Anonymous Authentication Based on Searchable Encrypted Keyword Schemes

碩士 === 國立中興大學 === 資訊科學與工程學系 === 104 === Protecting private data becomes a major issue in modern society. There are many ways to achieve privacy preserving, including the use of proxy or group signatures. In recent years, some protocols let servers authenticate user’s privellge without knowing user’s...

Full description

Bibliographic Details
Main Authors: Hsin-Wei Chou, 周新偉
Other Authors: Gwo-boa Horng
Format: Others
Language:zh-TW
Published: 2016
Online Access:http://ndltd.ncl.edu.tw/handle/21665550668659355826
id ndltd-TW-104NCHU5394042
record_format oai_dc
spelling ndltd-TW-104NCHU53940422017-01-11T04:08:09Z http://ndltd.ncl.edu.tw/handle/21665550668659355826 Anonymous Authentication Based on Searchable Encrypted Keyword Schemes 植基於關鍵字密文可搜尋法之匿名驗證 Hsin-Wei Chou 周新偉 碩士 國立中興大學 資訊科學與工程學系 104 Protecting private data becomes a major issue in modern society. There are many ways to achieve privacy preserving, including the use of proxy or group signatures. In recent years, some protocols let servers authenticate user’s privellge without knowing user’s identity, but many of them only offer limited times authentication with a server or do not privide methods for servers to revoke malicious users. In this thesis we utilize searchable encryption and Diffie-Hellman key exchange schemes to achieve anonymous authentication. Our protocol provides unlimited times authentication to free users from the inconvenience of constantly asking TTP for tokens. Gwo-boa Horng 洪國寶 2016 學位論文 ; thesis 39 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中興大學 === 資訊科學與工程學系 === 104 === Protecting private data becomes a major issue in modern society. There are many ways to achieve privacy preserving, including the use of proxy or group signatures. In recent years, some protocols let servers authenticate user’s privellge without knowing user’s identity, but many of them only offer limited times authentication with a server or do not privide methods for servers to revoke malicious users. In this thesis we utilize searchable encryption and Diffie-Hellman key exchange schemes to achieve anonymous authentication. Our protocol provides unlimited times authentication to free users from the inconvenience of constantly asking TTP for tokens.
author2 Gwo-boa Horng
author_facet Gwo-boa Horng
Hsin-Wei Chou
周新偉
author Hsin-Wei Chou
周新偉
spellingShingle Hsin-Wei Chou
周新偉
Anonymous Authentication Based on Searchable Encrypted Keyword Schemes
author_sort Hsin-Wei Chou
title Anonymous Authentication Based on Searchable Encrypted Keyword Schemes
title_short Anonymous Authentication Based on Searchable Encrypted Keyword Schemes
title_full Anonymous Authentication Based on Searchable Encrypted Keyword Schemes
title_fullStr Anonymous Authentication Based on Searchable Encrypted Keyword Schemes
title_full_unstemmed Anonymous Authentication Based on Searchable Encrypted Keyword Schemes
title_sort anonymous authentication based on searchable encrypted keyword schemes
publishDate 2016
url http://ndltd.ncl.edu.tw/handle/21665550668659355826
work_keys_str_mv AT hsinweichou anonymousauthenticationbasedonsearchableencryptedkeywordschemes
AT zhōuxīnwěi anonymousauthenticationbasedonsearchableencryptedkeywordschemes
AT hsinweichou zhíjīyúguānjiànzìmìwénkěsōuxúnfǎzhīnìmíngyànzhèng
AT zhōuxīnwěi zhíjīyúguānjiànzìmìwénkěsōuxúnfǎzhīnìmíngyànzhèng
_version_ 1718407685762711552