簡易檢索 / 詳目顯示

研究生: 黃民均
Min-chun Huang
論文名稱: 適用於行動系統之隨選視訊公平計費系統
A Fair Billing System for Video on Demand in Mobile System
指導教授: 吳宗成
Tzong-chen Wu
陳正綱
Cheng-kang Chen
口試委員: 洪政煌
Cheng-huang Huang
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2012
畢業學年度: 100
語文別: 中文
論文頁數: 71
中文關鍵詞: 自我驗證公開金鑰系統匿名鑑別重複計費橢圓曲線隨選視訊公平計費不可否認變色龍雜湊函數前推安全後推安全
外文關鍵詞: anonymous authentication, forward secrecy, double-billing, elliptic curve, undeniable, VOD, self-certified public keys system, fair billing, chameleon hash function, backward secrecy
相關次數: 點閱:534下載:5
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著通訊技術與行動設備的不斷發展,通訊業者提供隨選視訊(Video on Demand,簡稱VOD)的服務更不受時間或空間的限制,使訂閱戶可以隨時隨地按自己喜愛存取影片服務,並可依消費習慣選擇月租制或計次制(Pay Per View,簡稱PPV)付費方式。然而,目前PPV計費系統,只能針對非即時性的視訊服務,在現今重視即時性與強調多元化服務的VOD系統中,提供一個適用於即時性與可計時的計費系統亦是重要研究課題之一。本研究利用基於橢圓曲線(elliptic curve)之自我驗證公開金鑰密碼系統(self-certified public key system)與變色龍雜湊函數鏈(chameleon hash chain),設計一個適用於隨選視訊之安全且公平(fairness)的計費系統,並同時適用於即時與非即時之計次制付費的視訊服務系統中,內容提供者可由訂閱戶存取內容時間的長短提供其內容範圍並計算費用。本論文所提出的方法可達到不可否認性(undeniable)、不可偽冒性(non-forgeable)、匿名鑑別(anonymous authentication)、公平計費(fair billing)、預防重複計費(double-billing)、預防他人竊取服務、前推安全(forward secrecy)及後推安全(backward secrecy)。當發生計費糾紛時,本論文提出的方法亦可以證明費用的正確性,以確保計費的公平性。


    Video on demand (VOD) service is more unlimited by time and place than before as the continuously development of communication technology and mobile devices. It makes subscribers to access video service in any time and any where. And they can choose payment method from pay per month or pay per view (PPV) according to consumption habit. However, PPV billing system only support for non-real-time video services. VOD system emphasis on immediacy and diversified services nowadays, therefore, to provide a billing system suitable for real-time and time countable is also one of the important research topic. This study use self-certified public key system based on elliptic curve and chameleon hash function chain to design a billing system suitable for security and fair, and applies to both the real-time and non-real-time PPV payment video services system. Content providers can provide subscribers the scope of its content by the length of accessing time and calculate the costs. The method proposed in this study can achieve undeniable, non-forgeable, anonymous authentication, fair billing, double-billing prevention, theft of service, forward secrecy and backward secrecy. When billing dispute occurs, the method in this study can also prove the charging accuracy to ensure fairness of billing.

    中文摘要 IV Abstract V 誌謝 VI 目錄 VII 圖目錄 IX 表目錄 X 第一章 緒論 1 1.1研究背景與動機 3 1.2研究目的 9 1.3論文架構 11 第二章 文獻探討 13 2.1現有隨選視訊環境探討 13 2.2計費機制探討 14 2.3密碼學相關理論 18 2.3.1橢圓曲線密碼系統 18 2.3.2自我驗證公開金鑰 21 2.3.3單向雜湊函數鏈 26 2.3.4變色龍雜湊函數鏈 28 第三章 本研究所提出之方法 31 3.1系統角色與架構 32 3.2符號定義 34 3.3系統建置階段 36 3.4系統流程圖 41 3.5訂閱階段 42 3.6計費階段 49 3.7仲裁處理階段 53 第四章 安全與效率分析 56 4.1安全分析 56 4.2效率分析 60 第五章 結論與未來研究方向 63 參考文獻 65 附錄A 重要名詞中英文對照表 70

    [ASW97] N. Asokan, M. Schunter and M. Waidner, "Optimistic protocols for fair exchange," Proceeding of the 4th ACM conference on Computer and communications security-CCS '97, pp. 7-17, Zurich, Switzerland, 1997.
    [AFI06] N. Attrapadung, J. Furukawa and H. Imai, "Forward-secure and searchable broadcast encryption with short ciphertexts and private keys," Proceeding of the 12th International Conference on the Theory and Application of Cryptology and Information Security–ASIACRYPT 2006, Vol. 4284, pp. 161-177, 2006.
    [AI05] N. Attrapadung and H. Imai, "Graph-decomposition-based frameworks for subset-cover broadcast encryption and efficient instantiations," Proceeding of the 11th international conference on Theory and Application of Cryptology and Information Security-ASIACRYPT'05, Vol. 3788, pp. 100-120, Chennai, India, 2005.
    [Ber91] S. Berkovits, "How to broadcast a secret," Proceeding of the Workshop on the Theory and Application of of Cryptographic Techniques-EUROCRYPT ’91, Vol. 547, pp. 535-541, Brighton, UK, 1991.
    [BP90] H. Burk and A. Pfitzmann, "Value exchange systems enabling security and unobservability," Computers & Security, Vol. 9, No. 8, pp. 715-721, 1990.
    [CWH00] Y.S. Chang, T.C. Wu, and S.C. Huang, “ElGamal-like digital signature and multisignature schemes using self-certified public keys,” The Journal of System and Software, pp. 99-105, 2000.
    [CZTW08] X. Chen, F. Zhang, H. Tian, B. Wei, W. Susilo, Y. Mu, H. Lee, K. Kim, “Efficient generic on-line/off-line (threshold) signatures without key exposure,” Information Sciences, Vol. 178, No. 21, pp. 4192-4203, 2008.
    [Dor12] J.Doran, "Telco TV goes far beyond IP," Retrieved May 14, 2012, from the World Wide Web:
    http://ovum.com/2012/01/17/telco-tv-goes-far-beyond-ip/, 2012.
    [FN94] A. Fiat and M. Naor, "Broadcast encryption," Proceeding of the 13th Annual International Cryptology Conference-CRYPTO '93, Vol. 773, pp. 480-491, Santa Barbara, California, USA, 1994.
    [FR97] M. K. Franklin and M. K. Reiter, "Fair exchange with a semi-trusted third party," Proceeding of the 4th ACM conference on Computer and communications security-CCS '97, pp. 1-5, Zurich, Switzerland, 1997.
    [GW09] C. Gentry and B. Waters, "Adaptive security in broadcast encryption systems," Proceeding of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques-EUROCRYPT 2009, Vol. 5479, pp. 171-188, Cologne, German, 2009.
    [Gir91] M. Girault, "Self-certified public keys," Proceeding of the Workshop on the Theory and Application of of Cryptographic Techniques-EUROCRYPT ’91, Vol. 547, pp. 490-497, Brighton, UK, 1991.
    [HL04] S. J. Hwang, and Y. H. Lee, “Repairing ElGamal-like multi-signature schemes using self-certified public keys,” Applied Mathematics and Computation, Vol. 156, No. 1, pp. 73-83, 2004.
    [Joo03] H. Joo, "Private and fair pay-per-view scheme for Web-based video-on-demand systems," IEEE Transactions on Consumer Electronics, Vol. 49, No. 2, pp. 403-407, 2003.
    [Kob87] N. Koblitz, "Elliptic curve cryptosystems," Mathematics of computation, Vol. 48, No. 177, pp. 203-209, 1987.
    [KR00] H. Krawczyk and T. Rabin, “Chameleon signatures”, Proceeding of the Symposium on Network and Distributed Systems Security-NDSS2000, pp.143-154, 2000.
    [Lam81] L. Lamport, "Password authentication with insecure communication," Advanced computing news from Communications of the ACM, Vol. 24, No. 11, pp. 770-772, 1981.
    [Lee00] N. Y. Lee, "Fairness and privacy on pay-per view system for Web-based video service," IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, pp. 980-985, 2000.
    [Mil86] V. Miller, "Use of elliptic curves in cryptography," Proceeding of the 5nd Annual International Cryptology Conference-CRYPTO '85, Vol. 218, pp. 417-426, Santa Barbara, California, USA, 1986.
    [PMDP06] R. D. Pietro, L. V. Mancini, A. Durante and V. Patil, "Addressing the shortcomings of one-way chains," Proceeding of the 13th ACM conference on Computer and communications security-CCS 2006, pp. 289-296, Alexandria, VA, USA, 2006.
    [Sha84] A. Shamir, "Identity-Based Cryptosystems and Signature Schemes", Proceeding of the 4th Annual International Cryptology Conference-CRYPTO '84, pp.47-53, 1984.
    [SL95] T. W. Sandholm and V. R. Lesser, "Equilibrium analysis of the possibilities of unenforced exchange in multiagent systems," Proceeding of the Fourteenth International Joint Conference on Artificial Intelligence-IJCAI '95, Vol. 14, pp. 694-703, Montreal, Quebec, Canada, 1995.
    [ST01] A. Shamir and Y. Tauman, “Improved online / offline signature schemes”, Proceeding of the 21th Annual International Cryptology Conference-CRYPTO2001, Vol. 2139, pp. 355-367, 2001.
    [Tsa05] W.J. Tsaur, “Several security schemes constructed using ECC-based self-certified public key cryptosystems,” Applied Mathematics and Computation, Vol. 168, Issue 1, pp. 447-464, 2005.
    [Wu01] T.C. Wu, “Digital signature/multisignature schemes giving public key verification and message recovery simultaneously,” Computer Systems Science and Engineering, 2001.
    [WC98] T.C. Wu, Y.S. Chang and T.Y. Lin, “Improvement of saeednia’s self-certified key exchange protocols,” IEE Electronic Letters,Vol 34, No 11, pp. 1094-1095, 1998.
    [WWLL09] X. Wang, X. Wen, C. Liang, Y. Liu and X. Lin, "Fair Security Protocols with off-line TTP," Proceeding of the 2009 International Symposium on Intelligent Ubiquitous Computing and Education-IUCE 2009, pp. 109-112, 2009.
    [ZG96] J. Zhou and D. Gollman, "A fair non-repudiation protocol," Proceeding of the IEEE CS Symposium on Security and Privacy-S&P '96, pp. 55-61, Oakland, California, USA, 1996..
    [ZL99] J. Zhou and K. Lam, "A secure pay-per-view scheme for web-based video service," Proceeding of the Second International Workshop on Practice and Theory in Public Key Cryptography-PKC '99, Vol. 1560, pp. 66-67, Kamakura, Japan, 1999.

    QR CODE