請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/42891
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 雷欽隆 | |
dc.contributor.author | Wen-Hsun Hsu | en |
dc.contributor.author | 許文勳 | zh_TW |
dc.date.accessioned | 2021-06-15T01:27:45Z | - |
dc.date.available | 2009-07-27 | |
dc.date.copyright | 2009-07-27 | |
dc.date.issued | 2009 | |
dc.date.submitted | 2009-07-22 | |
dc.identifier.citation | [1] X. Cao and S. Zhong, “Breaking a remote user authentication scheme for multi-server architecture,” IEEE Communications Letters, vol. 10, no. 8, pp. 580–581, 2006.
[2] T. Cao and D. Lin, “Cryptanalysis of two password authenticated key exchange protocols based on RSA,” IEEE Communications Letters, vol. 10, no. 8, pp. 623–625, 2006. [3] J.W. Byun, D.H. Lee and J.I. Lim, “ An Efficient client-to-client password-authenticated key agreement,” Information Sciences, vol. 177, no. 19, pp. 3995-4013, 2007 [4] W.B. Lee and C.C. Chang, “User identification and key distribution maintaining anonymity for distributed computer network,” Comput. Systems Science and Engineering, vol. 15, no. 4, pp. 113–116, 1999. [5] T.S. Wu and C.L. Hsu, “Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks,” Computers & Security, vol. 23, no. 2, pp. 1227–1239, 2004. [6] H.Y. Chien, “Practical anonymous user authentication scheme with security proof,” Computers & Security, vol. 27, no. 5-6, pp. 216–223, 2008. [7] Y. Yang, J. W. S. Wang, F. Bao and R.H. Deng, “New efficient user identification and key distribution scheme providing enhanced security,” Computers & Security, vol. 23, no. 8, pp. 697–704, 2004. [8] K. Mangipudi and R. Katti, “A secure identification and key agreement protocol with user anonymity (SIKA),” Computers & Security, vol. 25, no. 6, pp. 420–425, 2006. [9] C.L. Hsu and Y.H. Chuang, “A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks,” Information Sciences, vol. 179, no. 4, pp. 422–429, 2009. [10] Y. Cai and Y. Wang, “Identity-based conference key distribution protocol with user anonymity,” Chinese Journal of Electronics, vol. 16, no. 1, pp. 179-181, 2008. [11] W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, 1976. [12] T. ElGamal, “A public-key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469-471, 1985. [13] E.J. Yoon and K.Y. Yoo, “Cryptanalysis of two user identification schemes with key distribution preserving anonymity,” ICICS, pp. 315–322, 2005. [14] M. Girault, “An identity-based identification scheme based on discrete logarithms modulo a composite number,” Proceedings of Eurocrypt’90, Springer-Verlag, pp.481-486, 1991. [15] O. Goldreich and Y. Lindell, “Session-key generation using human passwords only,” Proceedings of Crypto’01, LNCS 2139, Springer-Verlag, pp.408-432, 2001 [16] M. Bellare and P. Rogaway, “Entity authentication and key distribution,” Crypto’93, LNCS 773, pp. 232–249, 1995. [17] M. Burrow, M. Abadi, and R. Needham, “A logic of authentication,” ACM Trans. Comput. & Syst., vol. 8, no. 1, pp. 18-36, 1990. [18] R. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signature and public-key cryptosystem,” Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978. [19] I. N. Herstein and Topics in Algebra, Xerox Corporation, 1975. [20] Java™ Platform, Standard Edition 6 API Specification. http://java.sun.com/javase/6/docs/api/ | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/42891 | - |
dc.description.abstract | 匿名使用者認證及金鑰分配方法對於目前的分散式網路來說,可以說是相當的重要,因為這樣才能保護使用者資料的安全性與隱私性。在西元兩千年的時候,李維斌教授是第一個設計了能夠達到使用者認證與金鑰分配的方法;並且在這九年來,不斷的有人對於這種方法做研究與改進,兩千零九年的時候,許建隆教授改進了前人們的方法,設計了一個能夠達到匿名且有效率的使用者認證與金鑰分配方法,但是我們發現了這個最新的方法在安全性上有所瑕疵,並加以改進,設計了一個新的方法,不但能夠達到更安全的要求,還在效率上也有所提升。我們也做了實驗測試,證明了我們的方法在效率上的確好於其它相關的方法。 | zh_TW |
dc.description.abstract | User identification and key distribution schemes with anonymity are attached great importance to distributed computer networks where the privacy of a service requester can be protected. In 2000, Lee and Chang first presented a user identification scheme that also can simultaneously achieve key exchange requirement while preserving the user anonymity. In 2009, Hsu and Chuang proposed an efficient user identification scheme with key distribution preserving user anonymity for distributed computer networks. In their scheme, (1) each service provider does not need to maintain a password table for identifying users; (2) each user only keeps one secret token and can obtain the services from different service providers; (3) when a new service provider joins the system, the users do not need to update the secret token. In this thesis, we show that the impersonation attack can work in Hsu-Chuang’s scheme and then propose a new method to enhance the security level and the efficiency. By our simulation and analysis, the computation and communication cost is better than related schemes. | en |
dc.description.provenance | Made available in DSpace on 2021-06-15T01:27:45Z (GMT). No. of bitstreams: 1 ntu-98-R96921012-1.pdf: 522850 bytes, checksum: 22e579d901af72e7b21e41060e52c9f5 (MD5) Previous issue date: 2009 | en |
dc.description.tableofcontents | Contents
Chapter 1 Introduction 1 Chapter 2 Definitions 4 Chapter 3 Related Works 5 3.1 Lee and Chang’s Scheme 5 3.1.1 Review of the Scheme 5 3.1.2 Security Leaks of Lee and Chang’s Scheme 8 3.2 Wu and Hsu’s Scheme 9 3.2.1 Review of the Scheme 9 3.2.2 A Weakness of Wu and Hsu’s Scheme 11 3.3 Yang et al.’s Scheme 12 3.3.1 Review of the Scheme 12 3.3.2 The Security Flaw of Yang et al.’s Scheme 14 3.4 Mangipudi and Katti’s Scheme 15 3.4.1 Review of the Scheme 15 3.4.2 The Security Leak of Mangipudi and Katti’s Scheme 18 3.5 Hsu and Chuang’s Scheme 19 3.5.1 Review of the Scheme 19 3.5.2 Cryptanalysis of Hsu and Chuang’s Scheme 22 Chapter 4 Our Scheme 26 Chapter 5 Analysis 29 5.1 Strong Mutual Authentication 29 5.2 Analysis of Security 31 5.3 Analysis of Efficiency 34 Chapter 6 Simulation 36 6.1 Environments 36 6.2 Simulation Parameters 38 6.3 Simulation Results 39 Chapter 7 Conclusions 43 References 44 | |
dc.language.iso | en | |
dc.title | 分散式電腦網路下的匿名使用者認證及金鑰分配方法 | zh_TW |
dc.title | User Identification and Key Distribution Scheme with Anonymity for Distributed Computer Network | en |
dc.type | Thesis | |
dc.date.schoolyear | 97-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 顏嗣鈞,郭斯彥,黃秋煌,莊仁輝 | |
dc.subject.keyword | 匿名性,分散式電腦網路,認證,金鑰分配, | zh_TW |
dc.subject.keyword | Anonymity,distributed computer network,identification,key distribution, | en |
dc.relation.page | 46 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2009-07-22 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
顯示於系所單位: | 電機工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-98-1.pdf 目前未授權公開取用 | 510.6 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。