(3.236.175.108) 您好!臺灣時間:2021/02/27 06:19
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:彭建熹
研究生(外文):Chien-Hsi Peng
論文名稱:運用群體驗證技術GIA線上珠寶交易安全機制
論文名稱(外文):A Group-Oriented Verification for the GIA Transaction Certification
指導教授:陳俊德陳俊德引用關係
指導教授(外文):Chun-Te Chen
學位類別:碩士
校院名稱:華梵大學
系所名稱:資訊管理學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2008
畢業學年度:96
語文別:中文
論文頁數:52
中文關鍵詞:數位權利管理數位簽章時戳電子履歷
外文關鍵詞:DRMDigital SignatureTime-stampElectronic Pedigree System
相關次數:
  • 被引用被引用:0
  • 點閱點閱:213
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:2
本論文中研製一套國際珠寶證書(GIA)嵌入無線射頻識別系統與GIA數位證書鑑價服務系統,此系統包括電子履歷管理、GIA數位證書簽署者、群體簽署系統,以及把寶石飾品作層級分區的GIA數位證書。首先透過網際網路群體鑑價系統,建立了珠寶飾品鑑定的目錄,成為GIA數位證書鑑價憑證中心。
寶石飾品從珠寶製造商最後到消費者的手上,我們利用無線的標籤(rfid) 解決辨識珠寶實體符合數位證書所描述的特徵,降低不法人士偽造珠寶,珠寶飾品註冊後所產生無線射頻辨識標籤的序號具有唯一性,GIA數位證書所鑑定出珠寶的價值與群體簽署的資訊都記錄在rfid裡,並證明此珠寶價值的數位證書確保訊息傳遞中完整性與真實安全性。除了加強GIA國際證書的防偽功能與防污辨識力,有效的保障珠寶擁有者及購買者之權益,另外我們藉由電子履歷的管理,不僅能維護交易的安全,更能有效的追朔歷史流通的紀錄,以查驗珠寶交易的真確性,保障消費者權益。
在珠寶交易群體的簽署系統裡,是採用群體共同的簽署者與群體共同的驗證者,本研究的方法利用Lagrange多項式內插法驗證出簽署者的簽署資訊,針對同一份數位證書,簽署出一份具有群體代表性的群體簽章,達到使用者身份之辨識性、交易之不可否認性、資料之完整性、資料之隱密性。此電子簽章與rfid機制可防止GIA國際證書本體、簽章被偽造及珠寶內容被變造。因此本研究的珠寶交易鑑價系統,的確改善了線上珠寶交易供應鏈上的安全問題。
In this paper, we proposed an international GIA Diamond Grading identification with embedded the authenticated radio frequency identification (RFID) for Internet Gemological Identification Services. The proposed system includes the electronic pedigree system, the GIA diamond grading signer, the group signature system, and the GIA Diamond Grading identification and verification system. At first, the proposed system provides a digital Gemological Identification Report Directory as the GIA verification system. The gemological owner can verify the Diamond and the certification thought the Internet. It allows the end user to easily verify the authenticity of the diamond at the item level. The signatures of the GIA Diamond Grading identification information are wrapped and embed into the RFID tag It embeds the specified serial numbers of the GIA Diamond Grading identification as the digital certification into the RFID tag to achieve the information security objectives of non-repudiation, integrity and security. This system authority can use the traitor tracing of the GIA electronic pedigree system to revoke the certification. We proposed the group signature and the group verifier in the group signature system. We also implement Lagrange multinomial in our scheme to enhance RFID and Electronic GIA Pedigree system security. The GIA diamond group signer system provides user identification, non-repudiation, integrity and security by a digital Gemological Identification. With the proposed digital Gemological Identification system for Internet transaction, it can help prevent counterfeits, aid product recall, and improve the security of the general supply chain.
摘要.....................................................II
Abstract.................................................IV
目錄......................................................V
表錄...................................................VIII
圖錄.....................................................IX
一、緒論..................................................1
1.1研究背景...........................................1
1.2研究動機...........................................3
1.3研究目的...........................................3
1.4研究架構...........................................4
二、文獻探討..............................................6
2.1 DRM系統的交易流程.................................6
2.2 DRM系統的安全機制.................................7
2.2.1 DRM系統的鑑別加密法..........................8
2.2.2 DRM系統的數位浮水印.........................10
2.2.3 DRM系統的數位簽章...........................12
2.2.4 DRM系統的時戳機制...........................13
2.3群體驗證演算法....................................14
2.4無線射頻辨識(RFID)防偽探討.......................16
2.4.1 EPC與EPC Network............................17
2.4.1 RFID的防偽安全管理..........................19
三、GIA線上珠寶交易安全防偽辨識之DRM系統................20
3.1 GIA線上珠寶交易系統架構...........................20
3.1.1 RFID防偽鑑識流程機制........................22
3.2 GIA線上珠寶鑑識機制...............................23
3.2.1珠寶擁有者認證機制...........................26
3.2.2數位證書的數位權利發行階段...................27
3.2.3數位證書的數位權利組合階段...................29
3.3 GIA線上珠寶交易流程機制...........................30
3.3.1數位證書的數位權利轉移階段...................32
3.3.2數位證書的數位權利清算階段...................34
3.4電子標籤與GIA數位證書結合的群體驗證機制...........35
四、分析與討論............................................39
4.1系統建置環境......................................39
4.2系統實作展示......................................39
4.3安全性分析........................................43
五、結論與未來發展.......................................47
5.1結論與研究貢獻....................................47
5.2研究範圍..........................................48
5.3未來發展..........................................48
參考文獻.................................................49
[1]王峻彥,時戳服務模式與運作機制,國立海洋大學資訊科學學系碩士班,碩士論文,91
[2]陳煜文(2003),以數位權利為基礎的商品交易機制,世新大學管理學院資訊管理系碩士學位論文。
[3]黃明祥、林詠章,資訊與網路安全概論-建構安全的電子商務系統,美商麥格羅‧希爾,臺北,民國九十四年。
[4]陳俊德、林坤德,「以動態情境控制與metadata控制存取數位文物之個人化數位權利管理機制」, 2006數位科技與創新管理國際研討會,華梵大學,台北縣,民國九十五年四月,P163。
[5]陳俊德、李昆霖、吳盈杰,「架構一個以角色為金鑰管理基礎的企業RFID標籤加密與隱私管理」,2006數位科技與創新管理國際研討會論文集(IDTIM 2006),第166頁,2006年。
[6]陳俊德、林坤德、王信弼 「數位化違規照相開單的數位權利管理模式」 第九屆資訊管理學術暨警政資訊實務研討會-新興電腦犯罪之偵防(Prevention of Emerging Cybercrimes),中央警察大學,桃園縣,民國九十四年五月,P139-147。
[7]Horster P., Michels M. and Petersen H., “Authenticated encryption schemes with low communication costs,” Electronics Letters, Vol. 30, No. 15, 1994, pp. 1212-1213.
[8]David L. Mills(1992),“Network Time Protocol (Version 3) Specification, Implementation and Analysis,” RFC 1305, 1992
[9]Hunt, R.,”PKI and Digital Certification Infrastructure(2001),” Proceedings of the 9th IEEE International Conference on Networks,Bangkok, 2001,pp.234-239
[10]R. Molva,G. Tsudik, E. Van Herreweghen, S. Zatti(1992),”KryptoKnight Authentication and Key Distribution System,”ESORICS, 1992, pp.155-174
[11]Y. Desmedt. “Society and group oriented cryptography: A new concept,” In: Advances in Cryptology, Proceedings of Crypto''87, Lecture Notes in Computer Science, vol. 293. Springer-Verlag, 1988, pp. 120-127. [12] A. Shamir, ‘‘How to share a secret,’’ Commum. ACM, vol. 22, Nov. 1979, pp. 612-613.
[12]A. Shamir, ‘‘How to share a secret,’’ Commum. ACM, vol. 22, Nov. 1979, pp. 612-613.
[13]C.-T. Li, and Y. Yuan, “Digital Watermarking Schemes for Multimedia Authentication,” Digital Watermarking for Digital Media, Idea Group Publishing, 2005, pp.30-51.
[14]D.-C. Lou, J.-L. Liu and C.-T. Li, “Digital Signature-based Image Authentication,” Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellecutal Property, Idea Group Publishing, 2004, pp. 207-230.
[15]D. Skraparlis, “Design of an Efficient Authentication Method for Modern Image and Video,” IEEE Transactions on Consumer Electronics, Vol. 49, 2003, pp. 417-426.
[16]F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information Hiding – A Survey,” Proceedings of the IEEE, Vol. 87, No. 7, July 1999, pp.1062-1078.
[17]C. Rey, and J.-L. Dugelay, “A Survey of Watermarking for Image Authentication,” EURASIP Journal on Applied Signal Processing, Vol. 6, 2002, pp. 613-621.
[18]E. T. Lin, C. I. Podilchuck, and E. J. Delp, “Detection of image alterations using semi-fragile watermarks,” Proceedings of SPIE Security and Watermarking of Multimedia Contents , Vol. 3971, 2000, pp. 152-163.
[19]Frank Hartung and Friedhelm Ramme, Ericsson Research, ”Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications,” IEEE Communications Magazine, 2000, Vol 38, Issue:11 .pp78 - 84.
[20]Zongkai Yang, Qingtang Liu, Kun Yan, Wanting Deng, Jing Jin, “Integration of Digital Rights Management into Learning Content Management System,” Proceedings of the International Conference on Information Technology: Coding and Computing ITCC(1), 2005, pp. 465-469.
[21]Willem Jonker and Jean-Paul Linnartz, “Digital rights management in consumer electronics products,” IEEE SIGNAL PROCESSING MAGAZINE, MARCH 2004,p82-91.
[22]Hunt, R.,”PKI and Digital Certification Infrastructure(2001),” Proceedings of the 9th IEEE International Conference on Networks,Bangkok, 2001,pp.234-239
[23]Seong Oun Hwang , Ki Song Yoon , Kyung Pyo Jun , Kwang Hyung Lee, “Modeling and implementation of digital rights,” Journal of Systems and Software, 2004,v.73 n.3, p.533-549.
[24]Claudine Conrado, Milan Petkovic, Michiel van der Veen,and Wytse van der Velde(2006),Controlled Sharing of Personal Content Using Digital Rights Management, Journal of Research and Practice in Information Technology, Vol. 38, No. 1, February 2006.
[25]Bellovin, S.M., Merritt, M., “Encrypted key exchange: password-based protocols secure against dictionary attacks,” In Proceedings of the IEEE Computer Society Conference (1992), pp. 72-84.
[26]Bresson, E., Chevassut, O., Pointcheval, D., “Security proofs for an efficient password-based key exchange,” Proceedings of the 10th ACM Conference on Computer and Communications Security (2003), pp. 241-250.
[27]Diffie, W., Hellman, M., “New directions in cryptography,” IEEE Transactions on Information Theory IT-22: 6 (1976), pp. 644-654.
[28]Hsu, C.L., Wu, T.S., Wu, T.C., Mitchell, C., “Improvement of modified authenticated key agreement protocol,” Applied Mathematics and Computation 142: 2-3 (2003), pp. 305-308.
[29]ElGamal, T., “A public key cryptosystem and signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, IT-31 (4), 1985, pp. 469-472.
[30]Harn, L., “Group-oriented (t, n) threshold digital signature scheme and digital multi- signature,” IEE Proceedings Computers Digital Techniques, 141 (5), 1994, pp. 307-313.
[31]Hwang, S.J. and Chen, C.C., “New multi-proxy multi-signature schemes,” Applied Mathematics and Computation, 147 (1), 2004, pp. 57-67.
[32]Hwang, M.S., Lin, I.C. and Eric, J.L.L.U., “A secure nonrepudiable threshold proxy signature scheme with known signers,” Informatica, 11 (2), 2000, pp. 137-144.
[33]Sun, H.M., Lee, N.Y. and Hwang, T., “Threshold proxy signatures,” IEE Proceedings Computers Digital Techniques, 146 (5), 1999, pp. 254-261.
[34]Digital Rights Management White Paper Sonera Plaza Ltd MediaLab 2002.2. http//www.medialab.sonera.fi/workspace/DRMWhitePaper.pdf
[35]Yan, Z.”Mobile Digital Rights Management,”Nokia Research Center,In Telecommunications Software and Multimedia TML-C7 ISSN 1455-9749,2001.www.tml.hut.fi/Studies/T-110.501/2001/papers/zheng.yan.pdf
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊
 
系統版面圖檔 系統版面圖檔