透過您的圖書館登入
IP:3.137.178.133
  • 學位論文

身份認證與免憑證式金鑰交換協議之研究

The Study of Authentication and Certificateless Key Agreement Protocol

指導教授 : 劉兆樑
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


隨著電腦技術的日益進步,從早期的主從式、點對點、分散式,一直到現今的雲端技術,人們利用網路所給予的便利性來即時傳送一些重要文件,但由於早期的傳輸,只是單純的把明文傳送給對方,所以惡意者即可以簡單攔截訊息並且閱讀,為了能確保不相關的人士無法去讀取不屬於他之資訊,因此密碼學於網路上的應用開始蓬勃發展,在過去數十年間,藉由公開金鑰密碼系統來提升安全性因此密碼系統變得越來越複雜而且導致了運算成本的增加。然而在某些特定的環境底下,例如,智慧卡的使用環境中,智慧卡的計算能力一般而言比電腦薄弱許多,以致於無法執行公開金鑰密碼系統的計算量,為此我們使用單向雜湊函數來降低計算成本,並且應用於植基ID-based的智慧卡中,隨後在研究免憑證加密系統時,發現植基於ID-based的密碼系統存在安全的隱憂,同時發現免憑證系統可以有效的解決此問題,因此我們藉由免憑證金鑰交換協議來改進前篇ID-based中的隱憂,在上述的兩種方法中,我們藉由被學者們研究許久的金鑰協議相關安全屬性需求來佐證我們的方法可以達到相關的安全要求。

關鍵字

ID-based 免憑證 認證

並列摘要


Along with the development of computing technology, it initially started from the client/server model, peer to peer, distribution, until the latest Cloud technology. People use the internet as a more convenient and immediate way of delivering important documents. At early stage of transmission, it was simply sending out the message/content directly to the other person. However, the interceptor can easily catch the personal message/content to read. Therefore, in order to ensure the irrelevant people is unable to read the information which not belongs to him, cryptography has become more and more popular in the internet world. In the past decades, Public-key Cryptosystem has been used to increase the security issue and became more complicated; which also resulted in an increase on cost. However, under some specific circumstance, the smart card can not implement the computation load of Public-key Cryptosystem due to the computation ability of smart card is weaker than a computer. Therefore, One-way hash function is used to decrease the calculation cost and also apply on the smart card of ID-based. Afterwards, while discovering the security issue of ID-based coding system, Certificateless Public key cryptography is found to solve this problem effectively. Thus, by using CL-PKC, the potential problem of ID-based (which has been published before) can be improved. The two methods mentioned above can be verified by security request of key agreement protocol to confirm whether they can achieve the relevant security requirement.

並列關鍵字

ID-based Certificateless Authentication

參考文獻


[21] W. H. Yang and S. P. Shieh, “Password authentication schemes with smart cards,” Computers & Security, Vol. 18, pp. 727-733, 1999.
[2] 陳曉開、張世敏, “智慧e卡-啟動全面電子商務時代的新商機”,美商麥格囉‧希爾國際股份有限公司台灣分公司,初版,2000。
[8] A. Shamir, “Identity-based cryptosystems and signature scheme,” Proceedings of Cryptology 84, pp. 47-53, 1985.
[9] L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, Vol. 24, pp. 770-772, 1981.
[11] H. Y. Chien, J. K. Jan, and Y. M. Tseng, “An efficient and practical solution to remote authentication: smart card,” Computers & Security, Vol. 21, pp. 372-375, 2002.

延伸閱讀