跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.86) 您好!臺灣時間:2025/02/15 08:20
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:胡國新
研究生(外文):Kuo-Hsin Hu
論文名稱:設計植基於自我驗證公開金鑰系統之安全線上電子拍賣機制
論文名稱(外文):Designing Secure On-Line Auction Schemes Using Self-Certified Public Key Cryptosystems
指導教授:曹偉駿曹偉駿引用關係
指導教授(外文):Woei-Jiunn Tsaur
學位類別:碩士
校院名稱:大葉大學
系所名稱:資訊管理學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2000
畢業學年度:88
語文別:中文
中文關鍵詞:電子商務資訊安全自我驗證公開金鑰系統拍賣橢圓曲線密碼系統
外文關鍵詞:Electronic commerceInformation securitySelf-certified public key systemAuctionElliptic curve cryptosystems
相關次數:
  • 被引用被引用:36
  • 點閱點閱:494
  • 評分評分:
  • 下載下載:65
  • 收藏至我的研究室書目清單書目收藏:2
現在大部分看到的拍賣網站都是屬於離線式 (Off-Line)的拍賣。但我們在一般日常生活中所見到的拍賣活動是屬於英式拍賣,亦即所有競標者於同一時間,聚集在同一地點進行競標,由出席的競標者以喊價的方式來決定得標者及得價之價格與數量。這和現行的網站拍賣機制多不相同,所以本論文以英式拍賣為主軸,建立出可以適用於這類拍賣的安全機制。現行多數拍賣網站中,如拍賣王、eBay等,其交易安全是以SSL(Secure Socket Layer)安全機制為基礎,且其電子憑證是由公正的第三單位所簽發,也就是說僅達到Girault [18]所提出的level 2安全等級 (即公正第三單位有機會偽造出一不存在的使用者)。
本論文採用自我驗證的方式來達成即使是認證中心也無法假扮使用者,再加上參與競標者對拍賣會議主持人使用假名,使主持人也無法得知何人參與拍賣。因本論文所要探討的是即時的線上拍賣問題,所以除了安全性是否周延的顧慮之外,還必須兼顧安全機制運算上的效率。而橢圓曲線公開金鑰密碼系統較現存的其它公開金鑰密碼系統運算更快速,且以較少的位元數可達到相同的安全度。因此,本論文發展出一套以橢圓曲線密碼系統為基礎的自我驗證公開金鑰系統,並據以建構出各種安全機制,應用在線上拍賣上,藉以提高線上拍賣的安全機制之效率,使即時性的安全線上拍賣成為可行的方案。
The style of most auction web sites is an off-line auction. However, most of auction activities in our real life belong to English auction. That is, all of the bidder bid at the same place and time, and the winner’s article price and quantity depend on bidders’ bidding. Therefore, this thesis will construct secure auction schemes suitable for English auction. At present, the certificate-based public key cryptosystem is employed by most auction web sites. Its security is based on the SSL (Secure Socket Layer) scheme and digital certificate scheme which is signed by a trusted third party, and reach only security level 2 proposed by Girault [18].
The thesis uses a self-certified public key cryptosystem so that the system authority cannot impersonate any legal bidder. Moreover, the auction chairman cannot know who joins the auction since bidders join it with pseudonym for anonymity. For the considerations of efficiency, the schemes are developed by using elliptic curve cryptosystems instead of modular exponentiation, because it possesses faster computation and fewer bits achieving the same security degree as other public key cryptosystems. In this thesis, we design security schemes in an on-line auction environment using the self-certified public key cryptosystem based on elliptic curve cryptosystems. The schemes make the on-line auction securely workable.
授權書          iii
中文摘要 v
英文摘要 vi
誌謝 vii
目錄 viii
表目錄 x
第一章 緒論
第一節 研究動機 1
第二節 研究背景及目的 2
第三節 論文架構 4
第二章 文獻探討
第一節 拍賣的種類 6
第二節 數學理論及密碼背景 9
第三節 公開金鑰密碼系統 13
第三章 具自我驗證之線上拍賣安全機制
第一節 線上拍賣的安全需求 24
第二節 植基於橢圓曲線密碼系統之具自我驗證公開金鑰系統 26
第三節 線上拍賣的安全機制 31
第四章 安全及計算複雜度分析
第一節 植基於橢圓曲線密碼系統之具自我驗證公開金鑰系統及其相關安全機制的安全度分析 33
第二節 拍賣會議的安全分析 35
第三節 安全線上拍賣之時間複雜度分析 37
第五章 結論 41
參考文獻 43
附錄一 橢圓曲線方程式 49
[1]李重君,論證券拍賣制度,東海大學企業管理研究所碩士論文,民國85年。
[2]梁高榮,農產品的電子拍賣,新世紀電子商務技術與實務學術研討會論文集,玄奘人文社會學院資訊處/資訊管理學系,民國89年。
[3]黃博仁,植基於內插多項式之會議金鑰分配系統與多層次資料安全存取控制技術,台灣工業技術學院管理技術研究所資訊管理學程碩士論文,民國84年。
[4]樊國楨,電子商務高階安全防護 : 公開金鑰密碼資訊系統安全原理,資策會,民國86年。
[5]盧文慧,競爭式網路拍賣協定之研究,銘傳大學資訊管理研究所碩士論文,民國88年。
[6]賴溪松,韓亮,張真誠,近代密碼學及其應用,松崗圖書資料公司,1998年8月。
[7]鍾振華,使用身分基礎之自我驗證的金鑰分配及會議金鑰分配技術,台灣科技大學管理研究所資訊管理學程碩士論文,民國87年。
[8]Bierman, H.S., and Fernandez, L., Game Theory with Economic Applications, Addison Wesley, 1993.
[9]Botes, J.J., and Penzhorn, W.T., “Public-key cryptosystems based on elliptic curves,” Proceedings of the 1993 IEEE South African Symposium on Communications and Signal, October 1993, pp.1-5.
[10]Chang, C.C., and Lin, C.H., “How to converse Securely in a conference,” Proceedings of 30th Annual 1996 International Carnahan Conference, 1996, pp.42-45.
[11]Chang, Y.S., Wu, T.C., and Huang, S.C., “ElGamal-like digital signature and multisignature schemes using self-certified public keys,” The Journal of Systems and Software, 2000, pp.99-105.
[12]Chikazawa T., and Yamagishi A., “ An improved identity-based one-way conference key sharing system,” Singapore ICCS/ISITA ''92. ''Communications on the Move'', Vol. 1, 1990, pp.270-273.
[13]Chiou, G.H., and Chen, W.T., “ Secure broadcasting using the secure lock,” IEEE Transactions on Software Engineering, Vol. 15, No. 8, August 1989, pp. 929-934.
[14]Diffie, W., and Hellman, M.E., “New directions in cryptography,” IEEE Transactions on Information Theory, Vol. IT-22, No. 6, 1976, pp. 644-654.
[15]ElGamal, T., “A public-key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, Vol. IT-31, No. 4, 1985, pp.469-472.
[16]Franklin, M.K., and Reiter, M.K., “The design and implementation of a secure auction service,” Proceedings of IEEE Symposium on Security and Privacy, 1995, pp. 2-14.
[17]Franklin, M.K., and Reiter, M.K., “The design and implementation of a secure auction service,” IEEE Transactions on Software Engineering, Vol. 22, No. 5, May 1996, pp. 302-312.
[18]Girault, M., “Self-certified public keys,” Advances in Cryptology: EUROCRYPT ’91, pp.490-497.
[19]Huhns, M.N., and Vidal, J.M., “Online auctions,” IEEE Internet Computing, Vol. 3, No. 3, May-June 1999, pp.103-105.
[20]Hwang, T., and Chen, J.L., “Identity-based conference key broadcast systems,” IEE Proceedings-Computers and Digital Techniques, Vo.141, No. 1, January 1994, pp.57-60.
[21]Ingemarsson, I., Tang, D.T., and Wong, C.K., “A conference key distribution system,” IEEE Transactions on Information Theory, IT-28, 1982, pp. 714-720.
[22]Jurisic, A., and Menezes, A.J., “Elliptic curves and cryptography,” Dr. Dobb’s Journal, 1997, pp. 26-35.
[23]Knuth, D.E., The art of computer programming, Volume 2, Seminumerical algorithms, Addison-Wesley, 1981.
[24]Koblitz, N., “Constructing elliptic curve cryptosystems in characteristic 2,” Advance in Cryptology: Crypto’90, pp. 156-167.
[25]Koblitz, N., ”Elliptic curve cryptosystems,” Mathematics of Computation, Vol. 48, No. 17, 1987, pp. 203-209.
[26]Koyama, K., and Ohta, K., “Identity-based conference key distribution systems,” Advances in Cryptology: Crypto’ 87, pp. 175-184.
[27]Koyama, K., and Ohta, K., “Security of improve identity-based conference key distribution systems,” Advances in Cryptology: Eurocrypt’88, pp.11-19.
[28]Laih, C.S., and Yen S.M., “On the design of conference key distribution systems for the broadcasting networks,” Proceedings of Twelfth Annual Joint Conference of IEEE Computer and Communication Societies, Vol. 3, 1993, pp. 1406-1413.
[29]Lu, E.H., Hwang, W.Y., and Lee, J.Y., “A conference key distribution system based on the Lagrange interpolating polynomial,” Proceedings of Seventh Annual Joint Conference of IEEE Computer and Communications Societies, 1988, pp. 1092-1094.
[30]Menezes, A.J., and Vanstone, S.A., “Elliptic curves cryptosystems and their implementation,” Journal of Cryptology, Vol. 6, No. 4, 1993, pp. 209-224.
[31]Miller, V.S., “Use of elliptic curves in cryptography,” Advances in Cryptology: Crypto’85, pp.417-426.
[32]Petersen, H., and Horster, P., “Self-certified keys — concepts and applications”, Proceedings of Communications and Multimedia Security''97, 1997, pp.102-116.
[33]Rivest, R., Shamir, A., and Adleman, L.,“ A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, Vol. 21, No. 2, 1978, pp. 120-126.
[34]Robinson, D.J.S., A course in linear aigebra with application, World Scientific, New Jersey, 1991.
[35]Saeednia, S., “Identity-based and self-certified key-exchange protocols,” Information Security and Privacy: ACISP ’97, pp. 303-313.
[36]Schnorr, C.P., “Efficient identification and signatures for smart cards,” Advances in Cryptology: Crypto’89, pp.339-351.
[37]Shamir, A., “Identity-based cryptosystems and signature schemes,” Advances in Cryptology: Crypto ’84, pp.47-53.
[38]Sherif, M.H., Serhrouchni, A., Gaid, A.Y., and Farazmandnia, F., “SET and SSL: Electronic payments on the internet,” Proceedings of Third IEEE Symposium on Computer and Communication, 1998, pp.353-358.
[39]Sliverman, J., The arithmetic of elliptic curves, Springer-Verlag, New York, 1986.
[40]Vickrey, W., “Counterspeculation, Auctions, and Competitive Sealed Tenders,” Journal of Finance, Vol. 16, March 1961, pp. 8-37.
[41]Wu, T.C., “Conference key distribution system with use anonymity based on algebraic approach,” IEE Proceedings- Computers and Digital Techniques, Vol. 144, No. 2, March 1997, pp. 145-148.
[42]Wu, T.C., Chang, Y.S., and Lin, T.Y., “Improvement of Saeednia''s self-certified key exchange protocols” Electronics Letters, Vol. 34, No. 11, 28 May 1998, pp. 1094-1095.
[43]Yang, H.K., Choi, J.H., and Ann, Y.H., “Self-certified identity information using the minimum knowledge,” IEEE TENCON., 1996, Vol. 2, pp. 641-647.
[44]http://www2.bid.com.tw/safe1.asp~safe3.asp
[45]http://www.p2p.com.tw/security.html
[46]http://www1.coolbid.com/verisign.html
[47]http://www.hitrust.com.tw/128位元新聞稿.doc
[48]http://www.ebay.com
[49]http://www.onlineauthentics.com/oa/default.asp?sid=1
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊