§ 瀏覽學位論文書目資料
  
系統識別號 U0002-2706200622060600
DOI 10.6846/TKU.2006.00866
論文名稱(中文) 適用於代理編譯器的(匿名)自動代理簽章法
論文名稱(英文) (Anonymous) Proxy Automatic Signature Schemes with Compiler Agents
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 資訊工程學系碩士班
系所名稱(英文) Department of Computer Science and Information Engineering
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 94
學期 2
出版年 95
研究生(中文) 陳光熹
研究生(英文) Kuang-Hsi Chen
學號 692190563
學位類別 碩士
語言別 英文
第二語言別
口試日期 2006-06-14
論文頁數 50頁
口試委員 指導教授 - 黃心嘉(sjhwang@mail.tku.edu.tw)
委員 - 何煒華(whhe@cis.scu.edu.tw)
委員 - 黃仁俊(junhwang@ms35.hinet.net)
關鍵字(中) 編譯器
分散式系統
電腦病毒
數位簽章
代理簽章
自動簽章
匿名
關鍵字(英) Compilers
distributed system
computer virus
digital signature
proxy signature
automatic signature
anonymous
第三語言關鍵字
學科別分類
中文摘要
為了避免遭受未知病毒的感染,許多藉由公正的編譯器製造者幫助的自動簽章方法已經被提出。在先前所提出的方法中,編譯器製造者與編譯器代理者之間的代理協議,需要用到兩份數位簽章,而同一件代理協議卻用到兩份數位簽章確認,是一件沒有效率的作法。為了改進此一沒有效率的缺失,提出第一個代理自動簽章法。又在先前所提出的方法與我們的第一個代理自動簽章法中,編譯器代理者們的公開金鑰必須被認證且驗證者必須被記錄下來,但如果只需要紀錄編譯器製造者的公開金鑰,那將會變的非常方便。因此一個匿名的代理自動簽章法被提出,在新的匿名方法中,編譯器的代理伺服器是匿名的,驗證者不需儲存代理伺服器的公開金鑰,並且驗證者可以事前偵測代理伺服器行為的逾越。我們所提出匿名的方法可以採用任何的離散對數型的簽章法,並且提供完善的裁判機制以偵測病毒感染的來源。
英文摘要
Many (proxy) automatic signature schemes are proposed to guard against the (unknown) virus infection with the help of honest compiler makers.  Among these proposed schemes, the agreement between the compiler maker and compiler severs is confirmed by two distinct signatures.  It is inefficient to adopt two distinct signatures to confirm the same agreement.  To overcome this inefficiency, our first scheme is proposed.  In these proposed schemes and our scheme, the used compiler agents’ public keys should be certificated and maintained by verifiers.  If verifiers only keep the compiler makers’ public key, it is more convenient.  So an anonymous proxy automatic signature scheme with compiler agents is proposed.  In the new scheme, the compiler agents are anonymous and verifiers do not need to store compiler agents’ public key.  Moreover, verifiers can authenticate the source of received executable problems and detect compiler agents’ deviation in advance.  Our schemes are suitable for adopting any discrete logarithm based signature schemes.  Our scheme has provides strong moderator’s judgment to detect of virus infection sources.
第三語言摘要
論文目次
Chapter 1	 Introduction P.1
1.1 Motive P.1
1.2 Basic Assumptions and Models P.3
1.3 Security Goals in Our schemes P.6
Chapter 2	 Review of Past Results P.9
2.1 Review of Hwang and Li’s scheme	P.9
2.2 Review of Hwang and Chan’s scheme P.14
Chapter 3	 A Proxy Automatic Signature scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection	 P. 19
3.1 Our Realization of Proxy Automatic Signature scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection P.19
3.2 Security Analysis of Proxy Automatic Signature scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection P.24
Chapter 4 Our Realization of Anonymous Proxy Automatic Signature schemes with Compiler Agents P.26
Chapter 5 Security Analysis of Anonymous Proxy Automatic Signature schemes with Compiler Agents P.32
Chapter 6	 Performance Analysis and Discussion	P.35
Chapter 7	 Comparison P.40
Chapter 8	 Conclusion P.42
References P.43 

List of Tables
Fig 1 Client-Server Model in Distributed Systems P.6
Fig 2 Computational Cost in Compiler-Maker Authorization Phase P.36
Fig 3 Computational Cost in Server-Requester Execution Phase P.37
Fig 4 Computational Cost in Customer Verification Phase  P.38
Table 1 Computational Cost of Participates in Our Second scheme P.39
Table 2 Comparison among Four Automatic Signature schemes  P.41
參考文獻
[1] C.-C. Chan, “Anonymous (multi-) proxy signature schemes with undeniable agents”, Master Thesis, Tamkung University, Taiwan, R.O.C, 2005.
[2] T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithm,” IEEE Transactions on Information Theory, Vol. 31, No. 4, 1985, pp. 469-1985.
[3] FIPS PUB 186, February 1991, Digital signature Standard.
[4] S. Hedberg, “Combating computer viruses: IBM’s new computer immune system,” Parallel & Distributed Technology: Systems & Applications, IEEE, Vol. 4, No. 2, 1996, pp. 9-11.
[5] S. J. Hwang, Chiu-Chin Chen, “New multi-proxy multi signature schemes,” Applied Mathematics and Computation Volume: 147, Issue: 1, January 5, 2004, pp. 57-67.
[6] S.-J. Hawng and K.-H. Chen, “A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection,” Advanced Information Networking and Applications 2005, Taiwan, R.O.C., pp. 649-654, 2005.
[7] S.-J. Hwang and E.-T. Li, “A proxy automatic signature scheme using a compiler in distributed systems,” 2004 Information Security Conference, Taipei, Taiwan, R.O.C., pp. 345- 352, 2004.
[8] W.–D. Lin and J.–K. Jan, “An automatic signature scheme using a compiler in distributed systems,” IEICE Transactions on Communications, Vol. E83-B No. 5, 2000, pp. 935-941.
[9] C. Nachenberg, "Computer virus-antivirus coevolution," Communications of the ACM, Vol. 40, Issue 1, 1997, pp. 46-51.
[10] E. Okamoto, “Integrated security system and its application to anti-viral methods,” Proc. 6th Virus and Security Conf, 1993.
[11] S. R. Subramanya and N. Lakshminarasimhan, “Computer viruses,” Potentials, IEEE, Vol. 20, Issue 4, 2001, pp. 16-19.
[12] Y.–M. Tseng, “Cryptanalysis and restriction of an automatic signature scheme in distributed systems,” IEICE Transactions on Communications, Vol. E86-B No. 5, 2000, pp. 1679-1681.
[13] K. Usuda, M. Mambo, T. Uyematsu, and E. Okamoto, “Proposal of an automatic signature scheme using a compiler,” IEICE Transactions Fundamentals, Vol. E79-A, No. 1, pp .94-101, 1996.
論文全文使用權限
校內
校內紙本論文立即公開
同意電子論文全文授權校園內公開
校內電子論文立即公開
校外
同意授權
校外電子論文立即公開

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信