簡易檢索 / 詳目顯示

研究生: 李濬志
Chun-Chih Li
論文名稱: 應用於低資源裝置之群體金鑰交換
Authenticated Group Key Exchange for Low-Resource Devices
指導教授: 吳宗成
Tzong-Chen Wu
口試委員: 羅乃維
Nai-Wei Lo
查士朝
Shi-Cho Cha
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2017
畢業學年度: 105
語文別: 中文
論文頁數: 45
中文關鍵詞: 低資源裝置鑑別式金鑰交換群體通訊個體鑑別
外文關鍵詞: Low-resource devices, Authenticated Key Exchange
相關次數: 點閱:169下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

網路通訊的發展下,物聯網裝置的應用逐漸增加,尤其物聯網 應用中,大多為低資源裝置所組成,使得如何建立低資源裝置下的 安全群體通訊成為重要的議題。在低資源裝置的群體通訊下,由於 裝置資源受限,不適合基於離散對數特性等方法來進行鑑別與金 鑰交換,且? 個裝置間使用傳統的 個體對個體鑑別與金鑰交換協 定,需要O(n^2) 的時間。因此本論文提出一個適用於低資源裝置的 鑑別式群體金鑰交換機制,利用向量外積運算、邏輯運算、算術運 算即可完成鑑別式群體金鑰交換,滿足身分鑑別性與訊息秘密性。 同時基於二元樹的特性,降低鑑別與金鑰交換之時間至O(log n)。 考慮群體的動態性,亦提出節點加入或離開的群體金鑰更新階段, 滿足金鑰前推安全性和後推安全性。


With the advances in network communication, the application for Internet-connected devices increases gradually. Most connected devices in IoT are low-resource, so it becomes an important research topic in cryptography for secure group communications between low-resource devices nowadays. In a group communication for low-resource devices, authentication protocols with key exchange based on discrete algorithm are not suitable for low-resource devices due to computation limitation and require O(n^2) completion time for n devices. In this paper, we propose a computation-efficient authenticated group key exchange for low-resource devices. It only needs cross product operation, simple logic operations and arithmetic operations in implementation and reduces the completion time for n devices to O(log n). The proposed scheme satisfies some properties, such as identity authenticity, message confidentiality. When a device joins/leaves, the group key needs to be changed. The proposed key-updating method satisfies forward and backward secrecy.

摘要 I Abstract II 誌謝 III 目錄 IV 表目錄 V 圖目錄 VI 第一章 緒論 1 1.1 研究動機與背景 2 1.2 研究目的 5 1.3 論文架構 7 第二章 文獻探討 8 2.1 有限場下的外積運算 8 2.2 鑑別式金鑰交換 14 第三章 本研究提出方法 17 3.1 系統角色 19 3.2 系統參數與符號定義 20 3.3 系統設置階段 21 3.4 節點註冊階段 21 3.5 群體金鑰分配階段 24 3.6 群體金鑰更新階段 29 第四章 安全與效能分析 36 4.1 安全分析 36 4.2 效率分析 38 第五章 結論及未來研究方向 41 5.1 結論 41 5.2 未來研究方向 42 參考文獻 43

[1] Diffie, W. and Hellman, M.E., “New Directions in cryptography,” IEEE Trans. On Information Theory, Vol. IT-22, No. 6, pp. 644-654, 1976

[2] Mihir Bellare and Phillip Rogaway, “Entity Authentication and Key Distribution,” Advances in Cryptology Crypto '93 Proceedings, 1993

[3] Kevin Ashton, “That ‘Inernet of Things’ Thing,” RFID Journal, 2009

[4] Ingemarsson, Donald T. Tang and C. K. Wong, “A Conference Key Distribution System,” IEEE Trans. On Information Theory, Vol. IT-28, No. 5, pp. 714-760, 1982

[5] Michael Steiner, Gene Tsudik and Michael Waidner, “Diffie-Hellman Key Distribution Extended to Group Communication,” Proceeding CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security, pp. 31-37, 1996

[6] Giuseppe Ateniese, Michael Steiner and Gene Tsudik, “Authenticated Group Key Agreement and Friends,” Proceedings of the ACM Conference on Computer and Communications Security, pp. 17-26, 1998

[7] Yuh-Shihng Chang and Tzong-Chen Wu, “Group-oriented authentication mechanism with key exchange,” Computer Communications, Vol. 21, No. 5, pp.485-497, 1997

[8] Tzong-Chen Wu, Thsia-Tzu Huang, Chien-Lung Hsu, Kuo-Yu Tsai, “Recursive protocol for group-oriented authentication with key distribution,” Journal of Systems and Software, Vol. 81, No. 7, pp. 1227-1239, 2008

[9] Lein Harn and Changlu Lin, “Authenticated Group Key Transfer Protocol Based on Secret Sharing,” IEEE Transactions on Computers, Vol. 59, No. 6, pp. 842-846, 2010

[10] Lein Harn, “Group Authentication,” IEEE Transactions on Computers, Vol. 62, No. 9, pp. 1893-1898, 2013

[11] G. Usha Devi, E. Vishnu Balan, M. K. Priyan and C. Gokulnath, “Mutual Authentication Scheme for IoT Application,” Indian Journal of Science and Technology, Vol. 8, 2015

[12] Collins Mtita, Maryline Laurent and Pascal Daragon, “Serverless Lightweight Mutual Authentication Protocol for small mobile Computing Devices,” New Technologies, 7th International Conference on Mobility and Security, 2015

[13] Namje Park, Marie Kim and Hyo-Chan Bang, “Symmetric Key-Based Authentication and the Session Key Agreement Scheme in IoT Environment,” Springer, Berlin, Heidelberg, Vol. 330, 2015

[14] Ching-Fang Hsu, Lein Harn, Yi Mu ,Maoyuan Zhang and Xuan Zhu, “Computation-efficient key establishment in wireless group communications,” Springer Science+Business Media New York 2016, Vol. 23, No. 1, pp. 289-297, 2016

無法下載圖示 全文公開日期 2022/07/17 (校內網路)
全文公開日期 本全文未授權公開 (校外網路)
全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
QR CODE