請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/27158
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 雷欽隆(Chin-Laung Lei) | |
dc.contributor.author | Hsu-Chun Hsiao | en |
dc.contributor.author | 蕭旭君 | zh_TW |
dc.date.accessioned | 2021-06-12T17:56:43Z | - |
dc.date.available | 2008-06-30 | |
dc.date.copyright | 2008-02-18 | |
dc.date.issued | 2008 | |
dc.date.submitted | 2008-01-31 | |
dc.identifier.citation | [1] Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, and Haixia Shi.
Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In CRYPTO, pages 205-222, 2005. [2] Giuseppe Ateniese, Marina Blanton, and Jonathan Kirsch. Secret handshakes with dynamic and fuzzy matching. In NDSS, 2007. [3] Dirk Balfanz, Glenn Durfee, Narendar Shankar, Diana K. Smetters, Jessica Staddon, and Hao-Chi Wong. Secret handshakes from pairing-based key agreements. In IEEE Symposium on Security and Privacy, pages 180-196, 2003. [4] John Bethencourt, Amit Sahai, and Brent Waters. Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, pages 321-334, 2007. [5] Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, and Eiji Okamoto. An algorithm for the nt pairing calculation in characteristic three and its hardware implementation. In IEEE Symposium on Computer Arithmetic, pages 97-104, 2007. [6] Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. Public key encryption with keyword search. In EUROCRYPT, pages 506-522, 2004. [7] Dan Boneh and Matthew K. Franklin. Identity-based encryption from the weil pairing. SIAM J. Comput., 32(3):586-615, 2003. [8] Xavier Boyen and Brent Waters. Anonymous hierarchical identity-based encryption (without random oracles). In CRYPTO, pages 290-307, 2006. [9] Robert W. Bradshaw, Jason E. Holt, and Kent E. Seamons. Concealing complex policies with hidden credentials. In ACM Conference on Computer and Communications Security, pages 146-157, 2004. [10] Claude Castelluccia, Stanislaw Jarecki, and Gene Tsudik. Secret handshakes from CA-oblivious encryption. In ASIACRYPT, pages 293-307, 2004. [11] Melissa Chase. Multi-authority attribute based encryption. In TCC, pages 515-534, 2007. [12] Keith B. Frikken, Mikhail J. Atallah, and Jiangtao Li. Hidden access control policies with hidden credentials. In WPES, page 27, 2004. [13] Keith B. Frikken, Mikhail J. Atallah, and Jiangtao Li. Attribute-based access control with hidden policies and hidden credentials. IEEE Trans. Computers, 55(10):1259-1270, 2006. [14] Keith B. Frikken, Jiangtao Li, and Mikhail J. Atallah. Trust negotiation with hidden credentials, hidden policies, and policy cycles. In NDSS, 2006. [15] Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. Attribute-based encryption for ne-grained access control of encrypted data. In ACM Conference on Computer and Communications Security, pages 89-98, 2006. [16] Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons, and Hilarie K. Orman. Hidden credentials. In WPES, pages 1-8, 2003. [17] Apu Kapadia, Patrick P. Tsang, and Sean W. Smith. Attribute-based publishing with hidden credentials and hidden policies. In NDSS, 2007. [18] Tim Kerins, William P. Marnane, Emanuel M. Popovici, and Paulo S. L. M. Barreto. E cient hardware for the Tate pairing calculation in characteristic three. In CHES, pages 412-426, 2005. [19] Ninghui Li, Wenliang Du, and Dan Boneh. Oblivious signature-based envelope. Distributed Computing, 17(4):293-302, 2005. [20] Ben Lynn. The pairing-based cryptography (PBC) library. [21] Rafail Ostrovsky, Amit Sahai, and Brent Waters. Attribute-based encryption with non-monotonic access structures. In ACM Conference on Computer and Communications Security, pages 195-203, 2007. [22] Robert Ronan, Colm O'Eigeartaigh, Colin C. Murphy, Michael Scott, and Tim Kerins. Hardware acceleration of the Tate pairing on a genus 2 hyperelliptic curve. Journal of Systems Architecture, 53(2-3):85-98, 2007. [23] Amit Sahai and Brent Waters. Fuzzy identity-based encryption. In EUROCRYPT, pages 457-473, 2005. [24] Nigel P. Smart. Access control using pairing based cryptography. In CT-RSA, pages 111-121, 2003. [25] Dawn Xiaodong Song, David Wagner, and Adrian Perrig. Practical techniques for searches on encrypted data. In IEEE Symposium on Security and Privacy, pages 44-55, 2000. [26] James Joseph Sylvester. Thoughts on inverse orthogonal matrices. Philosophical Magazine, 34:461-475, 1867. [27] Shouhuai Xu and Moti Yung. k-anonymous secret handshakes with reusable credentials. In ACM Conference on Computer and Communications Security, pages 158-167, 2004. [28] Ting Yu, Marianne Winslett, and Kent E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur., 6(1):1-42, 2003. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/27158 | - |
dc.description.abstract | 現今的網路環境中,越來越多網路使用者存取儲存在第三方檔案伺服器的資料。在此情況下,除了維持資料的隱密性,保護存取權限和政策的隱私性也相當重要。針對此問題,以往的研究者提出了隱藏式憑證和隱藏式政策分別用於隱藏使用者的存取權限和資料提供者的存取政策。然而若要同時達成此兩者,以往的研究必須仰賴可信賴的仲裁者或是需要使用者和資料提供者之間進行多回合的信任協商。在此論文中,我們提出了一個新的密碼系統,將存取權限隱藏於密文之內,只有符合條件的使用者能成功地解回原文件。我們的系統能在單次的加密解密程序間,同時隱藏使用者屬性和資料提供者指定的存取政策,且不需要可信賴的仲裁者。除此之外,我們的機制更允許資料提供者於存取政策內設定否定的條件。最後,我們使用PBC 函式庫實作了此系統,並討論其於各種情境下之效能。 | zh_TW |
dc.description.abstract | In today's open environment, increasing numbers of network users access data stored in third-parties such as file servers on the Internet. Preserving data con dentiality is
important; however, preserving privacy of access right and policy is imperative when the right and policy are as con dential as the data itself. To address this problem, previous researchers have proposed concepts of hidden credential and hidden policy to hide user's access privileges and content provider's policies respectively. To achieve both features simultaneously, other researchers either rely on a trusted mediator or require multiple rounds of online trust negotiations between two parties. In this paper, we present a novel cryptosystem which hides access policies in ciphertext and allows only users with satis ed attributes to retrieve corresponding plaintext successfully. By using our technique, both attributes and access policies can be kept secret through an o ine encrypt-decrypt process; furthermore, the trust dependency is reduced since no trusted mediator is required. Besides, our construction permits access policies constituted of both positive and negative attributes. Finally, we implement our method using Pairing-based Cryptography (PBC) Library, and discuss its performance under various contexts. | en |
dc.description.provenance | Made available in DSpace on 2021-06-12T17:56:43Z (GMT). No. of bitstreams: 1 ntu-97-R94921131-1.pdf: 449786 bytes, checksum: ff454a79b8e973b57f4fff89ebcea716 (MD5) Previous issue date: 2008 | en |
dc.description.tableofcontents | Abstract-iv
1 Introduction-1 2 Related Work-6 3 Background-10 3.1 Bilinear Maps-10 3.2 Bilinear Diffe-Hellman Problem (BDH)-11 3.3 Lagrange Interpolating Polynomial-11 3.4 Orthogonal Set-12 3.5 Security Definition-13 3.6 Problem Definition-15 4 Hidden Access Control Allowing Negative Constraints-18 4.1 Basic Scheme-18 4.2 Proposed Scheme-22 5 Discussion-28 5.1 Security-28 5.2 Complexity Evaluation-31 5.3 Flexibility-34 5.4 Construction Issues-36 5.5 Variation of Keyword Search Problems-37 5.6 Attribute Templates-40 5.7 Other Extensions-41 6 Conclusion 44 A Security Analysis-45 Bibliography-48 | |
dc.language.iso | en | |
dc.title | 允許否定條件之隱藏式存取控制 | zh_TW |
dc.title | A Hidden Access Control Scheme Allowing Negative Constraints | en |
dc.type | Thesis | |
dc.date.schoolyear | 96-1 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 顏嗣鈞(Hsu-Chun Yen),黃秋煌(Chua-Huang Huang),陳君明(Jiun-Ming Chen) | |
dc.subject.keyword | 隱藏政策,否定條件,存取控制, | zh_TW |
dc.subject.keyword | Hidden Policies,Negative Contraints,Access Control, | en |
dc.relation.page | 52 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2008-01-31 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
顯示於系所單位: | 電機工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-97-1.pdf 目前未授權公開取用 | 439.24 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。