Cryptographic systems based on symmetric balanced incomplete block design

碩士 === 南台科技大學 === 資訊管理系 === 93 === Since internet is an open environment, everyone can access or communicate by network in everywhere. So, when internet becomes popular, everyone will concern about the questions of information security. This thesis will study and analyze two group-oriented cryptogra...

Full description

Bibliographic Details
Main Authors: Jung Chic Chen, 陳榮志
Other Authors: Narn Yih Lee
Format: Others
Language:zh-TW
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/65980221299237013311
id ndltd-TW-093STUT0396003
record_format oai_dc
spelling ndltd-TW-093STUT03960032016-11-22T04:12:13Z http://ndltd.ncl.edu.tw/handle/65980221299237013311 Cryptographic systems based on symmetric balanced incomplete block design 植基於對稱式平衡不完全區塊設計之密碼系統 Jung Chic Chen 陳榮志 碩士 南台科技大學 資訊管理系 93 Since internet is an open environment, everyone can access or communicate by network in everywhere. So, when internet becomes popular, everyone will concern about the questions of information security. This thesis will study and analyze two group-oriented cryptographic systems: conference key distribution system and multi-proxy signature scheme, respectively. In 2002, Chung, Choi, Kim and Lee proposed an efficient conference key distribution system, which is generated by employing symmetric balanced incomplete block design. In Chung et al. protocol, the symmetric balanced incomplete block design can reduce the message overhead to in the case of , but it requires two rounds of message exchange. In 2004, Lee and Hwang further proposed an improved conference key distribution system. They also showed that Chung et al. protocol suffered several security problems, and proposed an improved protocol. Unfortunately, both Chung et al. protocol and Lee-Hwang protocol are insecure. This thesis will show that both Chung et al. protocol and Lee-Hwang protocol are vulnerable to the malicious participant conspiracy attack, and then propose an improved protocol. For multi-proxy signature scheme, Lin-Wu-Hwang proposed a multi-proxy signature scheme for partial delegation with cheater identification in 2002. This thesis finds that Lin-Wu-Hwang scheme requires message overhead (where is the number of proxy signer) and one round of message exchange. Thus, this thesis will propose a multi-proxy signature scheme employing symmetric balanced incomplete block design, and reduces the message overhead to in the case of . During the multi-proxy signature generation phase, it only requires two rounds of message exchange. The performance is very important for group-orientated cryptographic systems. Thus, this thesis reduces the message overhead employing symmetric balanced incomplete block design. Two improved protocol are more efficient than Chung et al. protocol and Lin-Wu-Hwang improved protocol. Narn Yih Lee 李南逸 2005 學位論文 ; thesis 51 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 南台科技大學 === 資訊管理系 === 93 === Since internet is an open environment, everyone can access or communicate by network in everywhere. So, when internet becomes popular, everyone will concern about the questions of information security. This thesis will study and analyze two group-oriented cryptographic systems: conference key distribution system and multi-proxy signature scheme, respectively. In 2002, Chung, Choi, Kim and Lee proposed an efficient conference key distribution system, which is generated by employing symmetric balanced incomplete block design. In Chung et al. protocol, the symmetric balanced incomplete block design can reduce the message overhead to in the case of , but it requires two rounds of message exchange. In 2004, Lee and Hwang further proposed an improved conference key distribution system. They also showed that Chung et al. protocol suffered several security problems, and proposed an improved protocol. Unfortunately, both Chung et al. protocol and Lee-Hwang protocol are insecure. This thesis will show that both Chung et al. protocol and Lee-Hwang protocol are vulnerable to the malicious participant conspiracy attack, and then propose an improved protocol. For multi-proxy signature scheme, Lin-Wu-Hwang proposed a multi-proxy signature scheme for partial delegation with cheater identification in 2002. This thesis finds that Lin-Wu-Hwang scheme requires message overhead (where is the number of proxy signer) and one round of message exchange. Thus, this thesis will propose a multi-proxy signature scheme employing symmetric balanced incomplete block design, and reduces the message overhead to in the case of . During the multi-proxy signature generation phase, it only requires two rounds of message exchange. The performance is very important for group-orientated cryptographic systems. Thus, this thesis reduces the message overhead employing symmetric balanced incomplete block design. Two improved protocol are more efficient than Chung et al. protocol and Lin-Wu-Hwang improved protocol.
author2 Narn Yih Lee
author_facet Narn Yih Lee
Jung Chic Chen
陳榮志
author Jung Chic Chen
陳榮志
spellingShingle Jung Chic Chen
陳榮志
Cryptographic systems based on symmetric balanced incomplete block design
author_sort Jung Chic Chen
title Cryptographic systems based on symmetric balanced incomplete block design
title_short Cryptographic systems based on symmetric balanced incomplete block design
title_full Cryptographic systems based on symmetric balanced incomplete block design
title_fullStr Cryptographic systems based on symmetric balanced incomplete block design
title_full_unstemmed Cryptographic systems based on symmetric balanced incomplete block design
title_sort cryptographic systems based on symmetric balanced incomplete block design
publishDate 2005
url http://ndltd.ncl.edu.tw/handle/65980221299237013311
work_keys_str_mv AT jungchicchen cryptographicsystemsbasedonsymmetricbalancedincompleteblockdesign
AT chénróngzhì cryptographicsystemsbasedonsymmetricbalancedincompleteblockdesign
AT jungchicchen zhíjīyúduìchēngshìpínghéngbùwánquánqūkuàishèjìzhīmìmǎxìtǒng
AT chénróngzhì zhíjīyúduìchēngshìpínghéngbùwánquánqūkuàishèjìzhīmìmǎxìtǒng
_version_ 1718396240183427072