Font Size: a A A

Research On The Conference-key Establishment Under Broadcast Channel And Its Applications

Posted on:2005-12-19Degree:DoctorType:Dissertation
Country:ChinaCandidate:J MaoFull Text:PDF
GTID:1118360152471376Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Key establishment is the central problem in communication and network security. With the increase in bandwidth, size, and application of large group communication, a growing application area in network is conference-key establishment. Conference-key establishment is the precondition to hold secure electronic conference via insecure channel. The security and justice of digital goods transaction is emerging as a commonly concerned issue, with the propagation of digital products (such as music, video). Broadcast encryption and traitor tracing are important techniques to achieve these requirements, and their kernel is conference-key establishment protocol. There are still several drawbacks in the research on conference-key establishment and its applications, such as partition of subsets, adaptability of dynamic condition, storage of the private key, distributed conference-key agreement, anonymity of the conference-key establishment, copyright protection and privacy protection issues, etc. Based on the detailed summarization and analysis of related literatures, a further research on conference-key establishment among group communication and its applications is done in this thesis, aiming at the drawbacks presented above, and the following results are achieved: 1. By using the secret sharing scheme based on MDS code as the basic component, a new provably secure distributed conference-key agreement protocol under the broadcast channel is proposed. The scheme is efficient, robust and adaptive scalable. 2. Different from the traditional off-line secret share distribution, an online verifiable conference-key distribution scheme under the broadcast channel is presented, which is based on the signcrypt and distribute secret share to participants online. 3. With respect to the dynamic changes in group-communication, an efficient secure dynamic conference-key management model is proposed, which is dealing with the authentication, revocation efficiently and assuring the forward security and backward security of group communication during the dynamic changes occurring. 4. An efficient anonymous conference-key distribution protocol based on MDS code is presented. According to the dynamic characteristic of electronic conference, the scheme adapts the dynamic changes efficiently and perfectly. 5. By researching the traitor-tracing scheme, which is the application of conference-key establishment in copyright protection, a traceable model for privacy protection in the E-commerce of digital products is proposed for the first time. 6. Oblivious key exchange and distribution and its application is studied. Several faire digital products transaction scheme with privacy protection is proposed.
Keywords/Search Tags:Information Security, Secret Sharing, Conference-Key Establishment, Signcrypt, Privacy Protection, Traitor Tracing, Oblivious Transfer, MDS code
PDF Full Text Request
Related items