Skip navigation

DSpace JSPUI

DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets

Learn More
DSpace logo
English
中文
  • Browse
    • Communities
      & Collections
    • Publication Year
    • Author
    • Title
    • Subject
  • Search TDR
  • Rights Q&A
  • Help
    • My Page
    • Receive email
      updates
    • Edit Profile
  1. NTU Theses and Dissertations Repository
  2. 理學院
  3. 數學系
Please use this identifier to cite or link to this item: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/61054
Title: 橢圓曲線密碼配對與其應用
Pairing-based Elliptic Curve Cryptography and Its Applications
Authors: Tze-Hsiang Yen
顏子翔
Advisor: 陳君明
Keyword: 雙線性配對函數,多方密鑰協議機制,橢圓曲線密碼學,橢圓曲線離散對數,
Bilinear Pairing,Multiparty Key Agreement Protocol,Elliptic Curve Cryptography,Elliptic Curve Discrete Logarithm Problem,
Publication Year : 2013
Degree: 碩士
Abstract: 由於橢圓曲線雙線性Diffie-Hellman問題之計算困難度,藉由配對(pairing)實現之協定陸續被提出,例如:身份加密(ID-based encryption)及密鑰協議機制。密鑰協議機制為透過不安全的通訊管道,讓欲進行通聯的使用者協議出共同密鑰(common secret key);多方密鑰協議機制則是允許多位使用者在進行通聯之前,立即協議出加解密之共同密鑰。本論文將藉由雙線性配對函數提出一套密鑰協議機制,可以在通聯者低於四人時,透過一次訊息交換,同時完成身份驗證與密鑰協議。此外,該機制大幅降低使用者必須妥善保存的私鑰量,僅為橢圓曲線上的一點。我們將說明任何成功假扮公證第三方(TTP, trusted third party)的第三者,必定具備對應的私鑰資訊或超級強大的計算能力。我們也將透過magma的實作,說明此篇論文提出的機制確實可行。
Due to the computational infeasibility of Bilinear Diffie-Hellman Problem on elliptic curves, many protocols based on pairings are constructed, such as ID-based encryption and key agreement. A key agreement protocol is a cryptographical primitive which allows participants to share a common secret key via insecure channel. In particular, a multiparty key agreement protocol manages arbitrary number of participants. In the thesis, we present a new authenticated multiparty key agreement protocol by using pairing. The authentication and the key agreement in our scheme can be done in just one round if the number of participants is less than four. Another advantage is that all participants only need to possess one piece of secret information of their own (a point on elliptic curve), hence the cost of secret protection is reduced in embedded systems. In security aspects, we show that if the system is compromised by Eve (a malicious user), then Eve either has secret information or has overwhelming computational ability to fool others by acting as the TTP (Trusted Third Party). We also show our scheme is efficient by using “magma”.
URI: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/61054
Fulltext Rights: 有償授權
Appears in Collections:數學系

Files in This Item:
File SizeFormat 
ntu-102-1.pdf
  Restricted Access
554.42 kBAdobe PDF
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved