English  |  正體中文  |  简体中文  |  Items with full text/Total items : 74010/74010 (100%)
Visitors : 24071566      Online Users : 320
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/66876

    Title: 具有匿名撤銷之匿名憑證系統;An Anonymous Credential Scheme with Revocaiton of Anonymity
    Authors: 宋柏麟;Sung,Bo-Lin
    Contributors: 資訊工程學系
    Keywords: 匿名憑證;匿名撤銷;Anonymous Credential System;Revocation;Anonymity
    Date: 2014-11-24
    Issue Date: 2015-03-16 15:57:37 (UTC+8)
    Publisher: 國立中央大學
    Abstract: 現今有許多電子互動行為日常生活中廣泛發生,然而,這些行為可能會產生個人隱私洩漏的危害。為了這項目的,匿名憑證系統隨之誕生。匿名憑證系統允許使用者在電子交易行為中同時保護使用者的隱私安全。在匿名憑證系統中,使用者可以從信賴的機構得到一個憑證,進而向服務提供端證明此憑證合法性與滿足服務提供端所需之屬性且過程中不洩漏使用者除了身份外的任何資訊。而現存匿名憑證系統在此步驟通常使用零知識證明來達到保護使用者隱私不被服務提供端所獲取,然而零知識證明的運算量會隨著要證明的屬性數量呈線性成長。此外現存匿名憑證系統也缺乏有效利用的匿名撤銷機制。


    ;Anonymous credential systems promise efficient, and ubiquitous access
    to digital services while preserving user′s privacy.
    In an anonymous credential system, a user Alice can obtain credentials from
    an organization, and she can prove to the verifier that she has been given
    appropriate credentials without revealing any information about her identity.
    And the technique of zero-knowledge proof is adopted in existing anonymous
    credential systems to protect the attributes from being known by the verifiers.
    However, the computation of zero-knowledge proof will increase linearly with
    the number of attributes. And the existing anonymous credential systems are
    lake of effective revocation approaches.

    In this thesis, an efficient anonymous credential system with revocation is
    proposed, and the technique of chameleon hash is adopted to replace complex
    zero-knowledge proof for performance improvement. In addition, we use the
    concept of group signatures to implement a practical approach of revocation
    to overcome the disadvantage of existing anonymous credential systems.
    Appears in Collections:[資訊工程研究所] 博碩士論文

    Files in This Item:

    File Description SizeFormat

    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback  - 隱私權政策聲明