English  |  正體中文  |  简体中文  |  Items with full text/Total items : 78852/78852 (100%)
Visitors : 37017253      Online Users : 344
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/8522


    Title: 商業性金鑰恢復與金鑰託管機制之研究;The Research on Commercial Key Recovery and Key Escrow Mechanisms
    Authors: 張明聖;Ming-Shen Chang
    Contributors: 資訊工程研究所
    Keywords: 機密性;金鑰託管;商業性金鑰恢復;隱私權;Confidentiality;Key escrow;Commercial key recovery;Privacy
    Date: 2001-07-01
    Issue Date: 2009-09-22 11:29:14 (UTC+8)
    Publisher: 國立中央大學圖書館
    Abstract: 近年來,金鑰恢復 (Key recovery) 在密碼相關研究領域裡逐漸成為㆒ 熱絡討論的議題。此議題起源於1992 年Micali 所提出"公正之公開金鑰密碼系統"(Fair public key cryptosystem)。但是引起廣泛的注意與探討則是在隔年 (1993 年) 美國政府計劃發展㆒套託管加密標準及金鑰託管系統(Escrow Encryption Standard / Key Escrow System)。在本論文裡,將會提出㆒新型態之商業性金鑰恢復機制以及㆒具有時效性之金鑰託管系統。 密碼理論的使用主要目的是為了保障資料的機密性及相關個㆟隱私權的保護,透過加密器的運用,使用者可以將資料轉換成安全的密文。而金鑰在整個加密/解密過程裡扮演㆒關鍵性的角色。因此,將金鑰妥善保管並確保其可用性是絕對必要的,這也是金鑰恢復機制所要達到的目的。直至目前為止,已有許多的金鑰恢復機制被發表於文獻㆖,在論文的第㆓章,將會針對幾個文獻㆖著名的金鑰恢復系統進行回顧。 而在論文的第㆔章裡,將會提出㆒全新之商業性金鑰恢復機制。其不同於文獻㆖其他金鑰恢復系統之特點,主要是在於金鑰恢復機構 (Key Recovery Agent) 並不允許得知使用者所欲恢復的金鑰。另㆒方面,高效率的金鑰恢復服務以及高度可行性(實用性)亦是此金鑰恢復機制的兩個 重要特性。除此之外,本章也將介紹㆒些在文獻㆖具實用價值之密碼應用 並且和本論文所提出之金鑰恢復機制整合,提供有效率之金鑰恢復服務。 本論文的第㆓個主題是關於發展㆒具時效性之金鑰託管系統。所謂"具時效性"即是將政府機構合法監聽的權力限定在某㆒個特定的時間期限內。政府合法監聽機構 (Law Enforcement Agent, LEA) 無法從合法獲得 的使用者秘密金鑰去猜測使用者其他時限的金鑰,進行非法監聽。在論文 的第㆕章裡,將會提出㆒符合具時效性定義之金鑰託管系統 Recently, key recovery has become a popular issue of cryptographic research. The problem of key recovery was first considered in 1992 by Micali. Subsequently, key recovery received much attention and was widely discussed because of the notions of Escrow Encryption Standard and Key Escrow System developed by the U.S. government. In this thesis, a new type of commercial key recovery scheme and a key escrow scheme with limited time span are developed. A major motivation of using cryptography comes from the requirement of protecting confidentiality and privacy. The keys employed in a cryptography play the most important role in the above requirement. Hence, it should be protected carefully and should ensure high usability. Key recovery mechanisms can chieve this goal. Up to now, a lot of related works can be found in the literature. In Chapter 2, a brief review of these schemes are given. In Chapter 3, a new type of commercial key recovery mechanism is developed in which it is emphasized that a key recovery agent is not permitted to learn any sensitive keys. Efficiency and practicability are two of the most important features in the proposed key recovery system. Also, we illustrate some possible cryptographic applications based on this commercial key recovery environment. Another topic considered in this thesis is the key escrow system with limited time span. The concept of limited time span is to restrict the authority of wiretapping within a specific time instance. It should disable a LEA to recover any previous or following private keys of a user. In Chapter 4, a genuine key escrow scheme with limited time span is proposed.
    Appears in Collections:[Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation

    Files in This Item:

    File SizeFormat


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明