淡江大學覺生紀念圖書館 (TKU Library)
進階搜尋


下載電子全文限經由淡江IP使用) 
系統識別號 U0002-2706200622060600
中文論文名稱 適用於代理編譯器的(匿名)自動代理簽章法
英文論文名稱 (Anonymous) Proxy Automatic Signature Schemes with Compiler Agents
校院名稱 淡江大學
系所名稱(中) 資訊工程學系碩士班
系所名稱(英) Department of Computer Science and Information Engineering
學年度 94
學期 2
出版年 95
研究生中文姓名 陳光熹
研究生英文姓名 Kuang-Hsi Chen
電子信箱 kuanghsi@gmail.com
學號 692190563
學位類別 碩士
語文別 英文
口試日期 2006-06-14
論文頁數 50頁
口試委員 指導教授-黃心嘉
委員-何煒華
委員-黃仁俊
中文關鍵字 編譯器  分散式系統  電腦病毒  數位簽章  代理簽章  自動簽章  匿名 
英文關鍵字 Compilers  distributed system  computer virus  digital signature  proxy signature  automatic signature  anonymous 
學科別分類 學科別應用科學資訊工程
中文摘要 為了避免遭受未知病毒的感染,許多藉由公正的編譯器製造者幫助的自動簽章方法已經被提出。在先前所提出的方法中,編譯器製造者與編譯器代理者之間的代理協議,需要用到兩份數位簽章,而同一件代理協議卻用到兩份數位簽章確認,是一件沒有效率的作法。為了改進此一沒有效率的缺失,提出第一個代理自動簽章法。又在先前所提出的方法與我們的第一個代理自動簽章法中,編譯器代理者們的公開金鑰必須被認證且驗證者必須被記錄下來,但如果只需要紀錄編譯器製造者的公開金鑰,那將會變的非常方便。因此一個匿名的代理自動簽章法被提出,在新的匿名方法中,編譯器的代理伺服器是匿名的,驗證者不需儲存代理伺服器的公開金鑰,並且驗證者可以事前偵測代理伺服器行為的逾越。我們所提出匿名的方法可以採用任何的離散對數型的簽章法,並且提供完善的裁判機制以偵測病毒感染的來源。
英文摘要 Many (proxy) automatic signature schemes are proposed to guard against the (unknown) virus infection with the help of honest compiler makers. Among these proposed schemes, the agreement between the compiler maker and compiler severs is confirmed by two distinct signatures. It is inefficient to adopt two distinct signatures to confirm the same agreement. To overcome this inefficiency, our first scheme is proposed. In these proposed schemes and our scheme, the used compiler agents’ public keys should be certificated and maintained by verifiers. If verifiers only keep the compiler makers’ public key, it is more convenient. So an anonymous proxy automatic signature scheme with compiler agents is proposed. In the new scheme, the compiler agents are anonymous and verifiers do not need to store compiler agents’ public key. Moreover, verifiers can authenticate the source of received executable problems and detect compiler agents’ deviation in advance. Our schemes are suitable for adopting any discrete logarithm based signature schemes. Our scheme has provides strong moderator’s judgment to detect of virus infection sources.
論文目次 Chapter 1 Introduction P.1
1.1 Motive P.1
1.2 Basic Assumptions and Models P.3
1.3 Security Goals in Our schemes P.6
Chapter 2 Review of Past Results P.9
2.1 Review of Hwang and Li’s scheme P.9
2.2 Review of Hwang and Chan’s scheme P.14
Chapter 3 A Proxy Automatic Signature scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection P. 19
3.1 Our Realization of Proxy Automatic Signature scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection P.19
3.2 Security Analysis of Proxy Automatic Signature scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection P.24
Chapter 4 Our Realization of Anonymous Proxy Automatic Signature schemes with Compiler Agents P.26
Chapter 5 Security Analysis of Anonymous Proxy Automatic Signature schemes with Compiler Agents P.32
Chapter 6 Performance Analysis and Discussion P.35
Chapter 7 Comparison P.40
Chapter 8 Conclusion P.42
References P.43

List of Tables
Fig 1 Client-Server Model in Distributed Systems P.6
Fig 2 Computational Cost in Compiler-Maker Authorization Phase P.36
Fig 3 Computational Cost in Server-Requester Execution Phase P.37
Fig 4 Computational Cost in Customer Verification Phase P.38
Table 1 Computational Cost of Participates in Our Second scheme P.39
Table 2 Comparison among Four Automatic Signature schemes P.41
參考文獻 [1] C.-C. Chan, “Anonymous (multi-) proxy signature schemes with undeniable agents”, Master Thesis, Tamkung University, Taiwan, R.O.C, 2005.
[2] T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithm,” IEEE Transactions on Information Theory, Vol. 31, No. 4, 1985, pp. 469-1985.
[3] FIPS PUB 186, February 1991, Digital signature Standard.
[4] S. Hedberg, “Combating computer viruses: IBM’s new computer immune system,” Parallel & Distributed Technology: Systems & Applications, IEEE, Vol. 4, No. 2, 1996, pp. 9-11.
[5] S. J. Hwang, Chiu-Chin Chen, “New multi-proxy multi signature schemes,” Applied Mathematics and Computation Volume: 147, Issue: 1, January 5, 2004, pp. 57-67.
[6] S.-J. Hawng and K.-H. Chen, “A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection,” Advanced Information Networking and Applications 2005, Taiwan, R.O.C., pp. 649-654, 2005.
[7] S.-J. Hwang and E.-T. Li, “A proxy automatic signature scheme using a compiler in distributed systems,” 2004 Information Security Conference, Taipei, Taiwan, R.O.C., pp. 345- 352, 2004.
[8] W.–D. Lin and J.–K. Jan, “An automatic signature scheme using a compiler in distributed systems,” IEICE Transactions on Communications, Vol. E83-B No. 5, 2000, pp. 935-941.
[9] C. Nachenberg, "Computer virus-antivirus coevolution," Communications of the ACM, Vol. 40, Issue 1, 1997, pp. 46-51.
[10] E. Okamoto, “Integrated security system and its application to anti-viral methods,” Proc. 6th Virus and Security Conf, 1993.
[11] S. R. Subramanya and N. Lakshminarasimhan, “Computer viruses,” Potentials, IEEE, Vol. 20, Issue 4, 2001, pp. 16-19.
[12] Y.–M. Tseng, “Cryptanalysis and restriction of an automatic signature scheme in distributed systems,” IEICE Transactions on Communications, Vol. E86-B No. 5, 2000, pp. 1679-1681.
[13] K. Usuda, M. Mambo, T. Uyematsu, and E. Okamoto, “Proposal of an automatic signature scheme using a compiler,” IEICE Transactions Fundamentals, Vol. E79-A, No. 1, pp .94-101, 1996.
論文使用權限
  • 同意紙本無償授權給館內讀者為學術之目的重製使用,於2006-07-24公開。
  • 同意授權瀏覽/列印電子全文服務,於2006-07-24起公開。


  • 若您有任何疑問,請與我們聯絡!
    圖書館: 請來電 (02)2621-5656 轉 2281 或 來信