中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Item 987654321/74685
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 80990/80990 (100%)
Visitors : 41645384      Online Users : 1351
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/74685


    Title: 基於代理人重加密技術之秘密資料存取系統;Secret Data Access Based on Proxy Re-encryption
    Authors: 陳學呈;Chen, Hsueh-Cheng
    Contributors: 資訊工程學系
    Keywords: 代理人重加密系統;雲端資料分享;proxy re-encryption;data sharing
    Date: 2017-07-25
    Issue Date: 2017-10-27 14:36:11 (UTC+8)
    Publisher: 國立中央大學
    Abstract: 隨著現今許多資料開始數位化,如相片、影片、書籍等等,使用者的個人電腦可能因儲存空間的不足,而傾向於將資料儲存於雲端儲存設備中。然而,使用者並非直接將檔案上傳至雲端,而是會將檔案加密後才將此檔案上傳,但這樣造成了使用者在處理檔案分享時許多負擔。使用代理人重加密的系統能讓授權人 (delegator) 藉由一位代理人 (proxy) 的幫助下,減輕授權人的運算負擔,當代理人獲得由授權人產生之被授權人 (delegatee) 的重加密金鑰 (re-encryption key) 後,代理人能夠將授權人的密文轉換成針對被授權人的密文,並且密文經由代理人的轉換過程,並不會洩漏給代理人關於該密文的任何明文資訊。由於重加密金鑰的能力太過於強大,代理人能夠將授權人所有的密文都轉換給被授權人,造成了授權人在權限管理的不便。在現實的應用狀況,授權人可能只希望將某一份密文轉換給被授權人,而不是授權人的所有密文,這樣的缺點使代理人重加密系統變得不切實際。
    在本論文中,我們檢驗現有的代理人重加密系統的安全性,並且提出一個讓授權人妥善較好管理代理人轉換能力的系統,該系統能抵抗金鑰揭露攻擊 (key exposure attack) ,且解密授權人的密文與轉換給被授權人的密文都只需要同一種解密演算法 (universal decryption) 就可以完成解密。;Proxy re-encryption schemes enable users to share their digital content with other
    parties in a more e cient way. In existing proxy re-encryption schemes, the security
    issues of key exposure attack and unauthorized re-encryption and the performance
    challenges have been extensively considered for years. In this thesis, we point out
    some security
    aws that occurred in certain famed proxy re-encryption schemes and
    propose a secret data system based on an improved proxy re-encryption scheme with
    access control. In addition, the proposed scheme can withstand an adversary from
    chosen-ciphertext attack.
    Appears in Collections:[Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML200View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明