簡易檢索 / 詳目顯示

研究生: 魏儀淳
Yi-Chun Wei
論文名稱: 基於自我驗證公鑰系統之App所有權移轉驗證機制
App Ownership Transfer Verification Scheme Based on Self-certified Public Key System
指導教授: 吳宗成
Tzong-chen Wu
口試委員: 楊維寧
Wei-Ning Yang
查士朝
Shi-Cho Cha
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2015
畢業學年度: 103
語文別: 中文
論文頁數: 87
中文關鍵詞: 行動裝置可移轉單向雜湊函數自我驗證密碼系統
外文關鍵詞: Mobile device, transferability, One-way hash function, Self-certified cryptosystem
相關次數: 點閱:368下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在2014 年,何文浩提出一套具移轉次數限制的App 應用服務可移轉性驗證機制,提供一個使用者間移轉App的機制。然而,此機制僅用於online狀態,即使用者執行移轉App時必須即時與可信賴第三方進行連線,方可驗證移轉證明的正確性與有效性。再者,何文浩的機制在offline狀態無法相互驗證彼此的身分。此外,使用者並無權力可驗證App 可移轉證明。本研究提出機制,使用者(原持有者)在進行移轉App時,能先與接收者相互驗證身分的合法性;且在無網際網路連線時,原持有者可經由短距離傳輸 (如NFC)或無線區域網路(如Wi-Fi)將移轉證明傳送給接收方,接收者可自行驗證驗證移轉證明的正確性與有效性。


    In 2014, Ho Wen hao proposed Count-limit Transfer Verification Mechanism of Mobile Application Software. This mechanism provided to transfer App with user. But, this mechanism only can used in online states. Although user execute the transfer App on time and reliable third party for the connection, only can verification the transfer evidence of completely and availability. Ho et al. proposed mechanism cannot do the verification on offline mode. In addition, App user cannot verified transfer evidence. In addition, App user cannot do the verification on transfer evidence. In this study proposal a mechanism that user while doing the App transfer. This mechanism can verification the App receiver’s legality. In wireless connection, App Owner can send the transfer evidence through NFC or Wi-Fi to App receiver. App receiver can verification the transfer evidence of completely and availability.

    中文摘要 II Abstract III 誌 謝 IV 目 錄 VIII 圖表目錄 IX 第一章 緒論 1 1.1研究背景與動機 3 1.2研究目的 6 1.3論文架構 8 第二章 文獻探討 9 2.1移轉機制探討 9 2.1.1一個有效與安全的RFID安全方法與所有權移轉 9 2.1.2基於RFID之安全防偽保固書及所有權證明 10 2.2次數限制 11 2.2.1具次數限制的代理簽章 11 2.2.2具移轉次數限制之App應用服務可移轉性驗證機制 12 2.3自我驗證機制 18 2.3.1Giraul之自我驗證公開金鑰 18 2.3.2 Lee等人之自我驗證簽章機制 19 2.4 雙線性配對Bilinear pairing 20 2.5基於Bilinear pairing之自我驗證機制 22 2.5.1行動用戶使用自我驗證公開金鑰一般多伺服器遠端使用者身分鑑別機制 22 第三章 本研究所提出之方法 28 3.1系統角色與架構 30 3.2 App所有權移轉驗證機制階段說明 33 第四章 安全與效率分析 59 4.1安全分析 59 4.2效率分析 63 第五章 結論與未來研究方向 71 5.1結論 71 5.2未來研究方向 72 參考文獻 73 附錄A重要名詞中英對照表 77

    英文部份
    [1] D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” SIAM Journal on Computing, Vol. 32, 2001, Springer-Verlag, pp. 586-615.
    [2] M. Girault, “Self-certified public keys,” Advances in Cryptology: Eurocrypt’ 91, Vol. 547, 1991, Springer-Verlag, pp. 490-497.
    [3] W.B. Hsieh and J.S. Leu, “An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures,” The Journal of Supercomputing, Vol. 70, No. 1, 2014, Springer Science+Business, pp.133–148.
    [4] H.C. Hsiang and W.K. Shih, “Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment,” Computer Standards & Interfaces, Vol. 31, No. 6, 2009, Elsevier, pp.1118-1123.
    [5] B. Kemal and B. Nazife, “Improving the Security and Flexibility of One-Time Passwords by Signature Chains,” Turkish Journal of Electrical Engineering & Computer Sciences, Vol. 11, No. 3, 2003, TUBITAK, pp.223-236.
    [6] B. Lee and K. Kim, “Self-certified Signatures,” Progress in Cryptology - INDOCRYPT 2002 Lecture Notes in Computer Science, Vol. 2551, 2002, Springer-Verlag, pp.199–214.
    [7] Y.P. Liao and C.M. Hsiao, “A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients,” Future Generation Computer Systems, Vol. 29, No. 3, 2013, Elsevier, pp.886-900.
    [8] L.H. Li, I.C. Lin and M.S. Hwang, “A remote password authentication scheme for multi-server architecture using neural networks,” IEEE Transactions Neural Networks, Vol. 12, No. 6, 2001, IEEE, pp.1498-1504.
    [9] Y.P. Liao and S.S. Wang, “A secure dynamic ID based remote user authentication scheme for multi-server environment,” Computer Standards & Interfaces, Vol. 31, No. 1, 2009, Elsevier, pp.24-29.
    [10] X. Li, Y. Xiong, J. Ma and W. Wang, “An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards,” Journal of Network and Computer Applications, Vol. 35, No. 2, 2012, Elsevier, pp.763-769.
    [11] T. Okamoto and K. Ohta, “Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash,” Advances in Cryptology - CRYPTO '89 Lecture Notes in Computer Science, Vol. 435, 1990, Springer-Verlag, pp. 481-496.
    [12] K. Osaka, Future Univ. Hakodate, T. Takagi, K. Yamazaki and O. Takahashi, “An Efficient and Secure RFID Security Method with Ownership Transfer,” Computational Intelligence and Security, Vol. 2, 2006, IEEE, pp.1090-1095.
    [13] H. Petersen and P. Horster, “Self-certified keys - Concepts and Applications,” In Proc. Communications and Multimedia Security’97, 1997, IFIP, pp. 102-116.
    [14] S. Saeednia, “Identity-Based and Self-Certified Key-Exchange Protocols,” Information Security and Privacy Lecture Notes in Computer Science, Vol. 1270, 1997, Springer-Verlag, pp.303-313.
    [15] S. Saeednia and R. Safavi-Naini, “Efficient identity-based conference key distribution protocols,” Information Security and Privacy Lecture Notes in Computer Science, Vol. 1438, 1998, pringer-Verlag, pp.320-331.
    [16] S.K. Sood, A.K. Sarje and K. Singh, “A secure dynamic identity based authentication protocol for multi-server architecture,” Journal of Network and Computer Applications, Vol. 34, No. 2, 2011, Elsevier, pp.609–618.
    [17] J.L. Tsai, “Efficient multi-server authentication scheme based on one-way hash function without verification table,” Computers & Security, Vol. 27, No. 3-4, 2008, Elsevier, pp.115-121.
    [18] Y.M. Tseng, T.Y. Wu and JD. Wu, “A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards,” INFORMATICA, Vol. 19, No.2, 2008, Institute of Mathematics and Informatics, pp.285-302.
    [19] T.C. Wu, Y.S. Chang and T.Y. Lin, “Improvement of Saeednia's self-certified key exchange protocols,” Electronics Letters, Vol. 34, No. 11, 1998, IEEE, pp.1094-1095.
    [20] H.K. Yang, J.H. Choi and Y.H. Ann, “Self-certified identity information using the minimum knowledge,” IEEE TENCON: Digital Signature Processing Applications, 1996, IEEE, pp.641-647. 

    中文部份
    [21] 王建鋐:具次數限制的代理簽章之研究,中央大學資訊工程所碩士論文,2013年。
    [22] 何文浩:具移轉次數限制之App應用服務可移轉性驗證機制,臺灣科技大學資訊管理系所碩士論文,2014年。
    [23] 陳育毅:基於RFID之安全防偽保固書及所有權證明,中興大學管理學院,2013年。
    [24] 資策會FIND: 2014年上半年消費者行為調查出爐,資策會創研所,2014年。
    http://www.iii.org.tw/service/3_1_1_c.aspx?id=1367
    [25] 驚!每人每日有1/8醒著的時間都在使用APP!,資策會創研所,2014年。
    http://www.iii.org.tw/service/3_1_1_c.aspx?id=1476
    [26] 2014年全球行動寬頻用戶預估達23億戶,財團法人國家實驗研究院科技政策研究與資訊中心資訊服務處科技產業資訊室,2014年。
    http://iknow.stpi.narl.org.tw/post/Read.aspx?PostID=9646

    無法下載圖示 全文公開日期 2020/07/21 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE