透過您的圖書館登入
IP:3.141.197.212
  • 學位論文

有憑證的信賴鏈鑰匙交換方法植基於雙線性配對

Certificate-based Trusted-linkage Key Exchange based on the Bilinear Pairing

指導教授 : 詹昭文

摘要


在本論文中, 主要探討一個資訊安全於可憑證的鑰匙之研究. 現今相互傳送訊息已普遍的應用於公開網路中, 而在傳送時為了保護訊息之機密性, 因此必需對訊息加密. 然而在訊息傳遞時能運用可驗證之有憑證的鑰匙加密, 達到保護訊息安全性之目地. 首先, 本論文提出一個鑰匙管理植基於匿名的方法. 利用Diffie-Hellman的方法將秘密資訊事先相互分享, 於傳送訊息時會利用先前分享的秘密資訊產生一把通訊的鑰匙, 然而這把鑰匙是藉由秘密資訊的切割與合成所產生. 本技術使得傳送雙方可達到鑰匙之驗證及匿名. 本論文提出在雙線性配對之環境下設計一個有憑證的鑰匙方法. 雙線性配對提供了方便及安全的計算環境, 在此也利用Diffie-Hellman方法設計一個由信任第三方發佈之憑證. 基於信任此第三方的使用者能取得第三方所發佈之憑證, 且使用者能計算出此憑證之公開鑰匙, 並建立起彼此的信賴鏈. 若其他使用者想傳遞訊息給對方時, 可利用對方的憑證與公開鑰匙及本身的憑證與秘密資訊達到驗證對方之正確性. 本技術提供鑰匙可鑑別性及保護訊息的安全性. 最後本研究也提出相關的安全性分析.

並列摘要


In this thesis, a study of information security techniques by applying certificated-based key is proposed. Nowadays, messages are sent with each other in a public communication channel widely. In exchangeability messages, to encrypt messages are necessary by using a certified-based key can be authenticated for keeping the messages secret. Thus, the certified-based key achieves messages security. First, a key agreement based anonymity scheme is proposed. By using Diffie-Hellman technique to share secrets before exchanging messages with each other. The secrets can be generated a session key from information composition or decomposition. The proposed scheme can effectively improve key authentication and anonymity. This thesis proposed a certificated-based public-key scheme based on bilinear pairing which is provided a convenient and secure computation environment. A protocol-specified trusted third party publishes a certificate by applying Diffie-Hellman. A user applies for a certificate based on the trusted third and the user can compute a public key of the certificate. Therefore, the third party can establish a trusted linkage with the user. When, the one of users wants to send a message with each other, he can authenticate key accuracy by using the certificate and public key from the other user and himself, respectively. The proposed scheme can achieve key authentication. Finally, this thesis proposes the security of each proposed schemes.

參考文獻


authentication scheme with smart cards. In Proceedings of the 7th World
phy. Lecture Notes in Computer Science, 2984/2003:452–473, 2003.
[2] T.-H. Chen, Y.-C. Chen, W.-K. Shih, and H.-W. Wei. An efficient anony-
mous authentication protocol for mobile pay-tv. Journal of Network and
[3] W. Diffie and M. E. Hellman. New directions in cryptography. IEEE

延伸閱讀