Summary: | 碩士 === 長庚大學 === 資訊管理學系 === 100 === The characters of the digital evidence are easily modified, duplicated, be hard to directly perceive, be hard to feel the authenticity of digital evidence and be difficult to collect and preserve, so the digital evidence easily lost their integrity. Recently, the operating procedures and other legal norms are proposed by domestic scholars or foreign scholars to protect the integrity of the digital evidence, but still unable to put forward real and strong proof effectively when be challenged.
According to analysis the process of the preservation of the digital evidence, four problems need to be investigated:(1) the privacy of the judicial investigators, (2) key exposure, (3) the registry may be invaded or internal attack and (4) how to enhance the potency of the digital evidences in the court. According to the process of digital forensic and problems, we propose five methods:(1) an identity-based key-insulated encryption scheme without trusty privacy key generator(PKG), (2) an identity-based key-insulated signature scheme without trusty PKG, (3) an identity-based key-insulated multi-signature scheme without trusty PKG, (4) an identity-based key-insulated group signature scheme without trusty PKG and (5) an identity-based key-insulated groupmuti-signature scheme without trust PKG.
According to the study of digital evidence protection methods preserving user privacy can provide perfection safety of digital evidences and put forward real and strong proof effectively when be challenged.
|