The Research On Conference Key Distribution Schemes of Mobile Communications

碩士 === 樹德科技大學 === 資訊工程學系 === 93 === Holding electronic conferences via mobile devices such as PDAs or mobile phones in an open wireless communication environment makes security problems such as eavesdropping and interception more susceptible. To avoid the vicious attack of illegal users while the co...

Full description

Bibliographic Details
Main Authors: Chun-Hung Chen, 陳俊宏
Other Authors: Chun-Li Lin
Format: Others
Language:zh-TW
Published: 2004
Online Access:http://ndltd.ncl.edu.tw/handle/14561567347631785108
id ndltd-TW-092STU00392010
record_format oai_dc
spelling ndltd-TW-092STU003920102016-06-15T04:17:28Z http://ndltd.ncl.edu.tw/handle/14561567347631785108 The Research On Conference Key Distribution Schemes of Mobile Communications 行動通訊會議金鑰分配協定之研究 Chun-Hung Chen 陳俊宏 碩士 樹德科技大學 資訊工程學系 93 Holding electronic conferences via mobile devices such as PDAs or mobile phones in an open wireless communication environment makes security problems such as eavesdropping and interception more susceptible. To avoid the vicious attack of illegal users while the conference is held, conference participants should share a conference key before the conference begins. For secure communication, those participates in the conference can use a conference key to encrypt or decrypt transmitted data to avoid illegal users’ masquerade. In a wireless communication environment, three elements should be taken into consideration: the computational power of mobile devices, the frequency of interactive communications, and the secure communications. In this thesis, three different types of conference key distribution protocol will be discussed respectively based on the three elements mentioned. The fist type is a conference key distribution protocol without a trusted center. Yan, Chang, and Hwang in 2003 proposed an efficient and anonymous conference key distribution protocol, which is based on elliptic curve discrete logarithm problem and the properties of the line. This protocol distributes a conference key effectively to legal and anonymous conference participants and enables them to hold a secure electronic conference. However, we find that the Yan-Chang-Hwang protocol exists counting errors in its analysis of computational complexity. We will fix their errors and further propose a modified conference key distribution protocol with anonymity and efficiency. The second type is a conference key distribution protocol with a trusted center and using public-key encryption. In 2003 Chee, Siew and Tan proposed a secure and efficient conference scheme for mobile communications based on modular square root technique. This scheme reduces a modular exponential computation, which is required when portable device uses public key cryptography to communicate with the trusted center confidentially. In this thesis, we will propose a new conference key distribution protocol based on pre-computation. In comparison with the Chee-Siew-Tan protocol, our proposed protocol has less computational overheads for portable devices. The third type is a conference key distribution protocol with a trusted center and using private-key encryption. Hwang and Chang in 2003 proposed such a protocol with the property of self-encryption, in which the computational complexity of the mobile device is reduced. In this thesis, we propose a more efficient protocol than the Hwang-Chang protocol. Our proposed protocol reduces the frequency of interactive communications between the participants and the trusted center. In this thesis, we propose three types of conference key distribution protocols. Our proposed protocols distribute conference keys with efficiency and security for mobile communications. Chun-Li Lin 林峻立 2004 學位論文 ; thesis 80 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 樹德科技大學 === 資訊工程學系 === 93 === Holding electronic conferences via mobile devices such as PDAs or mobile phones in an open wireless communication environment makes security problems such as eavesdropping and interception more susceptible. To avoid the vicious attack of illegal users while the conference is held, conference participants should share a conference key before the conference begins. For secure communication, those participates in the conference can use a conference key to encrypt or decrypt transmitted data to avoid illegal users’ masquerade. In a wireless communication environment, three elements should be taken into consideration: the computational power of mobile devices, the frequency of interactive communications, and the secure communications. In this thesis, three different types of conference key distribution protocol will be discussed respectively based on the three elements mentioned. The fist type is a conference key distribution protocol without a trusted center. Yan, Chang, and Hwang in 2003 proposed an efficient and anonymous conference key distribution protocol, which is based on elliptic curve discrete logarithm problem and the properties of the line. This protocol distributes a conference key effectively to legal and anonymous conference participants and enables them to hold a secure electronic conference. However, we find that the Yan-Chang-Hwang protocol exists counting errors in its analysis of computational complexity. We will fix their errors and further propose a modified conference key distribution protocol with anonymity and efficiency. The second type is a conference key distribution protocol with a trusted center and using public-key encryption. In 2003 Chee, Siew and Tan proposed a secure and efficient conference scheme for mobile communications based on modular square root technique. This scheme reduces a modular exponential computation, which is required when portable device uses public key cryptography to communicate with the trusted center confidentially. In this thesis, we will propose a new conference key distribution protocol based on pre-computation. In comparison with the Chee-Siew-Tan protocol, our proposed protocol has less computational overheads for portable devices. The third type is a conference key distribution protocol with a trusted center and using private-key encryption. Hwang and Chang in 2003 proposed such a protocol with the property of self-encryption, in which the computational complexity of the mobile device is reduced. In this thesis, we propose a more efficient protocol than the Hwang-Chang protocol. Our proposed protocol reduces the frequency of interactive communications between the participants and the trusted center. In this thesis, we propose three types of conference key distribution protocols. Our proposed protocols distribute conference keys with efficiency and security for mobile communications.
author2 Chun-Li Lin
author_facet Chun-Li Lin
Chun-Hung Chen
陳俊宏
author Chun-Hung Chen
陳俊宏
spellingShingle Chun-Hung Chen
陳俊宏
The Research On Conference Key Distribution Schemes of Mobile Communications
author_sort Chun-Hung Chen
title The Research On Conference Key Distribution Schemes of Mobile Communications
title_short The Research On Conference Key Distribution Schemes of Mobile Communications
title_full The Research On Conference Key Distribution Schemes of Mobile Communications
title_fullStr The Research On Conference Key Distribution Schemes of Mobile Communications
title_full_unstemmed The Research On Conference Key Distribution Schemes of Mobile Communications
title_sort research on conference key distribution schemes of mobile communications
publishDate 2004
url http://ndltd.ncl.edu.tw/handle/14561567347631785108
work_keys_str_mv AT chunhungchen theresearchonconferencekeydistributionschemesofmobilecommunications
AT chénjùnhóng theresearchonconferencekeydistributionschemesofmobilecommunications
AT chunhungchen xíngdòngtōngxùnhuìyìjīnyàofēnpèixiédìngzhīyánjiū
AT chénjùnhóng xíngdòngtōngxùnhuìyìjīnyàofēnpèixiédìngzhīyánjiū
AT chunhungchen researchonconferencekeydistributionschemesofmobilecommunications
AT chénjùnhóng researchonconferencekeydistributionschemesofmobilecommunications
_version_ 1718305739853791232