完整後設資料紀錄
DC 欄位語言
dc.contributor.author劉易儒en_US
dc.contributor.author曾文貴en_US
dc.date.accessioned2014-12-12T03:10:17Z-
dc.date.available2014-12-12T03:10:17Z-
dc.date.issued2006en_US
dc.identifier.urihttp://140.113.39.130/cdrfb3/record/nctu/#GT009455634en_US
dc.identifier.urihttp://hdl.handle.net/11536/82148-
dc.description.abstract在此篇論文中,我們提出了兩個公開金鑰廣播加密系統;第一種方法,我們把它稱為BE-PI,它能夠達到O( r )的表頭長度(Header Size)、O( r )的計算量、O( 1 )的公開金鑰儲存量及O(1) 的私密金鑰儲存量,其中r代表註銷使用者個數,n代表使用者個數,這是首次在傳輸量O( r ) 的狀況下達到儲存量O(logn) 的公開金鑰廣播加密系統。另一種方法,我們把它稱做為 PK-SD-PI系統,它可以做到 O( r )的表頭長度,O( 1 )的公開金鑰儲存量及O(logn^2)的私密金鑰儲存量,但它只需要O( 1 )的計算量;此外,藉由和LSD類似的方式,我們可以再把它改變成PK-LSD-PI,並得到O( 1 )的公開金鑰儲存量、O(log^1+1/k)的私密金鑰儲存量及O( kr ) 表頭長度之間的取捨。另外,利用我們的方法,也能降低之前公開金鑰背叛者追蹤方法中,公開金鑰數量至O( 1 )。我們廣播加密的方法,在選擇明文攻擊模式下(CPA),具有抵擋完全共謀的安全性,經過些許改變,我們可以使我們系統達到抵擋選擇密文攻擊(CCA)的安全性。zh_TW
dc.description.abstractWe proposed two public-key broadcast encryption schemes. The first scheme, called the BE-PI scheme, has O( r ) header size, O( r ) computation cost, O( 1 ) public keys and O( 1 )private keys, where r is the number of revoked users and n is the number of users. This is the first public-key BE(broadcast encryption) scheme that with O(logn) private keys under O( r ) header size. The other scheme, we call it PK-SD-PI scheme, has O( r ) header size, O( 1 ) public keys,O(logn^2) private keys and only O( 1 ) computation cost. By using similar technique in LSD. We can convert it to PK-LSD-PI scheme, has O( 1 ) public keys and O(logn^1+1/k) private keys with kr header size tradeoff. Using our method, it also can reduce public key size to O( 1 ) in public traitor tracing scheme. Our BE system is static full-collusion resistant secure under chosen plain attack (CPA). With little modification, it can also against chosen cipher attack (CCA).en_US
dc.language.isoen_USen_US
dc.subject廣播加密zh_TW
dc.subject撤銷機制zh_TW
dc.subject背叛者追蹤zh_TW
dc.subjectBroadcast Encryptionen_US
dc.subjectRevocation Schemeen_US
dc.subjectTraitor Tracingen_US
dc.title低儲存量及常數計算量的公開金鑰廣播加密系統zh_TW
dc.titlePublic Key Broadcast Encryption with Low Number of Keys and Constant Decryption Timeen_US
dc.typeThesisen_US
dc.contributor.department資訊科學與工程研究所zh_TW
顯示於類別:畢業論文


文件中的檔案:

  1. 563401.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。