Study on RSA encryption method and Elliptic Curve based on Private information retrieval scheme

碩士 === 南台科技大學 === 資訊工程系 === 99 === Following rapid development of network technology, people desire to acquire more useful and important knowledge from Internet gradually. In general, user will reveal his request message for innate character while processing his query. Thus, it will let the administ...

Full description

Bibliographic Details
Main Authors: Chien-Wen Huang, 黃建文
Other Authors: Jiin-Chiou Cheng
Format: Others
Language:zh-TW
Online Access:http://ndltd.ncl.edu.tw/handle/26971133822877670215
Description
Summary:碩士 === 南台科技大學 === 資訊工程系 === 99 === Following rapid development of network technology, people desire to acquire more useful and important knowledge from Internet gradually. In general, user will reveal his request message for innate character while processing his query. Thus, it will let the administrator of database be aware of user’s intention. For overcoming the flaw, we introduce the concept of PIR – Private Information Retrieval to improve the private leakage issue. Past PIR mechanism may prevent the user’s request from being known by server, but it cannot resist the reveal of request message due to malicious attack, for example, Man-in-the-middle attack. For that, the paper adopts RSA and ECC to propose four schemes respectively. Our schemes are satisfied with PIR’s requirements – validity and privacy. In addition, for resisting forgery attack, we suggest a new verification for PIR, in which ECC pairing is adopted to reduce the computation cost for verification. Besides, we also analyze the adaption and security of the four schemes for various environments.