The Research On Conference Key Distribution Schemes of Mobile Communications
碩士 === 樹德科技大學 === 資訊工程學系 === 93 === Holding electronic conferences via mobile devices such as PDAs or mobile phones in an open wireless communication environment makes security problems such as eavesdropping and interception more susceptible. To avoid the vicious attack of illegal users while the co...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2004
|
Online Access: | http://ndltd.ncl.edu.tw/handle/14561567347631785108 |
id |
ndltd-TW-092STU00392010 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-092STU003920102016-06-15T04:17:28Z http://ndltd.ncl.edu.tw/handle/14561567347631785108 The Research On Conference Key Distribution Schemes of Mobile Communications 行動通訊會議金鑰分配協定之研究 Chun-Hung Chen 陳俊宏 碩士 樹德科技大學 資訊工程學系 93 Holding electronic conferences via mobile devices such as PDAs or mobile phones in an open wireless communication environment makes security problems such as eavesdropping and interception more susceptible. To avoid the vicious attack of illegal users while the conference is held, conference participants should share a conference key before the conference begins. For secure communication, those participates in the conference can use a conference key to encrypt or decrypt transmitted data to avoid illegal users’ masquerade. In a wireless communication environment, three elements should be taken into consideration: the computational power of mobile devices, the frequency of interactive communications, and the secure communications. In this thesis, three different types of conference key distribution protocol will be discussed respectively based on the three elements mentioned. The fist type is a conference key distribution protocol without a trusted center. Yan, Chang, and Hwang in 2003 proposed an efficient and anonymous conference key distribution protocol, which is based on elliptic curve discrete logarithm problem and the properties of the line. This protocol distributes a conference key effectively to legal and anonymous conference participants and enables them to hold a secure electronic conference. However, we find that the Yan-Chang-Hwang protocol exists counting errors in its analysis of computational complexity. We will fix their errors and further propose a modified conference key distribution protocol with anonymity and efficiency. The second type is a conference key distribution protocol with a trusted center and using public-key encryption. In 2003 Chee, Siew and Tan proposed a secure and efficient conference scheme for mobile communications based on modular square root technique. This scheme reduces a modular exponential computation, which is required when portable device uses public key cryptography to communicate with the trusted center confidentially. In this thesis, we will propose a new conference key distribution protocol based on pre-computation. In comparison with the Chee-Siew-Tan protocol, our proposed protocol has less computational overheads for portable devices. The third type is a conference key distribution protocol with a trusted center and using private-key encryption. Hwang and Chang in 2003 proposed such a protocol with the property of self-encryption, in which the computational complexity of the mobile device is reduced. In this thesis, we propose a more efficient protocol than the Hwang-Chang protocol. Our proposed protocol reduces the frequency of interactive communications between the participants and the trusted center. In this thesis, we propose three types of conference key distribution protocols. Our proposed protocols distribute conference keys with efficiency and security for mobile communications. Chun-Li Lin 林峻立 2004 學位論文 ; thesis 80 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 樹德科技大學 === 資訊工程學系 === 93 === Holding electronic conferences via mobile devices such as PDAs or mobile phones in an open wireless communication environment makes security problems such as eavesdropping and interception more susceptible. To avoid the vicious attack of illegal users while the conference is held, conference participants should share a conference key before the conference begins. For secure communication, those participates in the conference can use a conference key to encrypt or decrypt transmitted data to avoid illegal users’ masquerade.
In a wireless communication environment, three elements should be taken into consideration: the computational power of mobile devices, the frequency of interactive communications, and the secure communications. In this thesis, three different types of conference key distribution protocol will be discussed respectively based on the three elements mentioned.
The fist type is a conference key distribution protocol without a trusted center. Yan, Chang, and Hwang in 2003 proposed an efficient and anonymous conference key distribution protocol, which is based on elliptic curve discrete logarithm problem and the properties of the line. This protocol distributes a conference key effectively to legal and anonymous conference participants and enables them to hold a secure electronic conference. However, we find that the Yan-Chang-Hwang protocol exists counting errors in its analysis of computational complexity. We will fix their errors and further propose a modified conference key distribution protocol with anonymity and efficiency.
The second type is a conference key distribution protocol with a trusted center and using public-key encryption. In 2003 Chee, Siew and Tan proposed a secure and efficient conference scheme for mobile communications based on modular square root technique. This scheme reduces a modular exponential computation, which is required when portable device uses public key cryptography to communicate with the trusted center confidentially. In this thesis, we will propose a new conference key distribution protocol based on pre-computation. In comparison with the Chee-Siew-Tan protocol, our proposed protocol has less computational overheads for portable devices.
The third type is a conference key distribution protocol with a trusted center and using private-key encryption. Hwang and Chang in 2003 proposed such a protocol with the property of self-encryption, in which the computational complexity of the mobile device is reduced. In this thesis, we propose a more efficient protocol than the Hwang-Chang protocol. Our proposed protocol reduces the frequency of interactive communications between the participants and the trusted center.
In this thesis, we propose three types of conference key distribution protocols. Our proposed protocols distribute conference keys with efficiency and security for mobile communications.
|
author2 |
Chun-Li Lin |
author_facet |
Chun-Li Lin Chun-Hung Chen 陳俊宏 |
author |
Chun-Hung Chen 陳俊宏 |
spellingShingle |
Chun-Hung Chen 陳俊宏 The Research On Conference Key Distribution Schemes of Mobile Communications |
author_sort |
Chun-Hung Chen |
title |
The Research On Conference Key Distribution Schemes of Mobile Communications |
title_short |
The Research On Conference Key Distribution Schemes of Mobile Communications |
title_full |
The Research On Conference Key Distribution Schemes of Mobile Communications |
title_fullStr |
The Research On Conference Key Distribution Schemes of Mobile Communications |
title_full_unstemmed |
The Research On Conference Key Distribution Schemes of Mobile Communications |
title_sort |
research on conference key distribution schemes of mobile communications |
publishDate |
2004 |
url |
http://ndltd.ncl.edu.tw/handle/14561567347631785108 |
work_keys_str_mv |
AT chunhungchen theresearchonconferencekeydistributionschemesofmobilecommunications AT chénjùnhóng theresearchonconferencekeydistributionschemesofmobilecommunications AT chunhungchen xíngdòngtōngxùnhuìyìjīnyàofēnpèixiédìngzhīyánjiū AT chénjùnhóng xíngdòngtōngxùnhuìyìjīnyàofēnpèixiédìngzhīyánjiū AT chunhungchen researchonconferencekeydistributionschemesofmobilecommunications AT chénjùnhóng researchonconferencekeydistributionschemesofmobilecommunications |
_version_ |
1718305739853791232 |