研究生: |
魏儀淳 Yi-Chun Wei |
---|---|
論文名稱: |
基於自我驗證公鑰系統之App所有權移轉驗證機制 App Ownership Transfer Verification Scheme Based on Self-certified Public Key System |
指導教授: |
吳宗成
Tzong-chen Wu |
口試委員: |
楊維寧
Wei-Ning Yang 查士朝 Shi-Cho Cha |
學位類別: |
碩士 Master |
系所名稱: |
管理學院 - 資訊管理系 Department of Information Management |
論文出版年: | 2015 |
畢業學年度: | 103 |
語文別: | 中文 |
論文頁數: | 87 |
中文關鍵詞: | 行動裝置 、可移轉 、單向雜湊函數 、自我驗證密碼系統 |
外文關鍵詞: | Mobile device, transferability, One-way hash function, Self-certified cryptosystem |
相關次數: | 點閱:368 下載:1 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在2014 年,何文浩提出一套具移轉次數限制的App 應用服務可移轉性驗證機制,提供一個使用者間移轉App的機制。然而,此機制僅用於online狀態,即使用者執行移轉App時必須即時與可信賴第三方進行連線,方可驗證移轉證明的正確性與有效性。再者,何文浩的機制在offline狀態無法相互驗證彼此的身分。此外,使用者並無權力可驗證App 可移轉證明。本研究提出機制,使用者(原持有者)在進行移轉App時,能先與接收者相互驗證身分的合法性;且在無網際網路連線時,原持有者可經由短距離傳輸 (如NFC)或無線區域網路(如Wi-Fi)將移轉證明傳送給接收方,接收者可自行驗證驗證移轉證明的正確性與有效性。
In 2014, Ho Wen hao proposed Count-limit Transfer Verification Mechanism of Mobile Application Software. This mechanism provided to transfer App with user. But, this mechanism only can used in online states. Although user execute the transfer App on time and reliable third party for the connection, only can verification the transfer evidence of completely and availability. Ho et al. proposed mechanism cannot do the verification on offline mode. In addition, App user cannot verified transfer evidence. In addition, App user cannot do the verification on transfer evidence. In this study proposal a mechanism that user while doing the App transfer. This mechanism can verification the App receiver’s legality. In wireless connection, App Owner can send the transfer evidence through NFC or Wi-Fi to App receiver. App receiver can verification the transfer evidence of completely and availability.
英文部份
[1] D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” SIAM Journal on Computing, Vol. 32, 2001, Springer-Verlag, pp. 586-615.
[2] M. Girault, “Self-certified public keys,” Advances in Cryptology: Eurocrypt’ 91, Vol. 547, 1991, Springer-Verlag, pp. 490-497.
[3] W.B. Hsieh and J.S. Leu, “An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures,” The Journal of Supercomputing, Vol. 70, No. 1, 2014, Springer Science+Business, pp.133–148.
[4] H.C. Hsiang and W.K. Shih, “Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment,” Computer Standards & Interfaces, Vol. 31, No. 6, 2009, Elsevier, pp.1118-1123.
[5] B. Kemal and B. Nazife, “Improving the Security and Flexibility of One-Time Passwords by Signature Chains,” Turkish Journal of Electrical Engineering & Computer Sciences, Vol. 11, No. 3, 2003, TUBITAK, pp.223-236.
[6] B. Lee and K. Kim, “Self-certified Signatures,” Progress in Cryptology - INDOCRYPT 2002 Lecture Notes in Computer Science, Vol. 2551, 2002, Springer-Verlag, pp.199–214.
[7] Y.P. Liao and C.M. Hsiao, “A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients,” Future Generation Computer Systems, Vol. 29, No. 3, 2013, Elsevier, pp.886-900.
[8] L.H. Li, I.C. Lin and M.S. Hwang, “A remote password authentication scheme for multi-server architecture using neural networks,” IEEE Transactions Neural Networks, Vol. 12, No. 6, 2001, IEEE, pp.1498-1504.
[9] Y.P. Liao and S.S. Wang, “A secure dynamic ID based remote user authentication scheme for multi-server environment,” Computer Standards & Interfaces, Vol. 31, No. 1, 2009, Elsevier, pp.24-29.
[10] X. Li, Y. Xiong, J. Ma and W. Wang, “An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards,” Journal of Network and Computer Applications, Vol. 35, No. 2, 2012, Elsevier, pp.763-769.
[11] T. Okamoto and K. Ohta, “Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash,” Advances in Cryptology - CRYPTO '89 Lecture Notes in Computer Science, Vol. 435, 1990, Springer-Verlag, pp. 481-496.
[12] K. Osaka, Future Univ. Hakodate, T. Takagi, K. Yamazaki and O. Takahashi, “An Efficient and Secure RFID Security Method with Ownership Transfer,” Computational Intelligence and Security, Vol. 2, 2006, IEEE, pp.1090-1095.
[13] H. Petersen and P. Horster, “Self-certified keys - Concepts and Applications,” In Proc. Communications and Multimedia Security’97, 1997, IFIP, pp. 102-116.
[14] S. Saeednia, “Identity-Based and Self-Certified Key-Exchange Protocols,” Information Security and Privacy Lecture Notes in Computer Science, Vol. 1270, 1997, Springer-Verlag, pp.303-313.
[15] S. Saeednia and R. Safavi-Naini, “Efficient identity-based conference key distribution protocols,” Information Security and Privacy Lecture Notes in Computer Science, Vol. 1438, 1998, pringer-Verlag, pp.320-331.
[16] S.K. Sood, A.K. Sarje and K. Singh, “A secure dynamic identity based authentication protocol for multi-server architecture,” Journal of Network and Computer Applications, Vol. 34, No. 2, 2011, Elsevier, pp.609–618.
[17] J.L. Tsai, “Efficient multi-server authentication scheme based on one-way hash function without verification table,” Computers & Security, Vol. 27, No. 3-4, 2008, Elsevier, pp.115-121.
[18] Y.M. Tseng, T.Y. Wu and JD. Wu, “A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards,” INFORMATICA, Vol. 19, No.2, 2008, Institute of Mathematics and Informatics, pp.285-302.
[19] T.C. Wu, Y.S. Chang and T.Y. Lin, “Improvement of Saeednia's self-certified key exchange protocols,” Electronics Letters, Vol. 34, No. 11, 1998, IEEE, pp.1094-1095.
[20] H.K. Yang, J.H. Choi and Y.H. Ann, “Self-certified identity information using the minimum knowledge,” IEEE TENCON: Digital Signature Processing Applications, 1996, IEEE, pp.641-647.
中文部份
[21] 王建鋐:具次數限制的代理簽章之研究,中央大學資訊工程所碩士論文,2013年。
[22] 何文浩:具移轉次數限制之App應用服務可移轉性驗證機制,臺灣科技大學資訊管理系所碩士論文,2014年。
[23] 陳育毅:基於RFID之安全防偽保固書及所有權證明,中興大學管理學院,2013年。
[24] 資策會FIND: 2014年上半年消費者行為調查出爐,資策會創研所,2014年。
http://www.iii.org.tw/service/3_1_1_c.aspx?id=1367
[25] 驚!每人每日有1/8醒著的時間都在使用APP!,資策會創研所,2014年。
http://www.iii.org.tw/service/3_1_1_c.aspx?id=1476
[26] 2014年全球行動寬頻用戶預估達23億戶,財團法人國家實驗研究院科技政策研究與資訊中心資訊服務處科技產業資訊室,2014年。
http://iknow.stpi.narl.org.tw/post/Read.aspx?PostID=9646