(3.235.108.188) 您好!臺灣時間:2021/03/03 20:48
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:郭仲軒
研究生(外文):Chung-Hsuan Kuo
論文名稱:具容錯性質的分散式會議金鑰系統
論文名稱(外文):A Fault-Tolerant Distributed Conference Key System
指導教授:曾文貴曾文貴引用關係
指導教授(外文):Wen-Guey Tzeng
學位類別:碩士
校院名稱:國立交通大學
系所名稱:資訊科學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:1999
畢業學年度:87
語文別:中文
論文頁數:54
中文關鍵詞:分散式系統會議金鑰容錯安全多參與者計算
外文關鍵詞:Distributed SystemConference KeyFault-TolerantSecure Multi-Party Computation
相關次數:
  • 被引用被引用:0
  • 點閱點閱:117
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
當一群人想要在開放式的網路上召開一個會議時,可能會遭受到竊聽的危險,所以會議的參與者應該要在傳遞會議通訊內容之前,先建立起一個共同的會議金鑰,再用此會議金鑰加密所有的通訊內容。
然而在建立會議金鑰的過程中,可能有部份的參與者惡意地欺騙其他的參與者,使得正確的參與者不能得到共同的會議金鑰值。
在本篇中,提出一個在沒有可信賴中心存在的分散式環境下,由所有參與者共同建立一會議金鑰的協定。且在惡意的參與者少於一半的情況下,所有正確的參與者可以建立起唯一的會議金鑰值。同時以零知識證明的方式證明此協定對於在一旁竊聽的旁觀者而言,將不會洩露出任何的資訊。

When some members want to hold a conference over the open Internet, maybe there are some passive attackers trying to eavesdrop the communication. So those conference participants should establish a common conference key before the conference, and then they could use the conference key to encrypt the communication messages during the conference.
But when those conference participants are executing a conference key agreement protocol, some malicious participants would try to cheat other participants, and let the honest participants fail to get a common conference key.
We proposed a distributed conference key agreement protocol without any trusted authentication center. If the majority of participants are honest, the honest participants will establish a common conference key. Our protocol is zero-knowledge against a passive attacker.

中文摘要
英文摘要
誌謝
目錄
圖表目錄
第一章引言
第一節研究動機
第二節研究重點
第三節各章節簡介
第二章相關研究
第一節 會議金鑰協定概述
第一項 事先散佈式會議金鑰協定
第二項 集中式會議金鑰協定
第三項 分散式會議金鑰協定
第二節 有關容錯性質(FAULT-TOLERANCE)的研究討論
第一項私密分享問題的研究
第二項SECURE MULTI-PARTY COMPUTATION 研究
第三項PROACTIVE的意義與應用
第三節現存的具容錯性質的分散式會議金鑰系統
第一項 第一個協定(不需伺服器的存在)
第二項 第二協定(需要M個伺服器的介入)
第三章 一個分散式且具有容錯特性的會議金鑰協定
第一節問題分析
第二節具容錯性質的會議金鑰協定
第三節正確性討論
第四節安全性討論
第五節計算量討論
第七節和先前分散式可容錯會議金鑰系統的比較
第四章 不同網路環境下的討論
第五章 總結與未來工作
參考文獻

[1] M. Ben-Or, S. Goldwasser, A. Wigderson, " Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation", Proceedings of the 20th ACM Symposium on the Theory of Computing, pp. 1-10, 1988.
[2] S. Berkovits, "How to Broadcast a Secret", Advances in Cryptology: Proceedings of Eurocrypt '91, Lecture Notes in Computer Science 547, Springer-Verlag, pp. 535-541, 1991.
[3] R. Blom, "An Optimal Class of Symmetric Key Generation Systems", Advances in Cryptology: Proceedings of Crypto '84, Lecture Notes in Computer Science 196, Springer-Verlag, pp. 335-338, 1985.
[4] C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung, "Perfectly-Secure Key Distribution for Dynamic Conferences", Advances in Cryptology: Proceedings of Crypto '92, Lecture Notes in Computer Science 740, Springer-Verlag, pp. 471-486, 1993.
[5] M. Burmester, Y. Desmedt, "A Secure and Efficient Conference Key Distribution System", Advances in Cryptology: Proceedings of Eurocrypt '94, Lecture Notes in Computer Science 950, Springer-Verlag, pp. 275-286, 1995.
[6] R.Canetti, A. Herzberg, "Maintaining Security in the Presence of Transient Faults", Advances in Cryptology: Proceedings of Crypto '94, Lecture Notes in Computer Science 839, Springer-Verlag, pp. 425-438, 1994.
[7] C. C. Chang, C. H. Lin, " How to Converse Securely in a Conference", Proceedings of IEEE Security Technology, 30th Annual 1996 International Carnahan Conference, pp. 42-45, 1996.
[8] C. C. Chang, T. C. Wu, C. P. Chen,"The Design of a Conference Key Distribution System", Advances in Cryptology: Proceeding of Auscrypt '92, Lecture Notes in Computer Science 718, Springer-Verlag, pp. 459-466, 1992.
[9] G. H. Chiou, W. T. Chen, "Secure Broadcasting Using the Secure Lock", IEEE Transactions on Software Engineering, Vol. 15, No. 8, pp. 929-934,1989.
[10] W. Diffie, M. Hellman, "New Directions in Cryptography", IEEE Transaction of Information Theory, Vol. IT-22, pp. 644-654, 1976.
[11] M. Fitzi, M. Hirt, U. Maurer, "Trading Correctness for Privacy in Unconditional Multi-Party Compution", Advances in Cryptology: Proceedings of Crypto '98, Lecture Notes in Computer Science 1462, Springer-Verlag, pp. 121-136, 1998.
[12] Y. Frankel, P. Gemmell, P. D. MacKenzie, M. Yung, "Proactive RSA", Advances in Cryptology: Proceedings of Crypto '97, Lecture Notes in Computer Science 1294, Springer-Verlag, pp. 440-455, 1997.
[13] A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M.Yung, "Proactive Public Key and Signature Systems", Proceedings of the 4th ACM Symposium On Computer and Communication Security, pp. 0-18, 1997.
[14] A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, "How to Cope with Perpetual Leakage, or "Proactive Security Sharing", Advances in Cryptology: Proceedings of Crypto'95, Lecture Notes in Computer Science 963, Springer-Verlag, pp. 339-352, 1995.
[15] T. Hwang, J. L. Chen, "Identity-Based Conference Key Broadcast Systems", IEE Computers and Digital Techniques, Vol. 141, No. 1, pp. 57-60, 1994.
[16] I. Ingemarsson, D. T. Tang, C. K. Wong, "A Conference Key Distribution System", IEEE transactions on Information Theory, Vol. IT-28, No. 5, pp. 714-720, 1982.
[17] K. Koyama, "Secure Conference Key Distribution Schemes for Conspiracy Attack", Advances in Cryptology: Proceedings of Eurocrypt '92, Lecture Notes in Computer Science 658, Springer-Verlag, pp. 449-453, 1993.
[18] K. Koyama, K. Ohta, "Identity-Based Conference Key Distribution Systems", Advances in Cryptology: Proceedings of Crypto '87, Lecture Notes in Computer Science 293, Springer-Verlag, pp. 175-184, 1988.
[19] K. Koyama, K. Ohta, "Security of Improved Identity-Based Conference Key Distributioin Systems", Advances in Cryptology: Proceeding of Eurocrypt '88, Lecture Notes in Computer Science 330, Springer-Verlag, pp. 11-19, 1988.
[20] B. Klein, M. Otten, T. Beth, "Conference Key Distribution Protocols in Distributed Systems", Proceedings of Codes and Ciphers-Cryptography and Coding IV, IMA, pp. 225-242, 1995.
[21] C. H. Lin, C. C. Chang, R. C. T. Lee, "A Conference Key Broadcasting System Using Sealed Locks", Information Systems, Vol. 17, No. 4, pp. 323-328, 1992.
[22] T. Matsumoto, H. Imai, "On the Key Predistribution System: A Practical Solution to the Key Distribution Problem", Advances in Cryptology: Proceedings of Crypto '87, Lecture Notes in Computer Science 293, Springer-Verlag, pp.185-193, 1988.
[23] R. Ostrovsky, M. Yung, "How to Withstand Mobile Virus Attacks", Proceedings of ACM Symposium on Principles of Distributed Computing (PODC), pp.51-61, 1991.
[24] T. Rabin, M. Ben-Or, "Verifiable Secret Sharing and Multiparty Protocols with Honest Majority", Proceedings of 26th ACM Symposium on the Theory of Computing (STOC), pp73-85, 1989.
[25] A.Shamir, "How to share a secret", Communications of the ACM, Vol. 22, pp. 612-613, 1979.
[26] A. Shimbo, S. I. Kawamura, "Cryptanalysis of Several Conference Key Distribution Schemes", Advances in Cryptology: Proceedings of Asiacrypt '91, Lecture Notes in Computer Science 739, Springer-Verlag, pp. 265-276, 1993.
[27] D. G. Steer, L. Strawczynski, W. Diffie, M. Wiener, "A Secure Audio Teleconference System", Advances in Cryptology: Proceedings of Crypto '88, Lecture Notes in Computer Science 409, Springer-Verlag, pp. 520-528, 1990.
[28] T. C. Wu, "Conference Key Distribution System with User Anonymity Based on Algebraic Approach", Proceedings of IEE Computers and Digital Techniques, Vol. 144, No 2, pp. 145-148, 1997.
[29] Y. Yacobi, "Attack on the Koyama-Ohta Identity Based Key Distribution Scheme", Advances in Cryptology: Proceedings of Crypto '87, Lecture Notes in Computer Science 293, Springer-Verlag, pp429-433, 1988.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊
 
系統版面圖檔 系統版面圖檔