Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings

碩士 === 長庚大學 === 資訊管理研究所 === 98 === With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user’s privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of th...

Full description

Bibliographic Details
Main Authors: Chu Chih-Wei, 朱志偉
Other Authors: 許建隆
Format: Others
Language:en_US
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/75214608248583788202
id ndltd-TW-096CGU00396002
record_format oai_dc
spelling ndltd-TW-096CGU003960022016-12-13T04:14:01Z http://ndltd.ncl.edu.tw/handle/75214608248583788202 Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings 植基於Pairings之具使用者鑑別與隱私保護的身分基底金鑰協議與階層式會議金鑰分配協定 Chu Chih-Wei 朱志偉 碩士 長庚大學 資訊管理研究所 98 With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user’s privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of the other, and then build a shared key to accomplish the service request. Furthermore, when a conference is held, the chairman must verify the identities of all participants; afterwards, the chairman chooses a conference key and distributes it to legitimate participants. Besides, the participants should know who is in the conference. These prevent the malicious adversary from eavesdropping or impersonating to get some benefits. From the above point of view, and consideration of the security and performance in the system, we adopt the identity-based cryptosystem and the elliptic curve cryptosystem to design our protocols. Since the protocols have shorter key size, lower costs of management the keys, and lower costs of transformation, they are suitable for applying in various platforms, such as the smart card, mobile phone, and other lower storage devices. In this thesis, there are three distinct types of protocol: privacy-preserved identification protocol with key agreement, privacy-preserved conference key distribution protocol, and hierarchical conference key distribution protocols preserving user privacy to satisfy different communication environments. 許建隆 2009 學位論文 ; thesis 141 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 長庚大學 === 資訊管理研究所 === 98 === With the progress of information technology, the computer crimes are emerging in an endless stream. It is because of the user’s privacy should be protected, when the user submit a service request to the service provider, both of them should check the identity of the other, and then build a shared key to accomplish the service request. Furthermore, when a conference is held, the chairman must verify the identities of all participants; afterwards, the chairman chooses a conference key and distributes it to legitimate participants. Besides, the participants should know who is in the conference. These prevent the malicious adversary from eavesdropping or impersonating to get some benefits. From the above point of view, and consideration of the security and performance in the system, we adopt the identity-based cryptosystem and the elliptic curve cryptosystem to design our protocols. Since the protocols have shorter key size, lower costs of management the keys, and lower costs of transformation, they are suitable for applying in various platforms, such as the smart card, mobile phone, and other lower storage devices. In this thesis, there are three distinct types of protocol: privacy-preserved identification protocol with key agreement, privacy-preserved conference key distribution protocol, and hierarchical conference key distribution protocols preserving user privacy to satisfy different communication environments.
author2 許建隆
author_facet 許建隆
Chu Chih-Wei
朱志偉
author Chu Chih-Wei
朱志偉
spellingShingle Chu Chih-Wei
朱志偉
Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings
author_sort Chu Chih-Wei
title Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings
title_short Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings
title_full Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings
title_fullStr Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings
title_full_unstemmed Privacy-Preserved Key Agreement and Hierarchical Conference Key Distribution Protocols with User Authentication from Pairings
title_sort privacy-preserved key agreement and hierarchical conference key distribution protocols with user authentication from pairings
publishDate 2009
url http://ndltd.ncl.edu.tw/handle/75214608248583788202
work_keys_str_mv AT chuchihwei privacypreservedkeyagreementandhierarchicalconferencekeydistributionprotocolswithuserauthenticationfrompairings
AT zhūzhìwěi privacypreservedkeyagreementandhierarchicalconferencekeydistributionprotocolswithuserauthenticationfrompairings
AT chuchihwei zhíjīyúpairingszhījùshǐyòngzhějiànbiéyǔyǐnsībǎohùdeshēnfēnjīdǐjīnyàoxiéyìyǔjiēcéngshìhuìyìjīnyàofēnpèixiédìng
AT zhūzhìwěi zhíjīyúpairingszhījùshǐyòngzhějiànbiéyǔyǐnsībǎohùdeshēnfēnjīdǐjīnyàoxiéyìyǔjiēcéngshìhuìyìjīnyàofēnpèixiédìng
_version_ 1718400402279366656