Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings
碩士 === 長庚大學 === 資訊管理研究所 === 98 === With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user’s privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of th...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/75214608248583788202 |
id |
ndltd-TW-096CGU00396002 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096CGU003960022016-12-13T04:14:01Z http://ndltd.ncl.edu.tw/handle/75214608248583788202 Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings 植基於Pairings之具使用者鑑別與隱私保護的身分基底金鑰協議與階層式會議金鑰分配協定 Chu Chih-Wei 朱志偉 碩士 長庚大學 資訊管理研究所 98 With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user’s privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of the other, and then build a shared key to accomplish the service request. Furthermore, when a conference is held, the chairman must verify the identities of all participants; afterwards, the chairman chooses a conference key and distributes it to legitimate participants. Besides, the participants should know who is in the conference. These prevent the malicious adversary from eavesdropping or impersonating to get some benefits. From the above point of view, and consideration of the security and performance in the system, we adopt the identity-based cryptosystem and the elliptic curve cryptosystem to design our protocols. Since the protocols have shorter key size, lower costs of management the keys, and lower costs of transformation, they are suitable for applying in various platforms, such as the smart card, mobile phone, and other lower storage devices. In this thesis, there are three distinct types of protocol: privacy-preserved identification protocol with key agreement, privacy-preserved conference key distribution protocol, and hierarchical conference key distribution protocols preserving user privacy to satisfy different communication environments. 許建隆 2009 學位論文 ; thesis 141 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 長庚大學 === 資訊管理研究所 === 98 === With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user’s privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of the other, and then build a shared key to accomplish the service request. Furthermore, when a conference is held, the chairman must verify the identities of all participants; afterwards, the chairman chooses a conference key and distributes it to legitimate participants. Besides, the participants should know who is in the conference. These prevent the malicious adversary from eavesdropping or impersonating to get some benefits.
From the above point of view, and consideration of the security and performance in the system, we adopt the identity-based cryptosystem and the elliptic curve cryptosystem to design our protocols. Since the protocols have shorter key size, lower costs of management the keys, and lower costs of transformation, they are suitable for applying in various platforms, such as the smart card, mobile phone, and other lower storage devices.
In this thesis, there are three distinct types of protocol: privacy-preserved identification protocol with key agreement, privacy-preserved conference key distribution protocol, and hierarchical conference key distribution protocols preserving user privacy to satisfy different communication environments.
|
author2 |
許建隆 |
author_facet |
許建隆 Chu Chih-Wei 朱志偉 |
author |
Chu Chih-Wei 朱志偉 |
spellingShingle |
Chu Chih-Wei 朱志偉 Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings |
author_sort |
Chu Chih-Wei |
title |
Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings |
title_short |
Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings |
title_full |
Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings |
title_fullStr |
Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings |
title_full_unstemmed |
Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings |
title_sort |
privacy-preserved key agreement and hierarchical conference key distribution protocols with user authentication from pairings |
publishDate |
2009 |
url |
http://ndltd.ncl.edu.tw/handle/75214608248583788202 |
work_keys_str_mv |
AT chuchihwei privacypreservedkeyagreementandhierarchicalconferencekeydistributionprotocolswithuserauthenticationfrompairings AT zhūzhìwěi privacypreservedkeyagreementandhierarchicalconferencekeydistributionprotocolswithuserauthenticationfrompairings AT chuchihwei zhíjīyúpairingszhījùshǐyòngzhějiànbiéyǔyǐnsībǎohùdeshēnfēnjīdǐjīnyàoxiéyìyǔjiēcéngshìhuìyìjīnyàofēnpèixiédìng AT zhūzhìwěi zhíjīyúpairingszhījùshǐyòngzhějiànbiéyǔyǐnsībǎohùdeshēnfēnjīdǐjīnyàoxiéyìyǔjiēcéngshìhuìyìjīnyàofēnpèixiédìng |
_version_ |
1718400402279366656 |