Tunghai University Institutional Repository:Item 310901/5032
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 21921/27947 (78%)
造访人次 : 4206375      在线人数 : 414
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://140.128.103.80:8080/handle/310901/5032


    题名: 建構於階層式架構上的秘密分享機制
    其它题名: Efficient Secret Sharing with Access Structures in a Hierarchy
    作者: 李威
    Lee, Wei
    贡献者: 林祝興
    Lin, Chu-Hsing
    東海大學資訊工程學系
    关键词: 秘密分享;存取架構;階層式金鑰管理;離散對數;單項雜湊函數;對稱式加密
    secret sharing;access structures;hierarchical key management;discrete logarithm;one-way hash function;symmetric key cryptography
    日期: 2004
    上传时间: 2011-05-19T07:32:37Z (UTC)
    摘要: Secret sharing with access structures in a hierarchy has two properties. First, each group wants to communicate with the others, the participants in the group need to share their secrets based upon access structures. Second, groups are divided into several levels, and each level has its own ancestors and descendants. Based upon the properties of hierarchical key management, only the ancestor groups can hold the descendant groups’ secret keys. In this paper, we suggest two approaches to solve the problem of secret sharing with access structures in a hierarchy. In the first approach, we use the concept of discrete logarithm to reuse shadows, and we adopt Cho’s mechanism to achieve the properties of hierarchical key management. The drawback of the first approach is to spend a lot of time on computation. In the second approach, we use one way hash function to allow the shadows to be reused, and we use the symmetric key cryptography to achieve the properties of hierarchical key management. The second approach is more efficient than the first one. The presented schemes are based upon general hierarchies. They are suitable for many real applications. For example, a business with hierarchical organization can use the proposed schemes to transmit documents and data, and military departments can exchange their reports by the proposed schemes to achieve the properties of hierarchical access control and secret sharing.
    显示于类别:[資訊工程學系所] 碩士論文

    文件中的档案:

    没有与此文件相关的档案.



    在THUIR中所有的数据项都受到原著作权保护.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈