跳到主要內容

臺灣博碩士論文加值系統

(52.203.18.65) 您好!臺灣時間:2022/01/19 16:15
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:羅金騏
研究生(外文):Chin-chi Lo
論文名稱:利用不可分割簽章法保護行動代理人之研究
指導教授:洪國寶洪國寶引用關係
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊科學研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:中文
論文頁數:52
中文關鍵詞:不可分割簽章行動代理人
外文關鍵詞:undetachable signaturesmobile agent
相關次數:
  • 被引用被引用:2
  • 點閱點閱:2821
  • 評分評分:
  • 下載下載:560
  • 收藏至我的研究室書目清單書目收藏:4
摘要
行動代理人為一具有自主性的軟體代理人,它可以漫遊在不同的執行環之間。它主要為接受使用者指派的任務,被派遣至網際網路提供相關服務的伺服器去搜尋相關的資訊,更進一步地完成任務回報給使用者。行動代理人的特性使得它很適合被應用在電子商務上。
當行動代理人漫遊至網路上的主機來尋找符合使用者限制條件的交易,一旦找到該筆交易,則替使用者完成簽署。因此我們提出一個方法植基於離散對數來達到不可分割簽章的機制。因此藉由解離散對數的困難度,確保行動代理人利用使用者的私密金鑰來簽署的簽章是在符合使用者的限制條件之下,才可以確保使用者的利益。
Mobile agents are autonomous software entities that are able to migrate across different execution environments. Mobile agents make permanent connections unnecessary. They are suitable for providing low-bandwidth connections and async-
hronous communications.
The characteristics of mobile agents make them ideal for electronic commerce applications. A mobile agent can search for special products on behalf of a customer. When mobile agent which must carry the customer’s private key roams among servers on the internet , it will find a bid satisfy user’s constraint and then sign the bid. We propose a scheme based on discrete logarithm to achieve undetachable signatures in a way that the signature of the bid will satisfy user’s constraint.
第一章 緒論...............................................1
1.1 簡介............................................1
1.2 研究動機........................................2
1.3 研究貢獻........................................4
1.4 章節分配........................................5
第二章 背景知識...........................................6
2.1 密碼學基礎知識..................................6
2.2 數位簽章.......................................11
2.2.1 RSA數位簽章..............................11
2.2.2 ElGamal..................................14
2.3 行動代理人(Mobile Agent)之介紹.................16
2.3.1 什麼是行動代理人.........................16
2.3.2 行動代理人之安全性.......................17
第三章 相關研究..........................................22
3.1 Mobile Code....................................22
3.2 Computing with Encrypted Function(CEF).........27
3.2.1 Non-Interactive Evaluation of Encrypted
Functions................................28
3.3 Undetachable Signatures........................31
3.4 植基於RSA之不可分割簽章法......................33
第四章 我們的方法........................................35
4.1 不可分割簽章法之定義...........................35
4.2 我們的方法(植基於離散對數之不可分割簽章法).....37
4.3 在"Random Oracle Model"下之證明................40
第五章 結論與未來發展....................................42
參考書目.................................................44
[1] T. Sander , C.F. Tschudin. Protecting mobile agents against malicious hosts, in Mobile Agent Security, Giovanni Vigan, Ed. Springer, 1998, Forthcoming LNCS.
[2] T. Sander , C.F. Tschudin. Towards mobile cryptography, Proceedings. 1998 IEEE Symposium on Security and Privacy, pp. 215 - 224, 1998.
[3] J. Borrell , S. Robles, J. Serra , A. Riera. Securing the itinerary of mobile agents through a non-repudiation protocol, Proceedings. IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology, pp. 461 - 464, 1999.
[4] William M. Farmer , Joshua D. Guttman , and Vipin Swarup . Security for Mobile Agents: Issues and Requirements. NISSC 96.
[5] William M. Farmer , Joshua D. Guttman , and Vipin Swarup. Security for Mobile Agents: Authentication and State Appraisal. (ESORICS), pp. 118-130, 1996.
[6] Xudong Guan , Yiling Yang , Jinyuan You. POM-a mobile agent security model against malicious hosts, Proceedings. High Performance Computing in the Asia-Pacific Region, pp. 1165 - 1166, 2000.
[7] V. Varadharajan, , N. Kumar , and Y. Mu. An approach to designing security model for mobile agent based systems, Proceedings. IEEE 1998 GLOBECOM, pp. 1600-1606.
[8] W.A. Jansen . Countermeasures for mobile agent security, Computer Communications, Vol: 23, Issue: 17, pp. 1667-1676 , 2000.
[9] R. Oppliger. Security issues related to mobile code and agent-based systems , Computer Communications, Vol: 22, Issue: 12, pp. 1165-1170 , 1999.
[10] A. Corradi , R. Montanari , and C. Stefanelli. Security issues in mobile agent technology, Proceedings. IEEE Workshop on Future Trends of Distributed Computing Systems, pp. 3 -8, 1999.
[11] M.S. Greenberg , L.C. Byington , and D.G. Harper . Mobile agents and security, Proceedings. IEEE Communications Magazine Volume: 36, pp. 76 -85, 1998.
[12]Vu Anh Pham , A. Karmouch. Mobile software agents: an overview , Proceedings. IEEE Communications Magazine, Vol. 36, pp. 26-37, 1998.
[13] W. Jansen and T. Karygiannis. Mobile Agent Security , NIST Special Publication 800-19.
[14] Panayiotis Kotzanikolaou , Mike Burmester , and Vassilios Chrissikopoulos. Secure transactions with mobile agents in hostile environments. In E.Dawson, A. Clark, and C.Boyd, editors, Information Security and Privacy, Proceedings. Australasian Conference ACISP 2000, pp. 397-409. Springer-Verlag , 2000.
[15] W.A. Jansen. Countermeasures for mobile agent security , Computer Communications , Vol: 23, Issue: 17, pp. 1667-1676, 2000.
[16] Niklas Borselius , Chris J. Mitchell , Aaron Wilson. Undetachable threshold signatures.
[17] Bruce Schneier , John. ”Applied Cryptography” 2nd Edition , Wiley & Sons, Inc.
[18] http://www.trl.ibm.co.jp/aglets
[19] http://www.cs.umbc.edu/kqml/
[20]羅金騏、洪國寶,”行動代理人安全性之分析” , IICM第五卷 第一期 民國九十一年三月。
[21]羅金騏、洪國寶,”植基於離散對數之不可分割簽章法” ,第十二屆全國資訊安全會議。
[22]歐俠宏,”行動代理程式安全之研究”,朝陽科技大學資訊管理系碩士論文。
[23]邱擎智,”行動代理人程式的認證及中間結果的存取控制與保護”,中興大學資訊科學所碩士論文。
[24]賴溪松、韓亮、張真誠,”進代密碼學及其應用”,松崗電腦圖書資訊股份有限公司,初版二刷,1996。
[25] Ernest Brickell , David Pointcheval , Serge Vaudenay , and Moti Yung. Design Validations for Discrete Logarithm Based Signature Scheme , PKC’2000.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top