Cryptographic systems based on symmetric balanced incomplete block design
碩士 === 南台科技大學 === 資訊管理系 === 93 === Since internet is an open environment, everyone can access or communicate by network in everywhere. So, when internet becomes popular, everyone will concern about the questions of information security. This thesis will study and analyze two group-oriented cryptogra...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/65980221299237013311 |
id |
ndltd-TW-093STUT0396003 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-093STUT03960032016-11-22T04:12:13Z http://ndltd.ncl.edu.tw/handle/65980221299237013311 Cryptographic systems based on symmetric balanced incomplete block design 植基於對稱式平衡不完全區塊設計之密碼系統 Jung Chic Chen 陳榮志 碩士 南台科技大學 資訊管理系 93 Since internet is an open environment, everyone can access or communicate by network in everywhere. So, when internet becomes popular, everyone will concern about the questions of information security. This thesis will study and analyze two group-oriented cryptographic systems: conference key distribution system and multi-proxy signature scheme, respectively. In 2002, Chung, Choi, Kim and Lee proposed an efficient conference key distribution system, which is generated by employing symmetric balanced incomplete block design. In Chung et al. protocol, the symmetric balanced incomplete block design can reduce the message overhead to in the case of , but it requires two rounds of message exchange. In 2004, Lee and Hwang further proposed an improved conference key distribution system. They also showed that Chung et al. protocol suffered several security problems, and proposed an improved protocol. Unfortunately, both Chung et al. protocol and Lee-Hwang protocol are insecure. This thesis will show that both Chung et al. protocol and Lee-Hwang protocol are vulnerable to the malicious participant conspiracy attack, and then propose an improved protocol. For multi-proxy signature scheme, Lin-Wu-Hwang proposed a multi-proxy signature scheme for partial delegation with cheater identification in 2002. This thesis finds that Lin-Wu-Hwang scheme requires message overhead (where is the number of proxy signer) and one round of message exchange. Thus, this thesis will propose a multi-proxy signature scheme employing symmetric balanced incomplete block design, and reduces the message overhead to in the case of . During the multi-proxy signature generation phase, it only requires two rounds of message exchange. The performance is very important for group-orientated cryptographic systems. Thus, this thesis reduces the message overhead employing symmetric balanced incomplete block design. Two improved protocol are more efficient than Chung et al. protocol and Lin-Wu-Hwang improved protocol. Narn Yih Lee 李南逸 2005 學位論文 ; thesis 51 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 南台科技大學 === 資訊管理系 === 93 === Since internet is an open environment, everyone can access or communicate by network in everywhere. So, when internet becomes popular, everyone will concern about the questions of information security. This thesis will study and analyze two group-oriented cryptographic systems: conference key distribution system and multi-proxy signature scheme, respectively.
In 2002, Chung, Choi, Kim and Lee proposed an efficient conference key distribution system, which is generated by employing symmetric balanced incomplete block design. In Chung et al. protocol, the symmetric balanced incomplete block design can reduce the message overhead to in the case of , but it requires two rounds of message exchange. In 2004, Lee and Hwang further proposed an improved conference key distribution system. They also showed that Chung et al. protocol suffered several security problems, and proposed an improved protocol. Unfortunately, both Chung et al. protocol and Lee-Hwang protocol are insecure. This thesis will show that both Chung et al. protocol and Lee-Hwang protocol are vulnerable to the malicious participant conspiracy attack, and then propose an improved protocol.
For multi-proxy signature scheme, Lin-Wu-Hwang proposed a multi-proxy signature scheme for partial delegation with cheater identification in 2002. This thesis finds that Lin-Wu-Hwang scheme requires message overhead (where is the number of proxy signer) and one round of message exchange. Thus, this thesis will propose a multi-proxy signature scheme employing symmetric balanced incomplete block design, and reduces the message overhead to in the case of . During the multi-proxy signature generation phase, it only requires two rounds of message exchange.
The performance is very important for group-orientated cryptographic systems. Thus, this thesis reduces the message overhead employing symmetric balanced incomplete block design. Two improved protocol are more efficient than Chung et al. protocol and Lin-Wu-Hwang improved protocol.
|
author2 |
Narn Yih Lee |
author_facet |
Narn Yih Lee Jung Chic Chen 陳榮志 |
author |
Jung Chic Chen 陳榮志 |
spellingShingle |
Jung Chic Chen 陳榮志 Cryptographic systems based on symmetric balanced incomplete block design |
author_sort |
Jung Chic Chen |
title |
Cryptographic systems based on symmetric balanced incomplete block design |
title_short |
Cryptographic systems based on symmetric balanced incomplete block design |
title_full |
Cryptographic systems based on symmetric balanced incomplete block design |
title_fullStr |
Cryptographic systems based on symmetric balanced incomplete block design |
title_full_unstemmed |
Cryptographic systems based on symmetric balanced incomplete block design |
title_sort |
cryptographic systems based on symmetric balanced incomplete block design |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/65980221299237013311 |
work_keys_str_mv |
AT jungchicchen cryptographicsystemsbasedonsymmetricbalancedincompleteblockdesign AT chénróngzhì cryptographicsystemsbasedonsymmetricbalancedincompleteblockdesign AT jungchicchen zhíjīyúduìchēngshìpínghéngbùwánquánqūkuàishèjìzhīmìmǎxìtǒng AT chénróngzhì zhíjīyúduìchēngshìpínghéngbùwánquánqūkuàishèjìzhīmìmǎxìtǒng |
_version_ |
1718396240183427072 |