(3.238.250.105) 您好!臺灣時間:2021/04/20 05:19
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:張廷瑋
研究生(外文):Ting-Wei Chang
論文名稱:基於團體憑證之識別方法及其在無線通訊系統之應用
論文名稱(外文):Efficient Authentication Schemes Based on Group Certificate and Their Applications on Mobile Communication System
指導教授:賴溪松賴溪松引用關係
指導教授(外文):Chi-Sung Laih
學位類別:碩士
校院名稱:國立成功大學
系所名稱:電機工程學系碩博士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2003
畢業學年度:91
語文別:英文
論文頁數:54
中文關鍵詞:數位簽章用戶識別
外文關鍵詞:digital signatureforward security
相關次數:
  • 被引用被引用:0
  • 點閱點閱:86
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:6
  • 收藏至我的研究室書目清單書目收藏:0
用戶識別可說是密碼學在日常生活中最重要的一種應用,
從實體大樓的進出管理到虛擬網路提供的服務,如何有效
而安全的識別合法用戶,規範使用者合理權限,都屬於用
戶識別的應用。其中對我們生活影響最大的莫過於在無線
通訊中的用戶識別,在早些年前無線通訊開始起步時,當
初使用的系統在用戶識別的安全協定上的設計並不嚴謹,
曾經造成電信公司及使用者相當大的損失。近幾年來將密
碼技術引進到無線通訊的用戶識別,才提供了用戶及電信
公司雙方較佳的安全防護。然而隨著科技日新月異,無線
網路結合電子商務及各種服務,安全上及實用上的需求都
大大增加,因此在新一代的無線通訊系統中,有許多學者
提出了基於數位簽章的安全識別協定。由於基於公開金鑰
技術的數位簽章在所需的運算量上要來的比對稱式密碼技
術高,因此如何達到較高的效率是一個相當重要的課題。
在本論文中,我們提出了一個基於團體憑證的數位簽章系
統,並將之應用於新一代的無線通訊上的用戶識別協定。
有別於一般的憑證,基於團體憑證,可用來認證許多由不
同私密金鑰所簽章的文件,在驗證過程中,對於同一群體
的用戶只需要一張團體憑證,因此可大大降低憑證的交換
及驗證憑證的過程。然而,不同於一般的團體式密碼系統
或識別系統,透過團體憑證的驗證,不僅能確認該用戶是
否屬於該團體,也能夠識別出特定的用戶。這是一個嶄新
的技術並且非常適合於個人及團體的識別系統。
User authentication is one of the most important
applications in cryptography. For example,
the passage management of the building or the virtual
network services all need secure and efficient
user authentication. The most common user
authentication process in our daily life is the
authentication protocol in mobile communication
system. With the popularization of cellular
phones, the security of mobile systems becomes
more and more critical. In the early days,
when the first generation mobile system was
started, the user authentication protocol was not
conscientious and careful. The misappropriation
problem is very serious; the users and the
telecommunication companies suffered large amount
of damage. After the cryptography technology was
applied to the authentication protocol in second
generation mobile communication system, the
situation became better. The mobile systems
nowadays have moved from second generation to
third generation, and the security requirements
of next generation system are very different.
With the growth of computing power of mobile
devices, many new authentication protocols based
on public key cryptography have been proposed
recently. Since the computation required for
public key computation is large compared with
the symmetric key encryption, the efficiency
consideration is very important.
In this thesis, we propose a new digital
signature scheme, which has single public key
corresponding to multiple private keys. With
this novel property, we can construct a group
certificate for a group of users. The users in
the same group hold the same certificate in spite
of the different users hold the different secret
keys. The public key is the same for all users
in the same group. The group certificate has
much benefit in authentication protocols, such
as saving storage spaces and reducing the need
of exchanging certificates. Because only one
certificate is needed for a group of users, the
efficiency will be improved. However, the group
certificate is not like the group oriented
cryptography technology. With our group
certificate, not only the group but also the
specific user in the group can be authenticated.
We first propose the method, and show that it is
very suitable for both group and user
authentications.
Chapter 1 Introduction 1
1.1 Introduction 1
1.2 Research Motives 2
1.3 Our Results 3
1.4 The Overview of This Thesis 4
Chapter 2 Related Work 6
2.1 Asymmetric Cryptography 6
2.1.1 Asymmetric Cryptosystem 6
2.1.2 Digital Signatures 8
2.2 Authentication Protocols on Mobile Communication Systems14
2.2.1 The Security Requirements for Mobile Communication Systems15
2.2.2 Authentication on Symmetric Cryptography 16
2.2.3 Authentication on Asymmetric Cryptography 17
2.2.4 Some Weakness of The Protocols 22
2.3 Forward Secure Digital Signatures 24
Chapter 3 Our Proposed Scheme 28
3.1 Definitions 28
3.2 Our Scheme Model 31
3.3 Algorithms 32
3.4 The Enhanced Scheme With Forward Secure Property 35
3.5 The Application Example 40
Chapter 4 System Analysis 45
4.1 Security 45
4.2 Efficiency 47
4.3 Satisfying the Requirements 48
Chapter 5 Conclusion and Future Work 50
References 51
[1]3GPP TS 33.102 V5.1.0 Dec. 2002.
[2]S.G. AKL, P.D. Taylor, "Cryptography solution to a problem of access control in a hierarchy" ACM Transaction on Computer Systems, Vol. 1, No. 3, pp. 239-248 Aug. 1983.
[3]K. Al-Tawil, A. Akrami and H. Youssef, "A new authentication protocol for GSM networks" 23rd Annual Conference on Local Computer Networks, 1998. LCN ''98. Proceedings, pp. 21-30, Oct. 1998.
[4]K. Al-Tawil, A. Akrami, "A new authentication protocol for roaming users in GSM networks" IEEE International Symposium on Computers and Communications, 1999. Proceedings, pp. 93 -99, 1999.
[5]R. Anderson, Invited lecture, Fourth Annual Conference on Computer and Communications Security, ACM, 1997.
[6]A. Aziz, W. Diffie, "Privacy and authentication for wireless local area networks" IEEE Personal Communications, Vol. 1, Issue: 1, pp. 25-31, 1st Qtr 1994
[7]M. Bellare, S. Miner, "A forward secure digital signature scheme" CRYPTO''99 LNCS Vol. 1666, pp. 431-448, Aug. 1999.
[8]M.J. Beller, L.F. Chang and Y. Yacobi, "Privacy and authentication on a portable communications system" Global Telecommunications Conference, 1991. GLOBECOM ''91, Vol. 3, pp. 1922-1927, Dec. 1991.
[9]V. Bharghavan, C.V. Ramamoorthy, "Security issues in mobile communications" Second International Symposium on Autonomous Decentralized Systems, 1995. Proceedings, ISADS 95, pp. 19-24, Apr. 1995.
[10]T.G. Brutch, P.C. Brutch, "Mutual Authentication, Confidentiality, and Key MANagement (MACKMAN) system for mobile computing and wireless communication" Computer Security Applications Conference, 1998, Proceedings, pp. 308-317, 14th Annual, Dec. 1998.
[11]W. Deng, M. Chen and B. Ai, "Enhancing authentication mechanism with mobile agent in mobile communication system" Vehicular Technology Conference, 2000. IEEE VTS-Fall VTC 2000. 52nd, Vol. 4, pp. 1956-1959, 2000.
[12]W. Diffie, M.E. Hellman, "New Direction in Cryptography" IEEE Transaction on Information Theory, Vol. IT-22, No. 6, pp. 644-654, Nov. 1976.
[13]N. El-Fishway, M. Nofal and A. Tadros, "An effective approach for authentication of mobile users" Vehicular Technology Conference, 2002. VTC Spring 2002. IEEE 55th, Vol. 2 pp. 598-601, 2002.
[14]L.C. Guillou, J.J. Quisquater, "A paradoxical identity-based signature scheme resulting from zero-knowledge" Advances in Cryptology CRYPTO''88 LNCS Vol. 403, pp. 216-231, Aug. 1988.
[15]C. Gunther, "An identity based key exchange protocol" Eurocrypt 89 Proceedings, LNCS Vol. 434, 1989.
[16]L. Harn, H.Y. Lin, "Modification to enhance the security of the GSM protocol" Proc. of the 5th National Conference on Information Security, ROC. pp. 74-76, May. 1995.
[17]G. Horn, K.M. Martin and C.J. Mitchell, "Authentication protocols for mobile network environment value-added services" IEEE Transactions on Vehicular Technology, Vol. 51 Issue: 2, pp. 383-392, Mar. 2002.
[18]G. Itkis, L. Reyzin, "Forward-secure signatures with optimal signing and verifying" CRYPTO 2001, LNCS Vol. 2139, August. 2001.
[19]ITU-T Recommendation X.509, "Information Technology Open System Interconnection - The Directory: Authentication Framework" Jan. 1997.
[20]N. Jefferies, "Security in third-generation mobile systems" IEE Colloquium on Security in Networks, pp. 8/1 -8/5, Feb. 1995.
[21]C.H. Lee, M.S. Hwang and W.P. Yang, "Enhanced privacy and authentication for the global system for mobile communications" Wireless Network, pp. 231-243, 1999.
[22]J. Liu, Y. Wang, "A user authentication protocol for digital mobile communication network" Personal, Sixth IEEE International Symposium on Indoor and Mobile Radio Communications, 1995. PIMRC''95. Wireless: Merging onto the Information Superhighway, Vol. 2, pp. 608-612, Sep. 1995.
[23]J. Liu, Y. Wang, "Authentication of mobile users in personal communication system" Seventh IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 1996. PIMRC''96, Vol. 3, pp. 1239-1242, Oct. 1996.
[24]C.C. Lo, Y.J. Chen, "Secure communication mechanisms for GSM networks" IEEE Transactions on Consumer Electronics, Vol. 45, Issue: 4, pp. 1074-1080, Nov. 1999.
[25]B. Mallinder, "An overview of the GSM system" Proc. Digital Cellular Radio Conf, Oct. 1988.
[26]A.J. Menezes, P.C. van Oorschot and S.A. Vanstone, "Handbook of applied cryptography" CRC, 1997.
[27]R. Molva, D. Samfat and G. Tsudik, "Authentication of mobile users" IEEE Network , Vol. 8, Issue: 2, pp. 26-34, Mar/Apr. 1994.
[28]R. Pandya, D. Grillo, E. Lycksell, P. Mieybegue, H. Okinaka and M. Yabusaki, "IMT-2000 Standards: Network Aspect" IEEE Personal Communications, pp. 20-29, 1997.
[29]C.S. Park, "On certificate-based security protocols for wireless mobile communication systems" IEEE Network, Vol. 11, Issue: 5, pp. 50-55, Sep/Oct. 1997.
[30]S. Putz, R. Schmitz and F. Tonsing, "Authentication schemes for third generation mobile radio systems" The Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Vol. 1, pp. 126 -130, Sep. 1998.
[31]M. Rahnema, "Overview of the GSM system and protocol architectures" IEEE Communication Magazine, Apr. 1993.
[32]R. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signature and public key cryptosystems" Communication of the ACM, Vol. 21, No.2, pp. 120-126, Feb. 1978.
[33]M.I. Samarakoon, B. Honary, "Novel authentication and key agreement protocol for low processing power and systems resource requirements in portable communications systems" IEE Colloquium on Novel DSP Algorithms and Architectures for Radio Systems (1999/184), pp. 9/1 -9/5, 1999.
[34]Z.J. Tzeng, W.G. Tzeng, "Authentication protocols for the third generation mobile systems," Personal Wireless Communications 16, pp. 35-50, 2001.
[35]J.E. Wilkes, "Privacy and authentication needs of PCS" IEEE Personal Communications Vol. 2, Issue: 4, pp. 11-15, Aug. 1995.
[36]Y. Yacobi, Z. Shmuely, "On key distributions" CRYPTO''89, Aug. 1989.
[37]賴溪松、韓亮、張真誠,"近代密碼學及其應用" 旗標出版股份有限公司,2003
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 葉德明(民76)。漢字書寫錯誤之分析與教學。華文世界,43,56-66。
2. 鄭昭明、陳學志(民80)。漢字簡化對文字讀寫的影響。華文世界,62,86-104。
3. 鄭昭明(民70)。漢字認知的歷程。中華心理學刊,23(2),137-153。
4. 劉興漢(民76)。國小學生學習寫中文錯誤之分析:個案研究。教育與心理研究,10,189-198。
5. 傅淳鈴、黃秀霜(民89)。小學國語低成就學生後設語言覺知實驗教學成效分析。中華心理學刊,42(1),87-100。
6. 傅淳鈴、黃秀霜(民89)。國小學童後設語言覺知之測量及其與認字能力之相關研究。教育與心理研究,23,383-414。
7. 曾志朗、洪蘭(民67)。閱讀中文字:一些基本的實驗研究。中華心理學刊,20,45-49。
8. 黃沛榮(民88)。由部件分析談漢字教學的策略。華文世界,94,16-22。
9. 黃沛榮(民85)。漢字部件教學法。華文世界,81,57-69。
10. 張勝成(民79)。弱視學生閱讀書寫能力的探討。特殊教育學報,5,
11. 陳烜之(民76)。閱讀中文時的單字偵測歷程。中華心理學刊,29
12. 陳烜之(民73)。閱讀中文時對部件偵測的歷程。中華心理學刊,26
13. 柯華葳(民75)。由兒童會錯意的字分析探討兒童認字方法。華文世界,
14. 胡志偉(民78)。中文詞的辨識歷程。中華心理學刊,31(1),33-39。
15. 林宜真(民86)。識字困難學生之教學策略。特教園丁,13(1),36-39。
 
系統版面圖檔 系統版面圖檔