Efficent Key Distribution Schemes for Digital Mobile Communications
碩士 === 國立臺灣科技大學 === 資訊管理系 === 88 === Wireless communication increasingly establishes a convenient environment for mobile people to interact, as mobile devices are rapidly spreading and the telecommunication industry is gradually privatized. Since the third generation of mobile systems will enhance t...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2000
|
Online Access: | http://ndltd.ncl.edu.tw/handle/74646396838061718035 |
id |
ndltd-TW-088NTUST396005 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-088NTUST3960052016-01-29T04:18:54Z http://ndltd.ncl.edu.tw/handle/74646396838061718035 Efficent Key Distribution Schemes for Digital Mobile Communications 適用於數位行動通訊之金鑰分配機制 Ya-wen Lee 李雅文 碩士 國立臺灣科技大學 資訊管理系 88 Wireless communication increasingly establishes a convenient environment for mobile people to interact, as mobile devices are rapidly spreading and the telecommunication industry is gradually privatized. Since the third generation of mobile systems will enhance the communication speed, better and faster services could be expected. Wireless communications broadcast through public channels so that all can retrieve the data in an airwave form. However, it is desired that only legal users can access the data, which requires authenticating legal users. That is, only authenticated users can be granted the privileges of system resources and services. Current literature has proposed conference key distribution schemes for wireless communications. Although these previous works enable a group of people to set up an electronic conference, however, some opinions could be suppressed with the identities of participants disclosed. Therefore, this thesis aims at conference key distribution schemes that maintain the secrecy of interactions as well as the anonymity of participants. In addition to the two essential requirements, the thesis attempts to achieve feasibility and efficiency. To sum up, the proposed schemes in this thesis are characterized as follows: (1)They can integrate with current wireless systems. (2)Both mobile stations and servers expend little computational cost. (3)Identities of all the participants are hidden from each other in a session/conference. (4)In key distribution, mobile stations are verified with their shared session/conference keys. Tzong-Chen Wu Deng-Lin Lu 吳宗成 盧登臨 2000 學位論文 ; thesis 53 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣科技大學 === 資訊管理系 === 88 === Wireless communication increasingly establishes a convenient environment for mobile people to interact, as mobile devices are rapidly spreading and the telecommunication industry is gradually privatized. Since the third generation of mobile systems will enhance the communication speed, better and faster services could be expected.
Wireless communications broadcast through public channels so that all can retrieve the data in an airwave form. However, it is desired that only legal users can access the data, which requires authenticating legal users. That is, only authenticated users can be granted the privileges of system resources and services.
Current literature has proposed conference key distribution schemes for wireless communications. Although these previous works enable a group of people to set up an electronic conference, however, some opinions could be suppressed with the identities of participants disclosed. Therefore, this thesis aims at conference key distribution schemes that maintain the secrecy of interactions as well as the anonymity of participants.
In addition to the two essential requirements, the thesis attempts to achieve feasibility and efficiency. To sum up, the proposed schemes in this thesis are characterized as follows:
(1)They can integrate with current wireless systems.
(2)Both mobile stations and servers expend little computational cost.
(3)Identities of all the participants are hidden from each other in a session/conference.
(4)In key distribution, mobile stations are verified with their shared session/conference keys.
|
author2 |
Tzong-Chen Wu |
author_facet |
Tzong-Chen Wu Ya-wen Lee 李雅文 |
author |
Ya-wen Lee 李雅文 |
spellingShingle |
Ya-wen Lee 李雅文 Efficent Key Distribution Schemes for Digital Mobile Communications |
author_sort |
Ya-wen Lee |
title |
Efficent Key Distribution Schemes for Digital Mobile Communications |
title_short |
Efficent Key Distribution Schemes for Digital Mobile Communications |
title_full |
Efficent Key Distribution Schemes for Digital Mobile Communications |
title_fullStr |
Efficent Key Distribution Schemes for Digital Mobile Communications |
title_full_unstemmed |
Efficent Key Distribution Schemes for Digital Mobile Communications |
title_sort |
efficent key distribution schemes for digital mobile communications |
publishDate |
2000 |
url |
http://ndltd.ncl.edu.tw/handle/74646396838061718035 |
work_keys_str_mv |
AT yawenlee efficentkeydistributionschemesfordigitalmobilecommunications AT lǐyǎwén efficentkeydistributionschemesfordigitalmobilecommunications AT yawenlee shìyòngyúshùwèixíngdòngtōngxùnzhījīnyàofēnpèijīzhì AT lǐyǎwén shìyòngyúshùwèixíngdòngtōngxùnzhījīnyàofēnpèijīzhì |
_version_ |
1718168051232276480 |