Anonymous Authentication Based on Searchable Encrypted Keyword Schemes
碩士 === 國立中興大學 === 資訊科學與工程學系 === 104 === Protecting private data becomes a major issue in modern society. There are many ways to achieve privacy preserving, including the use of proxy or group signatures. In recent years, some protocols let servers authenticate user’s privellge without knowing user’s...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2016
|
Online Access: | http://ndltd.ncl.edu.tw/handle/21665550668659355826 |
id |
ndltd-TW-104NCHU5394042 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-104NCHU53940422017-01-11T04:08:09Z http://ndltd.ncl.edu.tw/handle/21665550668659355826 Anonymous Authentication Based on Searchable Encrypted Keyword Schemes 植基於關鍵字密文可搜尋法之匿名驗證 Hsin-Wei Chou 周新偉 碩士 國立中興大學 資訊科學與工程學系 104 Protecting private data becomes a major issue in modern society. There are many ways to achieve privacy preserving, including the use of proxy or group signatures. In recent years, some protocols let servers authenticate user’s privellge without knowing user’s identity, but many of them only offer limited times authentication with a server or do not privide methods for servers to revoke malicious users. In this thesis we utilize searchable encryption and Diffie-Hellman key exchange schemes to achieve anonymous authentication. Our protocol provides unlimited times authentication to free users from the inconvenience of constantly asking TTP for tokens. Gwo-boa Horng 洪國寶 2016 學位論文 ; thesis 39 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中興大學 === 資訊科學與工程學系 === 104 === Protecting private data becomes a major issue in modern society. There are many ways to achieve privacy preserving, including the use of proxy or group signatures.
In recent years, some protocols let servers authenticate user’s privellge without knowing user’s identity, but many of them only offer limited times authentication with a server or do not privide methods for servers to revoke malicious users. In this thesis we utilize searchable encryption and Diffie-Hellman key exchange schemes to achieve anonymous authentication. Our protocol provides unlimited times authentication to free users from the inconvenience of constantly asking TTP for tokens.
|
author2 |
Gwo-boa Horng |
author_facet |
Gwo-boa Horng Hsin-Wei Chou 周新偉 |
author |
Hsin-Wei Chou 周新偉 |
spellingShingle |
Hsin-Wei Chou 周新偉 Anonymous Authentication Based on Searchable Encrypted Keyword Schemes |
author_sort |
Hsin-Wei Chou |
title |
Anonymous Authentication Based on Searchable Encrypted Keyword Schemes |
title_short |
Anonymous Authentication Based on Searchable Encrypted Keyword Schemes |
title_full |
Anonymous Authentication Based on Searchable Encrypted Keyword Schemes |
title_fullStr |
Anonymous Authentication Based on Searchable Encrypted Keyword Schemes |
title_full_unstemmed |
Anonymous Authentication Based on Searchable Encrypted Keyword Schemes |
title_sort |
anonymous authentication based on searchable encrypted keyword schemes |
publishDate |
2016 |
url |
http://ndltd.ncl.edu.tw/handle/21665550668659355826 |
work_keys_str_mv |
AT hsinweichou anonymousauthenticationbasedonsearchableencryptedkeywordschemes AT zhōuxīnwěi anonymousauthenticationbasedonsearchableencryptedkeywordschemes AT hsinweichou zhíjīyúguānjiànzìmìwénkěsōuxúnfǎzhīnìmíngyànzhèng AT zhōuxīnwěi zhíjīyúguānjiànzìmìwénkěsōuxúnfǎzhīnìmíngyànzhèng |
_version_ |
1718407685762711552 |