(18.204.227.34) 您好!臺灣時間:2021/05/17 05:27
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:林筠庭
研究生(外文):Lin, Yunting
論文名稱:A Secure and Anonymous Protocol for Online Reporting System
論文名稱(外文):A Secure and Anonymous Protocol for Online Reporting System
指導教授:古政元古政元引用關係
指導教授(外文):Ku, Cooper
口試委員:洪為璽施東河
口試委員(外文):Hung, Wei-HsiShih, Dong-Her
口試日期:2011/7/25
學位類別:碩士
校院名稱:國立中正大學
系所名稱:資訊管理學系暨研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:英文
論文頁數:49
中文關鍵詞:線上報案系統公開金鑰加密系統數位簽章部份盲簽章雙重簽章匿名性通道雙重第三方匿名性安全性
外文關鍵詞:Online reporting systempublic key cryptosystemdigital signature schemepartially blind signature schemedual signatureanonymous channels schememulti-authorityanonymoussecurity
相關次數:
  • 被引用被引用:1
  • 點閱點閱:187
  • 評分評分:
  • 下載下載:2
  • 收藏至我的研究室書目清單書目收藏:0
在現今社會中,政府及一些單位紛紛跟上網際網路的趨勢推出線上的報案系統,例如環境保護局下的烏賊車檢舉系統,只要在頁面上輸入相關的資料與提出檢舉照片,環境保護局就會著手處理;若確定檢舉成立,檢舉者也能得到獎金或其他報酬。不過這樣一個看似便利的系統,事實上會引發許多相關的議題。首先,此系統仍無法完全保障檢舉者的匿名性,日前也有新聞報導被檢舉者身心不滿去報復檢舉者;第二,此線上系統無法及實驗證檢舉者的身分;再者,此線上系統無法達到檢舉者的不可否認性;最後,無法避免接到過多謊報的訊息。針對這些問題,我們提出了一個能保障安全性與匿名性的機制。透過公開金鑰系統、部份盲簽章的特性,來保障檢舉者的隱私,也能達到驗證身份的目的;並且利用multi-authority的架構,讓檢舉者能安心檢舉,不必怕再被洩漏身份;更重要的是,在領取獎金方面也不需要像以往一樣,親自到機構出示證明。
There are more and more online reporting systems recently. For example, the system of reporting the excessive amount of exhaust which can regulate misconducts set up by Department of Environmental Protection. Though the system seems like very convenient, there are some hiding problems like anonymity, verifiability, non-repudiation, and lying problem. Here we propose a protocol that is secure and anonymous. Separating a reporter’s personal information, we could let the reporter report anonymously and safely. Even if one of the institutions where stores the reporter’s information is being attacked, the attacker could only get part of the information. And during the whole process, the reporter could report the illegality without revealing one’s identity. This proposed scheme can not only protect the reporter’s privacy well but also help the institution and the reporter to reduce the cost and the human resource.
1. Introduction 7
1.1 Background 7
1.2 Motivations 7
1.3 Problems and Objectives 8
1.4 Contributions 11
2. Related Works 13
2.1 Digital Signature Scheme 13
2.2 Public Key Cryptosystem 14
2.3 Partially Blind Signature Scheme 15
2.4 Dual Signature 18
2.5 Anonymous Channels Scheme 21
3. The Proposed Scheme 24
3.1 Reporter Requests a Certificate 27
3.2 Reporter Accuses the Illegality 29
3.3 Report System Reports the Malicious Reporter 32
3.4 Report Center Notifies Transforming of the Reward 33
4. Analysis 35
4.1 Comparisons 35
4.2 Efficiency Analysis 36
4.3 Security Analysis 40
5. Conclusion 43
References 46

[1] J. Ren and J. Wu, “Survey on anonymous communications in computer networks,” Computer Communications, vol. 33, pp. 420–431, 2010.
[2] B. Hosp and P. L. Vora, “An information-theoretic model of voting systems,” Mathematical and Computer Modelling, vol. 48, pp. 1628–1645, 2008.
[3] B. Lee, K. Kim, and J. Ma, “Efficient Public Auction with One-Time Registration and Public Verifiability,” In Proceedings of INDOCRYPT, pp. 162-174, 2001.
[4] C. I. Pinzón, J. F. D. Paz, M. Navarro, J. Bajo, V. Julián, and Juan. M. Corchado, “Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks,” Applied Soft Computing, vol. 11, pp. 4384–4398, 2011.
[5] C. I. Fan, S. Y. Huang, P. H. Ho, and C. L. Lei, “Fair anonymous rewarding based on electronic cash,” The Journal of Systems and Software, vol. 82, no. 7, pp. 1168-1176, July 2009.
[6] C. L. Chen and J.J. Liao, ”A fair online payment system for digital content via subliminal channel,” Electronic Communication Research and Applications, article in press, Sep. 2010.
[7] R. J. Hwang, S. H. Shiau, and D. F. Jan,” A new mobile payment scheme for roaming services,” Electronic Communication Research and Applications, vol. 6, no. 2, pp. 184-191, Sep. 2007.
[8] C. Y. Ku, C. J. Tsao, Y. H. Lin, and C. Y. Chen, “An escrow electronic cash system with limited traceability,” Information Science, vol. 164, pp. 17-30, 2004.
[9] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
[10] W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
[11] S. J. Lin and D. C. Liu, “An incentive-based electronic payment scheme for digital content transactions over the Internet,” Journal of Network and Computer Applications, vol. 32, no. 3, pp. 589-598, May 2009.
[12] W. S. Juang and H. T. Liaw, “A practical anonymous multi-authority e-cash scheme,” Applied Mathematics and Computation, vol. 147, no. 3, pp. 699-711, Jan. 2004.
[13] V. Varadharajan, K. Q. Nguyen, and Y. Mu, “On the design of efficient RSA-based off-line electronic cash schemes,” Theoretical Computer Science, vol. 226, no. 1-2, pp. 173-184, Sep. 1999.
[14] N. T. Ferguson, “Single term off-line coins,” Lecture Notes in Computer Science 765, pp. 318-328, Sep. 1994.
[15] C. L. Chen and M. H. Liu, “A traceable E-cash transfer system against blackmail via subliminal channel”, Electronic Communication Research and Applications, vol. 8, no. 6, pp. 327-333, Nov.-Dec. 2009.
[16] P. Lin, H. Y Chen, Y. Fang, J. Y. Jeng, and F. S. Lu, “A secure mobile electronic payment architecture platform for wireless mobile networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 7, pp. 2705-2713, July 2008.
[17] D. Chaum, “Blind signatures for untraceable payments,” Advances in Cryptology, CRYPTO ’88, vol. 1440, pp. 199-203, 1998.
[18] C. I. Fan and C. L. Lei, “A user efficient fair blind signature scheme for untraceable electronic cash,” Journal of Information Science and Engineering, vol. 18, no. 1, pp. 47-58, 2002.
[19] C. I. Fan and W. Z. Sun, “An efficient multi-receipt mechanism for uncoercible anonymous electronic voting,” Mathematical and Computer Modelling, vol. 48, pp. 1611-1627, 2008.
[20] C. C. Chang and Y. P. Lai, “A flexible date-attachment scheme on e-cash,” Computers and Security, vol. 22, no. 2, pp. 160-166, 2003.
[21] C. I. Fan and C. L. Lei, “Low-Computation Partially Blind Signatures for Electronic Cash,” IEICE Transactions on Fundamentals Electronics, vol. E81-A, no. 5, pp. 818-824, May 1998.
[22] C. I Fan and C. L. Lei, “Cryptanalysis on improved user efficient blind signature,” Electronic Letters, vol. 37, no. 10, May 2001.
[23] C. I Fan and C. L. Lei, “Efficient blind signature scheme based on quadratic residues,” Electronic Letters, vol. 32, no. 9, Apr. 1996.
[24] W. Stallings, Cryptography and Network Security: Principle and practice, Fourth edition, 2006.
[25] Wikipedia, “Secure Electronic Transaction,” http://en.wikipedia.org/wiki/Secure_Electronic_Transaction, 2010.
[26] D. L. Chaum, “Untraceable electronic mail, return address, and digital pseudonyms,” Communications of the ACM, vol. 24, no. 2, Feb. 1981.
[27] C. Gülcü and G. Tsudik, “Mixing e-mail with BABEL,” in Proc. Network and Distributed System Security, pp. 2-16, 1996.
[28] I. Clarke, T. W. Hong, and O. Sandberg, “Protecting free expression online with freenet,” IEEE Internet Computing, vol. 6, no. 1, pp. 40-49, 2002.
[29] J. H. Wang, J. W. Liu, X. H. Li, and W. D. Kou, “Fair e-payment protocol based on blind signature”, The Journal of China Universities of Posts and Telecommunications, vol. 16, no. 5, pp. 114–118, Oct. 2009.
[30] S. Y. Hwang, H. A. Wen, and T. Hwang, “On the security enhancement for anonymous secure e-voting over computer network,” Computer Standards & Interfaces, vol. 27, pp. 163–168, 2005.
[31] C. Satizábal, R. Martinez-Peláez, F. J. Rico-Novella, and J. Forné, “Reducing the computation cost of the authentication process in SET protocol,” Ingenieria & Desarrollo, no. 27, pp. 1-24, 2010.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊