研究生: |
林喬雯 Chiao-Wen Lin |
---|---|
論文名稱: |
以樹狀結構實現資訊粗細度之廣播加密法 Broadcast Encryption Scheme Realizing Information Granularity by Tree Structure |
指導教授: |
吳宗成
Tzong-Chen Wu |
口試委員: |
許建隆
none 查士朝 Shi-Cho Cha |
學位類別: |
碩士 Master |
系所名稱: |
管理學院 - 資訊管理系 Department of Information Management |
論文出版年: | 2008 |
畢業學年度: | 96 |
語文別: | 中文 |
論文頁數: | 60 |
中文關鍵詞: | 資訊粗細度 、橢圓曲線 、廣播加密 、前推安全 、後推安全 |
外文關鍵詞: | information granularity, elliptic curve, broadcast encryption, forward secrecy, backward secrecy |
相關次數: | 點閱:415 下載:2 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
兼具使用者/數位內容分群且分級之廣播加密機制是更符合目前以顧客為導向的消費時代的應用,因此,本論文以XML資料格式為基礎,設計樹狀結構的資訊粗細度分類數,並結合分群廣播加密機制與以橢圓曲線為基礎的階級式存取控制方法,進而設計具有使用者分群與分級的廣播加密機制。本論文提出的方法具有下列的特性:(1)提供訂閱用戶的可選擇性;(2)數位內容可分群與分級動態更新管理;(3)使用者可隨時加入或離開的動態使用者管理機制;(4)金鑰更新的動態管理,可容易地更新金鑰且不會影響使用者儲存的金鑰;(5)無需設定系統使用者人數上限;(6)可以抵抗使用者金鑰共謀攻擊;(7)達到前推安全性與後推安全性;(8)達到階級權限牽制可選擇性與交談金鑰的連續性;(9)在效率上,使用者的金鑰儲存複雜度為O(1)、廣播訊息的複雜度為O(2l -1),其中,l為資訊分級的階層數,皆與系統使用者的總數無關。
The broadcast encryption scheme with user/digital content grouping and classing is applying correspondingly to this customer-oriented era. Therefore, our scheme based on XML data structure designs the number of information granularity by tree structure. It achieves grouping and classing of users by combining the grouping broadcast encryption scheme with layered-access control based on ECC :(1)achieve the selectivity of users;(2)dynamic digital content is grouping and classing management;(3)dynamic users management that users can add or leave ;(4)dynamic key management ;(5)the content provider does not need to decide an a-priori bound of the number of users;(6)resist user collusion;(7)achieve forward and backward secrecy;(8) the legal right of an user limit selectively of content and the session key is not continuity ;(9)the users’ storage achieve O(1) and the broadcast content is O(2l-1).
[AM07] I. Abbadi and C. Mitchell, “Digital Rights Management using a Mobile Phone”, International conference on Electronic Commerce’07, pp.19-22.
[AT82] S. G. Akl, and P. D. Taylor, “Cryptographic solution to a multilevel security problem”, Advances in
cryptology, pp. 237-249, 1982.
[Bek91] S. Bekovits, “How to Broadcast a Secret”, Advanced in Cryptology – Eurocrypt’91, Springer-Verlag, 1991, pp. 535-541.
[CFN94] B. Chor, A. Fiat, and M. Naor, “Tracing Traitors”, Advanced in Cryptology – CRYPTO’94, 1994, pp.257-270.
[FN93] A. Fiat and M. Naor, “Broadcast Encryption”, Advances in Cryptology – CRYPTO ’93, 1993, pp. 480-491.
[FNP07] N. Fazio, A. Nicolosi, and D. H. Phan, “Traitor Tracing with Optimal Transmission Rate”, Information Security Conference ’07, 2007, Lecture Notes in Computer Science, vol. 4779, pp.71-88.
[HS02] D. Halevy and A. Shamir, “The LSD Broadcast Encryption Scheme ”, Advances in Cryptology – CRYPTO 2002 , Lecture Notes in Computer Science, pp.47–60, 2002.
[JW06] F. G. Jen, and C. M. Wang, “An Efficient Key Management Scheme for Hierarchical Access Control based on Elliptic Curve Cryptosystem”, The Journal of Systems and Software, vol. 79, 2006, pp.1161-1167.
[Kob87] N. Koblitz, “Elliptic curve cryptosystems”, Mathematics of Computation, vol. 48, 1987, pp. 203–209.
[Kre05] G. kreitz, “Optimization of Broadcast Encryption Schemes”, Mater’s Tesis, 2005.
[LDC04] S. Liu, Z. Dong, and K. Chen, “Attack on Identity-based Broadcasting Encryption Schemes”, Lecture Notes in Computer Science, vol.769, pp.165-172.
[Mil86] V. Miller, “Uses of Elliptic Curves in Cryptography”, Advances in Cryptology – CRYPTO ’85, 1986, pp. 417–426.
[MSL03] Y. Mu, W. Susilo, and Y. X. Lin, “Identity-Based Broadcasting”, Progress in Cryptology -- INDOCRYPT 2003, pp. 177-190.
[NNL01] D. Naor, M. Naor, and J. Lotspiech. “Revocation and tracing schemes for stateless receivers”, Advances in Cryptology – CRYPTO 2001 , Lecture Notes in Computer Science, pp.41–62, 2001.
[Rai06] Y. Raivio and S. Luukkainen,“Digital Rights Management in the Mobile Environment”, Innovation in Telecommunications Proceedings of the Research Seminar on Telecommunications Business’06, pp.18-25.
[Sha79] A. Shamir, “How to Share a Secret”, Communications of ACM, Vol.22, No.11, 1979, pp. 612-613.
[SL07] Y. Sun and K. J. R. Liu, “Hierarchical Group Access Control for Secure Multicast Communications”, ACM Transactions on Networking, Vol.15, 2007, pp.1514-1526.
[YCY07] Y. Zhang, C. Yuan, and Y. Zhong, “Implementing DRM over Peer-to-Peer Networks with Broadcast Encryption”, Lecture Notes in Computer Science, vol. 4810, 2007,pp. 236–245.