(3.236.214.19) 您好!臺灣時間:2021/05/10 04:04
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:黃顯舒
研究生(外文):Hsien-Shu Huang
論文名稱:安全的公文線上簽核系統
論文名稱(外文):Design of Secure Online Official Document Approval Systems
指導教授:許建隆許建隆引用關係
指導教授(外文):C. L. Hsu
學位類別:碩士
校院名稱:長庚大學
系所名稱:資訊管理學研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2009
畢業學年度:97
論文頁數:181
中文關鍵詞:電子公文線上簽核代理簽章代理解密鑑別加密法
外文關鍵詞:Electronic Official DocumentOnline ApprovalProxy SignatureProxy DecryptionAuthenticated Encryption Scheme
相關次數:
  • 被引用被引用:15
  • 點閱點閱:1107
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:263
  • 收藏至我的研究室書目清單書目收藏:1
公文是政府施政及機關間溝通的重要工具,所以公文處理效率為
政府效能之根基,也因為如此公文電子化成為e 化政府的改革要務之
一。綜觀公文處理過程陳核部份最為耗時,如果能導入公文線上簽核
系統,即可以加速公文辦理時效,同時也能順應節能減碳之時代潮
流。
本論文計畫針對安全的公文線上簽核系統,定義系統參與角色及
功能,並歸納其所需之安全需求,再整合代理簽章法、代理解密系統
及鑑別加密法等密碼機制,進一步提出「安全的公文線上簽核系統」
模型,包括:一般公文簽核法、公文代理簽核法及公文代理驗核法,
以營造線上簽核之安全環境,達成公文線上簽核之目的。
本論文所提出之「安全的公文線上簽核系統」,具高度模組化,
故可以適用於任何規模的組織機關,機關可以依據其組織內部的需求,
考量代理加密及代理驗核等需求,選擇適合組織公文線上簽核環境之
方法,以滿足機關個別公文線上簽核系統的運作需求,並維持其安全
性,包括公文機密性、公文完整性、公文鑑別性、簽核之不可否認性、
機密公文之可解密性、代理簽核之鑑別性、代理簽核之不可否認性、
代理簽核之可區別性、代理驗核、代理驗核之鑑別性及代理驗核之不
可否認性等安全需求。
Official document is an important media employed by government administration to correspond across public sectors. Therefore, the effectiveness of an official document can be regarded as the foundation of good government performance. Hence developing an efficient online
official document approval system is an important task required to bring about e-government plan to reality. Within the routine course of the official document scheme, approval is the most time consuming part of the process. If an online official document approval system can be implemented, aside from the benefits brought forward by shortening the time consumed, another advantage would be acting in accordance with the most recent worldwide call for action to lower energy consumption as well as reduce carbon dioxide emission.

This thesis focuses on the security issues of online official Document approval system. First, the roles and functions of the system would be defined. Second, the security needs of the system would be induced. Third,
by integrating the different aspects of cryptography scheme, such as proxy signature, proxy cryptosystem and authenticated encryption scheme;this thesis would design three modules that would address to security needs and further create a secured environment for online official
document approval system.

The system modules that this thesis has constructed can deal with most of the security requirements of online official document operating environment and can also satisfy other safety needs such as confidentiality of official document, integrity of official document,
authentication of official document, non-repudiation of approval,decryption of confidential official document, authentication of proxy approval, non-repudiation of proxy approval, distinguishability of proxy approval, proxy verification, authentication of proxy verification as well
as non-repudiation of proxy verification.
誌 謝 I
中文摘要 II
Abstract IV
參數符號表 VI
目 錄 VIII
圖標題 X
表標題 XI
第一章 緒論 1
1.1研究背景與動機 1
1.2研究目的與貢獻 4
1.3論文架構 10
第二章 文獻探討 13
2.1公文流程 13
2.2電子公文系統簡介 15
2.3線上簽核系統 18
2.4實務上公文線上簽核系統之架構 24
2.5電子表單系統 27
2.6 ElGamal密碼系統 29
2.7 Schnorr簽章法 31
2.8代理簽章 33
2.9代理解密 37
2.10鑑別加密法 38
2.11實務上處理公文線上簽核系統之簽章模式 43
2.12加密模式探討 48
第三章 一般公文簽核法 50
3.1一般公文簽核法之模型 51
3.2一般公文簽核法之設計 62
3.3一般公文簽核法 72
3.4一般公文簽核法之實例 74
3.5安全性分析 77
3.6效能分析 85
3.7討論 87
第四章 公文代理簽核法 88
4.1公文代理簽核法之模型 89
4.2公文代理簽核法之設計 98
4.3公文代理簽核法 105
4.4公文代理簽核法之實例 107
4.5安全性分析 111
4.6效能分析 116
4.7討論 117
第五章 公文代理驗核法 119
5.1公文代理驗核法之模型 119
5.2公文代理驗核法之設計 130
5.3公文代理驗核法 136
5.4公文代理驗核法之實例 139
5.5安全性分析 143
5.6效能分析 146
5.7討論 148
第六章 結論及未來研究方向 149
6.1結論 149
6.2未來研究方向 152
參考文獻 155
附錄 英中名詞對照表 162
作者簡介 167
[AEK98] Anderson, R., Biham, E., and Knudsen, L., “Serpent: a proposal for the advanced encryption standard,” 1st AES Conference, 1998.
[AES01] National Institute of Standards and Technology (NIST), “Advanced encryption standard (AES),” Federal Information Processing Standards Publication 197(FIPS 197), 2001.
[DES77] National Institute of Standards and Technology (NIST), “Data encryption standard (DES),” Federal Information Processing Standards Publication 46 (FIPS 46), 1977.
[DES99] National Institute of Standards and Technology (NIST), “Data encryption standard (DES),” Federal Information Processing Standards Publication 46-3 (FIPS 46-3), 1999.
[DH76] Diffie, W. and Hellman, M., “New directions in cryptography,” IEEE Transactions on Information Theory, Vol. 22, No. 6, 1976, pp. 644-654.
[DSS91] National Institute of Standards and Technology (NIST), “Proposed federal information processing standard for digital signature standard (DSS),” Federal Register, Vol. 169, 1991, pp. 42980-42982.
[ElG85] ElGamal, T., “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions of Information Theory, Vol. 31, No. 4, 1985, pp. 469-472.
[GW07] Guo, L. and Wang, G., “Insider attacks on multi-proxy multi-signature schemes,” Computers and Electrical Engineering, Vol. 33, No. 2, 2007, pp. 88-93.
[HLL03] Hwang, M.S., Lu, E.J.L., and Lin, I.C., “A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem,” IEEE Transactions on Knowledge and Data Engineering, Vol. 15, No. 6, 2003, pp. 1552-1560.
[HMP94] Horster, P., Michels, M., and Petersen, H., “Authenticated encryption schemes with low communication costs,” Electronics Letters, Vol. 30, No. 15, 1994, pp. 1212-1213.
[ISO98] ISO 10118-3, “Information technology – security techniques – hash functions – part 3: dedicated hash-functions,” International Organization for Standardization, 1998.
[KC05] Kuo, W.C. and Chen, M.Y., “A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem,” Proceedings of the Third International Conference on Information Technology and Applications (ICITA05), 2005.
[KHW06] Kang, B., Han, J., and Wang, Q., “A new threshold multi-proxy multi-signature scheme,” Journal of Electronics (China), Vol. 23, No. 4, 2006, pp. 560-563.
[LCZL04] Li, X., Chen, K., Zhang, L., and Li, S., “Proxy structured multisignature scheme from bilinear pairings,” Lecture Notes in Computer Science, 2004, pp. 705-714.
[LZ07] Li, S. and Zhang, F., “A new multi-proxy signature from bilinear pairing,” Journal of Electronics (China), Vol. 24, No. 1, 2007, pp. 90-94.
[MO97] Mambo, M. and Okamoto, E., “Proxy cryptosystems: delegation of the power to decrypt ciphertexts,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. 80, No. 1, 1997, pp. 54-63.
[MUO96a] Mambo, M., Usuda, K., and Okamoto, E., “Proxy signatures: delegation of the power to sign messages,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. 79, No. 9, 1996, pp. 1338-1354.
[MOU96b] Mambo, M., Usuda, K., and Okamoto, E., “Proxy signatures for delegating signing operation,” Proceedings of the Third ACM Conference on Computer and Communications Security, 1996, pp. 48-57.
[NR93] Nyberg, K. and Rueppel, R.A., “A new signature scheme based on the DSA giving message recovery,” Proceedings of the First ACM Conference on Computer and Communications Security, 1993, pp. 58-61.
[PL05] Park, S.Y. and Lee, S.H., “Multi-proxy signatures based on diffie-hellman problems allowing repeated delegations,” Lecture Notes in Computer Science, Vol. 3597, 2005, pp. 340-344.
[Riv92] Rivest, R.L., “The MD5 message digest algorithm,” Request for Comment RFC 1321, 1992.
[RSA78] Rivest, R.L., Shamir, A., and Adleman, L.M., “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, Vol. 21, No. 2, 1978, pp. 120-126.
[Sch89] Schnorr, C.P., “Efficient identification and signatures for smart cards,” Advances in Cryptology - CRYPTO'89, Springer-Verlag, 1990, pp. 235-251.
[Sch94] Schneier, B., “Description of a new variable-length key, 64-bit block cipher (Blowfish),” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, pp. 191-204.
[SLH99] Sun, H.M., Lee, N.Y., and Hwang, T., “Threshold proxy signatures,” IEE Proceedings - Computers and Digital Techniques, Vol. 146, No. 5, 1999, pp. 259-263.
[Sti95] Stinson, D.R., “Cryptography: Theory and practice,” CRC Press, 1995.
[WBZD04] Wang, G., Bao, F., Zhou, J., and Deng, R.H., “Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem",” IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 10, 2004, pp. 1309-1311.
[WC07] Wang, Q., and Cao, Z., “Identity based proxy multi-signature,” The Journal of Systems and Software, Vol. 80, No. 7, 2007, pp. 1023-1029.
[XC04a] Xue, Q. and Cao, Z., “A threshold proxy signature scheme using self-certified public keys,” Lecture Notes in Computer Science, Vol. 3358, 2004, pp. 715-724.
[XC04b] Xue, Q. and Cao, Z., “Improvement of multi-proxy signature scheme,” Proceeding of International Symposium on Communications and Information Technologies, 2004, pp. 450-455.
[XWY07] Xie, Q., Wang, J., and Yu, X., “Improvement of nonrepudiable threshold multi-proxy threshold multi-signature scheme with shared verification,” Journal of Electronics (China), Vol. 24, No. 6, 2007, pp. 806-811.
[iT08] iThome編輯部,“研考會擬擴大全國機關採用線上文件簽核”, (http://www.ithome.com.tw/itadm/article.php
?c=50214),2008。
[王07] 王環信,“電子表單引爆企業生產力,可攜式電子產品設計”,(http://pdt.acesuppliers.com/meg/meg_1_02402361420
07178506173081_7969.html),2007。
[行03] 行政院秘書處編,“文書處理手冊”,文書處理手冊,2003。
[行04] 行政院秘書處編,“事務管理規則”,事務管理規則,2004。
[行07] 行政院研究發展考核委員會,“電子化政府96年度報告書”, 電子化政府96年度報告書,2007。
[行08] 行政院研究發展考核委員會,“公文電子化”,
(http://www5.www.gov.tw/left-to-right/elec.htm) ,2008。
[行09] 行政院研究發展考核委員會,“電子化政府推動現況與成果之國際評比” ,(http://www.rdec.gov.tw/ct.asp?xItem
=4087125&CtNode=9891&mp=100),2009。
[柯陳04] 陳瑞華,柯伶僡,“如何建置合法、可行的「線上簽核系統」-電子公文檔案管理系統”,檔案季刊,第三卷第三期, 頁62-73,2004。
[黃曾王季05] 黃金福,曾宇瑞,王敬仁,季延平,“公文線上簽核作業中資訊安全機制之研究--以行政院勞工委員會為例說明”,ERP學術與實務研討會,2005。
[黃08] 黃明仁,“電子表單系統導入之探討-以A公司為例”,國立中央大學資訊管理學系碩士學位論文,2008 年。
[劉04] 劉文龍,“電子化政府之「公文線上簽核系統」探討”, 數位生活與網際網路科技研討會,2005。
[劉05] 劉文龍,“電子公文線上簽核系統的規劃與設計”,國立中興大學資訊科學系碩士學位論文,2005。
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔