Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電機工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/25121
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor雷欽隆
dc.contributor.authorSsu-Ying Lien
dc.contributor.author李思穎zh_TW
dc.date.accessioned2021-06-08T06:02:51Z-
dc.date.copyright2007-07-27
dc.date.issued2007
dc.date.submitted2007-07-26
dc.identifier.citation[1] Matt Blaze and Gerrit Bleumer, Divertible Protocols and Atomic Proxy Cryp-
tography, In Proceedings of Advances in Cryptology EUROCRYPT'98, 1998
[2] Yun-Peng Chiu, Chin-Laung Lei, and Chun-Ying Huang, Secure Multicast Us-
ing Proxy Encryption, International Conference on Information and Communi-
cations Security, 2005
[3] Stephen E. Deering and David R. Cheriton, Multicast routing in datagram
internetworks and extended LANs, ACM Transactions on Computer Systems
(TOCS), May 1990
[4] Anca Ivan and Yevgeniy Dodis, Proxy Cryptography Revisited, Proceedings of
the tenth Network and Distributed System Security Symposium, February 2003
[5] Daniel Jackson, Automating ‾rst-order relational logic, In Proceedings 8th ACM
SIGSOFT Symposium on the Foundations of Software Engineering, November
2000
[6] Daniel Jackson, Alloy: A lightweight object modelling notation, ACM Transac-
tions on Software Engineering and Methodology (TOSEM), April 2002
[7] Daniel Jackson, Ian Schechter, and Ilya Shlyakhter, Alcoa: the alloy constraint
analyzer, In Proceedings 22nd International Conference on Software Engineer-
ing, June 2000
[8] Yongdae Kim and Adrian Perrig and Gene Tsudik, Simple and Fault-Tolerant
Key Agreement for Dynamic Collaborative Groups, roceedings of the 7th ACM
conference on Computer and communications security, November 2000
[9] Will Marrero, Edmund Clarke, and Somesh Jha, A model checker for authen-
tication protocols, In DIMACS Workshop on Design and Formal Veri‾cation of
Security Protocols, Septemper 1997
[10] Catherine Meadows, A system for the speci‾cation and analysis of key manage-
ment protocols, In Proc. 1991 IEEE Computer Society Symposium on Research
in Security and Privacy, 1991
[11] Re‾k Molva and Alain Pannetrat, Scalable Multicast Security with Dynamic
Recipient Groups, ACM Transactions on Information and System Security, Aug
2000
[12] Suvo Mittra, Iolus: A Framework for Scalable Secure Multicasting, Proceedings
of the ACM SIGCOMM '97 conference on Applications, technologies, architec-
tures, and protocols for computer communication, Septemper 1997
[13] Tina Nolte, Exploring ‾lesystem synchronization with lightweight modeling and
analysis, Master's thesis, Massachusettes Institute of Technology, September
2002
[14] Sandro Rafaeli and David Hutchison, A Survey of Key Management for Secure
Group Communication, ACM Computing Surveys, Septemper 2003
[15] Fumiaki Sato and Shinya Tanaka, A push-based key distribution and rekeying
protocol for secure multicasting, In Proceedings 8th International Conference on
Parallel and Distributed Systems (ICPADS), 2000
[16] Ilya Shlyakhter, Manu Sridharan, and Daniel Jackson, Analyzing distributed
algorithms with ‾rst-order logic, submitted for publication
[17] Graham Steel and Alan Bundy, Attacking group multicast key management pro-
tocols using coral, Electronic Notes in Theoretical Computer Science, 2005
[18] Graham Steel, Alan Bundy and Ewen Denney, Finding Counterexamples to
Inductive Conjectures and Discovering Security Protocol Attacks, AISB Journal,
2002
[19] Graham Steel, lan Bundy and Monika Maidl, Attacking a Protocol for Group
Key Agreement by Refuting Incorrect Inductive Conjectures, 2004
[20] Shinya Tanaka and Fumiaki Sato, A key distribution and rekeying framework
with totally ordered multicast protocols, In Proceedings 15th International Con-
ference on Information Networking, 2001
[21] Alloy, http://alloy.mit.edu/index.php
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/25121-
dc.description.abstract目前分析安全群播機制大多是使用人工的方式,但是利用人工的方式來分析安全群播機制時,往往有不足、設想不夠周全的地方,因此若能使用自動化工具來分析,可以幫助我們研究發展更安全的機制。
Alloy是一種關係式的模擬語言,在不給予機制的狀況下,只需要簡單的雛型,就可以建構所要模擬的行為,並有效率的模擬所想的狀況及加以分析。
我們利用Alloy Analyzer 來模擬分析使用轉密方式的安全群播機制,經過驗證的結果,找出這個安全群播機制的缺失,修正機制後更可以達到群播機制的基本安全特性。
zh_TW
dc.description.abstractAt the present time, the secure multicast scheme analyze mostly by manual. But it considered comprehensive enough frequently. It can help us to develop a more secure multicast scheme by using the automatic tool.
Alloy is a model language based on relation. It can construct model of some behavior without mechanism, and modeling more efficient.
We use Alloy Analyzer to simulate and analyze the secure multicast scheme that use proxy encryption. These analyses display one flaw when consider the transmit delay. The analyzer suggests and checks some fixes. Then the result makes sure the secure multicast scheme to achieve the basic properties.
en
dc.description.provenanceMade available in DSpace on 2021-06-08T06:02:51Z (GMT). No. of bitstreams: 1
ntu-96-J94921023-1.pdf: 1059428 bytes, checksum: 2e1c8bcb97e18d4606fdac544e8368b2 (MD5)
Previous issue date: 2007
en
dc.description.tableofcontents1 Introduction 1
2 Related Work 3
2.1 Proxy Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3 Overview of Alloy 6
3.1 Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.1.1 Operators for Expressions . . . . . . . . . . . . . . . . . . . . . 7
3.1.2 Elementary Formulas . . . . . . . . . . . . . . . . . . . . . . . . 8
3.1.3 Higher-Order Quanti‾ers . . . . . . . . . . . . . . . . . . . . . . 8
3.1.4 Hight-level Constructs . . . . . . . . . . . . . . . . . . . . . . . 9
3.2 Analyzer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4 Secure Multicast Using Proxy Encryption 13
4.1 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5 Model 16
5.1 Basic Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
5.2 Extended Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
5.3 Fact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.4 Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
5.5 Assections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
6 Analysis 33
7 Conclusions and Future Work 36
dc.language.isoen
dc.subject安全群播機制zh_TW
dc.subjectAlloyzh_TW
dc.subject模擬zh_TW
dc.subject代理人加密zh_TW
dc.subject協定分析zh_TW
dc.subjectAlloyen
dc.subjectprotoccl analysisen
dc.subjectmodelingen
dc.subjectproxy encryptionen
dc.subjectschemeen
dc.subjectsecure multicasten
dc.title使用Alloy分析安全群播機制zh_TW
dc.titleAutomatic Analysis of Secure Multicast Scheme Using Alloyen
dc.typeThesis
dc.date.schoolyear95-2
dc.description.degree碩士
dc.contributor.oralexamcommittee顏嗣鈞,郭斯彥,黃秋煌
dc.subject.keywordAlloy,安全群播機制,代理人加密,模擬,協定分析,zh_TW
dc.subject.keywordAlloy,secure multicast,scheme,proxy encryption,modeling,protoccl analysis,en
dc.relation.page39
dc.rights.note未授權
dc.date.accepted2007-07-26
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept電機工程學研究所zh_TW
顯示於系所單位:電機工程學系

文件中的檔案:
檔案 大小格式 
ntu-96-1.pdf
  未授權公開取用
1.03 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved