系統識別號 | U0002-2706200622060600 |
---|---|
DOI | 10.6846/TKU.2006.00866 |
論文名稱(中文) | 適用於代理編譯器的(匿名)自動代理簽章法 |
論文名稱(英文) | (Anonymous) Proxy Automatic Signature Schemes with Compiler Agents |
第三語言論文名稱 | |
校院名稱 | 淡江大學 |
系所名稱(中文) | 資訊工程學系碩士班 |
系所名稱(英文) | Department of Computer Science and Information Engineering |
外國學位學校名稱 | |
外國學位學院名稱 | |
外國學位研究所名稱 | |
學年度 | 94 |
學期 | 2 |
出版年 | 95 |
研究生(中文) | 陳光熹 |
研究生(英文) | Kuang-Hsi Chen |
學號 | 692190563 |
學位類別 | 碩士 |
語言別 | 英文 |
第二語言別 | |
口試日期 | 2006-06-14 |
論文頁數 | 50頁 |
口試委員 |
指導教授
-
黃心嘉(sjhwang@mail.tku.edu.tw)
委員 - 何煒華(whhe@cis.scu.edu.tw) 委員 - 黃仁俊(junhwang@ms35.hinet.net) |
關鍵字(中) |
編譯器 分散式系統 電腦病毒 數位簽章 代理簽章 自動簽章 匿名 |
關鍵字(英) |
Compilers distributed system computer virus digital signature proxy signature automatic signature anonymous |
第三語言關鍵字 | |
學科別分類 | |
中文摘要 |
為了避免遭受未知病毒的感染,許多藉由公正的編譯器製造者幫助的自動簽章方法已經被提出。在先前所提出的方法中,編譯器製造者與編譯器代理者之間的代理協議,需要用到兩份數位簽章,而同一件代理協議卻用到兩份數位簽章確認,是一件沒有效率的作法。為了改進此一沒有效率的缺失,提出第一個代理自動簽章法。又在先前所提出的方法與我們的第一個代理自動簽章法中,編譯器代理者們的公開金鑰必須被認證且驗證者必須被記錄下來,但如果只需要紀錄編譯器製造者的公開金鑰,那將會變的非常方便。因此一個匿名的代理自動簽章法被提出,在新的匿名方法中,編譯器的代理伺服器是匿名的,驗證者不需儲存代理伺服器的公開金鑰,並且驗證者可以事前偵測代理伺服器行為的逾越。我們所提出匿名的方法可以採用任何的離散對數型的簽章法,並且提供完善的裁判機制以偵測病毒感染的來源。 |
英文摘要 |
Many (proxy) automatic signature schemes are proposed to guard against the (unknown) virus infection with the help of honest compiler makers. Among these proposed schemes, the agreement between the compiler maker and compiler severs is confirmed by two distinct signatures. It is inefficient to adopt two distinct signatures to confirm the same agreement. To overcome this inefficiency, our first scheme is proposed. In these proposed schemes and our scheme, the used compiler agents’ public keys should be certificated and maintained by verifiers. If verifiers only keep the compiler makers’ public key, it is more convenient. So an anonymous proxy automatic signature scheme with compiler agents is proposed. In the new scheme, the compiler agents are anonymous and verifiers do not need to store compiler agents’ public key. Moreover, verifiers can authenticate the source of received executable problems and detect compiler agents’ deviation in advance. Our schemes are suitable for adopting any discrete logarithm based signature schemes. Our scheme has provides strong moderator’s judgment to detect of virus infection sources. |
第三語言摘要 | |
論文目次 |
Chapter 1 Introduction P.1 1.1 Motive P.1 1.2 Basic Assumptions and Models P.3 1.3 Security Goals in Our schemes P.6 Chapter 2 Review of Past Results P.9 2.1 Review of Hwang and Li’s scheme P.9 2.2 Review of Hwang and Chan’s scheme P.14 Chapter 3 A Proxy Automatic Signature scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection P. 19 3.1 Our Realization of Proxy Automatic Signature scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection P.19 3.2 Security Analysis of Proxy Automatic Signature scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection P.24 Chapter 4 Our Realization of Anonymous Proxy Automatic Signature schemes with Compiler Agents P.26 Chapter 5 Security Analysis of Anonymous Proxy Automatic Signature schemes with Compiler Agents P.32 Chapter 6 Performance Analysis and Discussion P.35 Chapter 7 Comparison P.40 Chapter 8 Conclusion P.42 References P.43 List of Tables Fig 1 Client-Server Model in Distributed Systems P.6 Fig 2 Computational Cost in Compiler-Maker Authorization Phase P.36 Fig 3 Computational Cost in Server-Requester Execution Phase P.37 Fig 4 Computational Cost in Customer Verification Phase P.38 Table 1 Computational Cost of Participates in Our Second scheme P.39 Table 2 Comparison among Four Automatic Signature schemes P.41 |
參考文獻 |
[1] C.-C. Chan, “Anonymous (multi-) proxy signature schemes with undeniable agents”, Master Thesis, Tamkung University, Taiwan, R.O.C, 2005. [2] T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithm,” IEEE Transactions on Information Theory, Vol. 31, No. 4, 1985, pp. 469-1985. [3] FIPS PUB 186, February 1991, Digital signature Standard. [4] S. Hedberg, “Combating computer viruses: IBM’s new computer immune system,” Parallel & Distributed Technology: Systems & Applications, IEEE, Vol. 4, No. 2, 1996, pp. 9-11. [5] S. J. Hwang, Chiu-Chin Chen, “New multi-proxy multi signature schemes,” Applied Mathematics and Computation Volume: 147, Issue: 1, January 5, 2004, pp. 57-67. [6] S.-J. Hawng and K.-H. Chen, “A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection,” Advanced Information Networking and Applications 2005, Taiwan, R.O.C., pp. 649-654, 2005. [7] S.-J. Hwang and E.-T. Li, “A proxy automatic signature scheme using a compiler in distributed systems,” 2004 Information Security Conference, Taipei, Taiwan, R.O.C., pp. 345- 352, 2004. [8] W.–D. Lin and J.–K. Jan, “An automatic signature scheme using a compiler in distributed systems,” IEICE Transactions on Communications, Vol. E83-B No. 5, 2000, pp. 935-941. [9] C. Nachenberg, "Computer virus-antivirus coevolution," Communications of the ACM, Vol. 40, Issue 1, 1997, pp. 46-51. [10] E. Okamoto, “Integrated security system and its application to anti-viral methods,” Proc. 6th Virus and Security Conf, 1993. [11] S. R. Subramanya and N. Lakshminarasimhan, “Computer viruses,” Potentials, IEEE, Vol. 20, Issue 4, 2001, pp. 16-19. [12] Y.–M. Tseng, “Cryptanalysis and restriction of an automatic signature scheme in distributed systems,” IEICE Transactions on Communications, Vol. E86-B No. 5, 2000, pp. 1679-1681. [13] K. Usuda, M. Mambo, T. Uyematsu, and E. Okamoto, “Proposal of an automatic signature scheme using a compiler,” IEICE Transactions Fundamentals, Vol. E79-A, No. 1, pp .94-101, 1996. |
論文全文使用權限 |
如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信