Skip navigation

DSpace JSPUI

DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets

Learn More
DSpace logo
English
中文
  • Browse
    • Communities
      & Collections
    • Publication Year
    • Author
    • Title
    • Subject
    • Advisor
  • Search TDR
  • Rights Q&A
    • My Page
    • Receive email
      updates
    • Edit Profile
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電機工程學系
Please use this identifier to cite or link to this item: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/27158
Title: 允許否定條件之隱藏式存取控制
A Hidden Access Control Scheme Allowing Negative Constraints
Authors: Hsu-Chun Hsiao
蕭旭君
Advisor: 雷欽隆(Chin-Laung Lei)
Keyword: 隱藏政策,否定條件,存取控制,
Hidden Policies,Negative Contraints,Access Control,
Publication Year : 2008
Degree: 碩士
Abstract: 現今的網路環境中,越來越多網路使用者存取儲存在第三方檔案伺服器的資料。在此情況下,除了維持資料的隱密性,保護存取權限和政策的隱私性也相當重要。針對此問題,以往的研究者提出了隱藏式憑證和隱藏式政策分別用於隱藏使用者的存取權限和資料提供者的存取政策。然而若要同時達成此兩者,以往的研究必須仰賴可信賴的仲裁者或是需要使用者和資料提供者之間進行多回合的信任協商。在此論文中,我們提出了一個新的密碼系統,將存取權限隱藏於密文之內,只有符合條件的使用者能成功地解回原文件。我們的系統能在單次的加密解密程序間,同時隱藏使用者屬性和資料提供者指定的存取政策,且不需要可信賴的仲裁者。除此之外,我們的機制更允許資料提供者於存取政策內設定否定的條件。最後,我們使用PBC 函式庫實作了此系統,並討論其於各種情境下之效能。
In today's open environment, increasing numbers of network users access data stored in third-parties such as file servers on the Internet. Preserving data con dentiality is
important; however, preserving privacy of access right and policy is imperative when the right and policy are as con dential as the data itself. To address this problem,
previous researchers have proposed concepts of hidden credential and hidden policy to hide user's access privileges and content provider's policies respectively. To achieve both features simultaneously, other researchers either rely on a trusted mediator or require multiple rounds of online trust negotiations between two parties. In this paper, we present a novel cryptosystem which hides access policies in ciphertext and allows only users with satis ed attributes to retrieve corresponding plaintext successfully. By using our technique, both attributes and access policies can be kept secret through an o ine encrypt-decrypt process; furthermore, the trust dependency is reduced since no trusted mediator is required. Besides, our construction permits access policies constituted of both positive and negative attributes. Finally, we implement our method using Pairing-based Cryptography (PBC) Library, and discuss its performance under various contexts.
URI: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/27158
Fulltext Rights: 有償授權
Appears in Collections:電機工程學系

Files in This Item:
File SizeFormat 
ntu-97-1.pdf
  Restricted Access
439.24 kBAdobe PDF
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved