Loading...
|
Please use this identifier to cite or link to this item:
http://140.128.103.80:8080/handle/310901/29195
|
Title: | 基於橢圓曲線密碼技術下一個新型n選t 類型的模糊傳輸協定 |
Other Titles: | A Novel t-out-of-n Oblivious Transfer Protocol Based on Elliptic Curve Cryptography |
Authors: | 沈怡庭 SHEN,YI-TING |
Contributors: | 余心淳 YU,HSIN-CHUN 資訊管理學系 |
Keywords: | 資訊安全;模糊傳輸;橢圓曲線密碼系統;Cantor配對函數 information security;oblivious transfer;elliptic curve cryptosystem;Cantor pairing function |
Date: | 2016 |
Issue Date: | 2017-07-17T05:51:34Z (UTC)
|
Abstract: | 由於網路是一個公開且透明的環境,透過網路進行通訊時,可能潛藏許多危機與攻擊,因此必須藉由密碼系統來保護通訊雙方的隱私安全,而模糊傳輸協定被視為密碼學中重要的基礎通訊技術,主要是因為模糊傳輸的機制可以被應用在許多方面,例如:電子商務、秘密資料交換、電子契約等等。在n選t的模糊傳輸協定中,傳送方擁有n個訊息,接收方可以選擇其中t個訊息,但傳送方無法得知接收方選擇的是哪t個訊息,接收方也無法得知其餘未選擇的n-t個訊息內容為何。將橢圓曲線密碼系統應用到模糊傳輸協定上,以點運算取代指數運算,相較於其它的密碼系統,不僅可以減少計算量,同時也可強化協定的安全性。現今基於橢圓曲線密碼系統的模糊傳輸協定可區分為「先加密訊息後計算金鑰」與「先計算金鑰後加密訊息」二個運作模式。「先加密訊息後計算金鑰」是現今最普遍的模糊傳輸機制,無論是在2選1模糊傳輸協定、n選1模糊傳輸協定與n選t模糊傳輸協定的問題上已經有許多演算法與傳輸協定的導出與討論,但是在「先計算金鑰後加密訊息」的模式下,目前大部分相關的文獻中只有針對2選1模糊傳輸協定與n選1模糊傳輸協定的問題上有所討論,對於更為實用與複雜的n選t模糊傳輸協定的問題上缺乏完整的研究討論與設計實現。因此本論文特別針對此一問題,提出一個可基於橢圓曲線密碼系統技術下「先計算金鑰後加密訊息」模式下的n選t模糊傳輸協定。本論文提出的n選t模糊傳輸協定除了利用橢圓曲線密碼系統的特性大幅降低了計算量之外,亦使用數學上Cantor配對函數來設計金鑰,以有效地區分出t個要選取與解密的訊息,但本協定的整體訊息傳輸量仍高於一般「先加密訊息後計算金鑰」模式下的n選t模糊傳輸協定,因此在本論文中進一步延伸討論如何將Cantor配對函數應用至模糊傳輸的協定上,以降低訊息的總傳輸量,使n選t模糊傳輸能更能符合實際應用上高安全性、高效率與低頻寬的需求。 The Internet is an open, public and transparent environment in which various security threats and malicious attack are hidden during communications. Cryptosystems are therefore utilized for protecting the privacy of communication parties. An oblivious transfer protocol has been regarded as an important secure communication technique in cryptology, mainly because the oblivious transfer mechanism could be applied to e-commerce, confidential information exchange, e-contract, and so on. In the t-out-of-n oblivious transfer protocol, the sender possesses n pieces of information, from which the receiver could choose t pieces of information. However, the sender could not know which information is selected by the receiver and the receiver does not know the contents of the rest n-t pieces of information. Comparing to other cryptosystems, applying elliptic curve cryptosystems to the oblivious transfer protocol and replacing exponent operations with point operations not only could reduce the computational cost of oblivious transfer but also reinforce the protocol security.Current elliptic curve cryptosystem based oblivious transfer systems could be divided into the operation models of “first encrypting message and then calculating the key” and “first calculating the key and then encrypting message”. The former is the commonest oblivious transfer mechanism currently, with which 1-out-of-2, 1-out-of-n, and t-out-of-n oblivious transfer protocols have been derived from various algorithms and transfer protocols and discussed. Nevertheless, most research, under the model of “first calculating the key and then encrypting message”, focuses on 1-out-of-2 and 1-out-of-n oblivious transfer protocols. More practical and complicated t-out-of-n problems are lack of complete research discussion and design implementation. Aiming at such a problem, the t-out-of-n oblivious transfer protocol based on the model of “first calculating the key and then encrypting information” under the elliptic curve cryptosystem technology is proposed in this study.In addition to largely reducing the calculation amount with the characteristics of elliptic curve cryptosystems, the proposed t-out-of-n oblivious transfer protocol also designs the key with Cantor pairing function to effectively distinguish t pieces of selected and decrypted information. Nonetheless, the overall information transfer amount through this protocol is higher than general t-out-of-n oblivious transfer protocols under the model of “first encrypting message and then calculating the key”. The application of Cantor pairing function to oblivious transfer protocols is therefore extended in this study to reduce the total information transfer amount and allow t-out-of-n oblivious transfer better conforming to the practical requirements of high security, high efficiency, and low bandwidth. |
Appears in Collections: | [資訊管理學系所] 碩士論文
|
Files in This Item:
File |
Description |
Size | Format | |
104THU00396007-001.pdf | | 1504Kb | Adobe PDF | 106 | View/Open |
|
All items in THUIR are protected by copyright, with all rights reserved.
|