìfēnxiǎngjìshùzhīyánjiū
AT línmíngwǔ guójūnzīliàofángyùcèlüèyǔmìmìfēnxiǎngjìshùzhīyánjiū
_version_ 1718302315958501376