請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/65253
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 雷欽隆(Chin-Laung Lei) | |
dc.contributor.author | I-An Fan | en |
dc.contributor.author | 范宜安 | zh_TW |
dc.date.accessioned | 2021-06-16T23:32:55Z | - |
dc.date.available | 2012-08-01 | |
dc.date.copyright | 2012-08-01 | |
dc.date.issued | 2012 | |
dc.date.submitted | 2012-07-27 | |
dc.identifier.citation | [1] R. Cramer, I. Damgard, and U. Maurer, “General secure multi-party computation from any linear secret-sharing scheme,” Proceedings of the 19th international conference on Theory and application of cryptographic techniques, May 14-18, 2000, Bruges, Belgium.
[2] J. L. Massey, “Minimal codewords and secret sharing,” In 6th Joint Swedish-Russian Workshop On Information Theory, pp. 276-279, 1993. [3] G. R. Blakley, “Safeguarding cryptographic keys,” Proceedings of the National Computer Conference 48. 1979, pp. 313-317. [4] A. Shamir, “How to share a secret,” Communications of the ACM, v.22 n.11, p.612-613, Nov. 1979. [5] R. Canetti, C. Dwork, M. Naor and R. Ostrovsky, “Deniable Encryption,” Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, pp.90-104, August 17-21, 1997. [6] M. Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, “Fully homomorphic encryption over the integers,” Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques, May 30-June 03, 2010, French Riviera, France. [7] A. O’Neill, C. Peikert, and B. Waters, “Bi-deniable public-key encryption,” Proceedings of the 31st annual conference on Advances in cryptology, August 14-18, 2011, Santa Barbara, CA. [8] TrueCrypt Hidden Volumes http://www.truecrypt.org/hiddenvolume. [9] R. J. Anderson, R. M. Needham, and A. Shamir, “The Steganographic File System,” In Proceedings of the 2nd International Workshop on Information Hiding, pp. 73-82, 1998. [10] P. Gasti, G. Ateniese, and M. Blanton, “Deniable Cloud Storage: Sharing Files via Public-Key Deniability,” Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, October 04-04, 2010, Chicago, Illinois, USA. [11] R. J. Anderson, “Stretching the Limits of Steganography,” Proceedings of the First International Workshop on Information Hiding, pp. 39-48, May 30-June 01, 1996. [12] M. Roe, “Cryptography and evidence,” Ph.D. thesis, Clare College, University of Cambrige, UK, 1997. [13] X. Zhou, H. Pang, K. Tan, “Hiding Data Accesses in Steganographic File System,” Proceedings of the 20th International Conference on Data Engineering, pp. 572, March 30-April 02, 2004. [14] C. Asmuth and J. Bloom, “A modular approach to key safeguarding,” IEEE Transection on Information Theory, 29(2): pp. 208-210, March 1983. [15] O. Goldreich, D. Ron, M. Sudan, “Chinese remaindering with errors,” Proceedings of the thirty-first annual ACM symposium on Theory of computing, pp. 225-234, May 01-04, 1999, Atlanta, Georgia, United States. [16] C. Dwork, M. Naor, A. Sahai, “Concurrent zero-knowledge,” Journal of the ACM (JACM), v.51 n.6, pp. 851-898, November 2004. [17] M. Durmuth, D. M. Freeman, “Deniable encryption with negligible detection probability: an interactive construction,” Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology, May 15-19, 2011, Tallinn, Estonia. [18] D. Beaver, “Plug and Play Encryption,” Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, pp. 75-89, August 17-21, 1997. [19] M. Chapman , G. I. Davida, “Plausible Deniability Using Automated Linguistic Stegonagraphy,” Proceedings of the International Conference on Infrastructure Security, pp. 276-287, October 01-03, 2002. [20] D. Walton, “Plausible deniability and evasion of burden of proof,” Argumentation , vol. 10, pp. 47-58, 1996. [21] R. L. Rivest, “Chaffing and winnowing: Confidentiality without encryption.” CryptoBytes, 4(1): pp. 12-17, Summer 1998. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/65253 | - |
dc.description.abstract | 現在資料所可能受到的威脅中,有一種是權力者使用法律或相關規定迫使使用者交出其金鑰或加密內容,可否認性加密機制即為此而生。可否認性加密機制在不同的使用場合有不同的考量與組合,在多人傳輸上有各方的否認性問題,在私人儲存上不能儲存太多金鑰。
另一點要考量的是合理的解釋,可否認性機制的一個主要用途是用於說服,使自己在特定場合獲得有利的證據,而用於解釋的證據分為兩類,一類事先準備,另一類事後補足即可,本文使用事先準備的方式運作。 在就連機制原理都被知道的狀況下也能達到可否認性是重要的,本文利用「至少有一個解釋,而解釋的個數可以無上限」的方式達到此目標。 本機制主要分成兩個階段,其一使用線性祕密分享機制將要加密的原文包裝成多維空間的點坐標,並湊齊一定數量的點製成密文平面,另一個階段將數個不同的檔案編號包裝成各自的標簽。在給入不同的金鑰會從標簽看到不同的檔案編號,藉此不同密文的檔案編號各自組合回該金鑰視點所看得到的原文。在可否認性機制上依然受到資訊理論的極限所限制,兩個階段分別達成不同的目標。第一階段主要負責打散資訊,使得所有的檔案都具有一定的解釋力,並維持著資訊理論的極限,達成高填充率(單一密文中所代表的資訊量),第二階段主要負責達成可否認性的特質,也為了達成此特質,此部分填充率會表現較差,但此階段所承載之資訊量較低,整體的填充率表現會傾向第一階段所表現出的結果。 由於本機制是利用於私人儲存空間上,此機制附帶了一般的資料結構操作,使此機制能夠動態使用。 | zh_TW |
dc.description.abstract | There are many types of threat to the data, one is the authority forces the user to give out the key or encrypted contents, and deniable encryption (DE) is designed for this. DE has different design for different scene. In multi-party connection, there’s problem for the deniability for every party. In private storage scheme, there’s problem for constant-size key.
Another problem to consider is reasonable explanation, DE is used mainly for convince someone, to make the specific situation advantageous. There are two types of proof for explanation, plan-ahead and ad-hoc. The former one needs to prepare fake data in advance, and the latter one made fake data at the time of coercion. In our scheme, we use the plan-ahead type. It is important to achieve deniability even all the scheme is known for adversary. In our scheme, we use “There is at least one explanation, but there is no limit for explain” to achieve deniability. There are two phases in our scheme, the first we pack the plaintext into coordinates in multi-dimension space, and use Linear Secret Sharing Scheme (LSSS) method to pack points into cipher plane. Another phase we pack the indices of data into a tag. While giving different keys, the tag will show different indices. Using different indices and combine the cipher planes with those indices would solve different plaintext. The DE is still limited by information theory. The first phase is for scramble the proof to make every file explainable, and maintain the limit by information theory to get high filling rate (the amount of information stored in unit ciphertext). The second phase achieves deniability, this makes this stage getting bad filling rate. Compared with the first phase, the second phase has lower amount of information, therefore, the total filling rate would be closed to the first phase. This scheme is used for private storage, to make this storage to operate dynamically, we attach several data structure operations. | en |
dc.description.provenance | Made available in DSpace on 2021-06-16T23:32:55Z (GMT). No. of bitstreams: 1 ntu-101-R99921030-1.pdf: 379647 bytes, checksum: 170b7aec94bff97bea87561af30593de (MD5) Previous issue date: 2012 | en |
dc.description.tableofcontents | 中文摘要 i
ABSTRACT ii CONTENTS iv LIST OF FIGURES vi LIST OF TABLES vii Chapter 1 Introduction 1 Chapter 2 The main method 5 2.1 Preliminary 5 2.2 Linear Secret Sharing Operations 5 2.2.1 Point encryption 6 2.2.2 Cipher plane decryption 7 2.3 Tag Operation 9 2.3.1 Tag Encryption 9 2.3.2 Tag Decryption 10 2.4 Data Structure Operation 11 2.4.1 The data structure 11 2.4.2 Initialize 11 2.4.3 Building 12 2.4.4 Exception procession 13 2.4.5 Insertion (fake data) 13 2.4.6 Insertion (true data) 14 2.4.7 Deletion (true data) 15 2.4.8 Deletion (fake data) 15 2.4.9 Merge 15 2.4.10 Overload 16 Chapter 3 Explanation and Deniable/Destructive Operation 17 Chapter 4 Method Analysis 19 4.1 Time complexity analysis 19 4.2 Security analysis 19 4.2.1 Security of the layer of tags 20 4.2.2 Security under the compromise of tags 20 4.2.3 Plaintext guessing 21 4.2.4 Last modified time problem 21 4.3 Dividing data 22 4.4 Minimum/Initial size 23 4.5 Hiding limit 23 4.6 Filling rate analysis 24 4.7 Trade-off 24 4.8 Comparison among secret sharing schemes 25 Chapter 5 Conclusion 27 REFERENCE 28 | |
dc.language.iso | en | |
dc.title | 私人儲存空間之可否認加密機制 | zh_TW |
dc.title | Deniable Encryption Scheme for Private Storage | en |
dc.type | Thesis | |
dc.date.schoolyear | 100-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 顏嗣鈞(Hsu-Chun Yen),郭斯彥(Sy-Yen Kuo),黃秋煌(Chua-Huang Huang),楊中皇(Chung-Huang Yang) | |
dc.subject.keyword | 可否認性加密機制,線性祕密分享機制,私人儲存, | zh_TW |
dc.subject.keyword | Deniable encryption,Linear secret sharing scheme,Private storage, | en |
dc.relation.page | 31 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2012-07-27 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
顯示於系所單位: | 電機工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-101-1.pdf 目前未授權公開取用 | 370.75 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。