透過您的圖書館登入
IP:3.144.28.50
  • 學位論文

應用於群播系統之具時限性階層式存取控制和金鑰管理機制

A Time-Bound Hierarchical Access Control and Key Management Scheme for Multicast Systems

指導教授 : 沈榮麟
共同指導教授 : 劉萬榮(Wan-Rung Liou)
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


本論文是運用橢圓曲線乘法運算、雙線性配對中的ID-Based特性、單向雜湊函數以及時間存取控制為群播系統建構一個具有時限性的階層式存取控制與金鑰管理機制。中央權限中心會分配給每個安全層級(SC)一把群鑰,SC內成員須透過時限性金鑰獲得群鑰方能解密獲得群播資料以及利用本身群鑰獲得下層層級的群鑰進而解密獲得下層的群播資料。在動態存取控制方面,本論文提出幾個常見的動態存取型態作探討:為加入新進成員、成員離開、成員的時限性金鑰改變、增加安全層級、刪除安全層級、層級群鑰的改變、新增SC之間的關聯性和刪除SC之間的關聯性。最後在安全性和效能分析部分將常見的惡意攻擊做分析,經由分析的結果證明能有效阻擋惡意攻擊且在效能方面能有效降低運算量和運算時間。因此本文所提出的機制為一個具有安全性的群播系統。

並列摘要


This thesis adopts elliptic curve multiplication operation, ID-based character in bilinear pairing, one-way hash function and time access control to construct a time-bound hierarchical access control and key management scheme for multicast systems. In this scheme, central authority (hereafter called CA) distributes a group key for every security class (SC) and a time-bound secret key for each member of security class. With its time-bounded secret key, each member in SC can obtain group key to decrypt the message and thereof utilize the group key to attain the successors’ group keys so as to decrypt their data. Considering many common ways of dynamic access control, namely, a new member joining in the security class, an existing member departing from security class, replacing time-bounded key, increasing security class, decreasing security class, replacing group key, adding relationship and deleting relationship among SCs, all of them are explicitly discussed in this thesis. In view of the security and performance analyses under many typical attacks, we thereby prove our proposed method can prevent malicious attacks effectively with less computation time and more reasonable complexity. In conclusion, the proposed scheme offers a secure hierarchical access control multicast system.

參考文獻


[1] S. Acharya, R. Alonso, M. Franklin, and Stanley B. Zdonik, "Broadcast disks: data management for asymmetric communication environments, ' Proceeding of ACM SIGMOD, p.p. 199-210, March 1995.
[2] S. G. Akl and P. D. Taylor, "Cryptographic solution to a problem of access control in a hierarchy," ACM Transactions on Computer Systems, vol. 1, no. 3 pp. 239-248, 1983.
[5] M. Castro, P. Druschel, A. Kermarrec, and A. Nandi, "SplitStream: high-bandwidth multicast in cooperative environments," ACM SIGOPS Operating Systems Review, vol. 37, pp.298-313, 2003.
[6] J. C. Cha and J. H. Chen, "An identity-based signature from gap Diffie-Hellman groups," Proceeding of Practice and Theory in Public key Cryptography-PKC, LNCS 2567, pp. 18-30, 2003.
[7] C. C. Chang, R. J. Hwang, and T. C. Wu, "Cryptographic key assignment scheme for access control in a hierarchy," Information Systems, vol. 17, no. 3, 1992, pp. 243-247. (SCI, EI)

延伸閱讀