关于论文使用授权的说明 | 第1-5页 |
西南交通大学学位论文创新性声明 | 第5-7页 |
摘要 | 第7-10页 |
ABSTRACT | 第10-17页 |
CHAPTER 1 INTRODUCTION | 第17-29页 |
·INFORMATION SECURITY AND CRYPTOGRAPHY | 第17-21页 |
·Open Networks and Information Security Threats | 第17-19页 |
·Secure Communication Model and Cryptosystems | 第19-21页 |
·KEY MANAGEMENT IN OPEN DISTRIBUTED NETWORKS | 第21-23页 |
·Significance of Key Management | 第21-22页 |
·Problems and Methods in Key Management | 第22-23页 |
·One Example of Applications | 第23页 |
·STATE OF THE ART IN KEY MANAGEMENT | 第23-26页 |
·Cooperative Secret Key Generation | 第23-24页 |
·Secret Key Sharing | 第24页 |
·Key Distribution | 第24-25页 |
·Group Key Agreement | 第25-26页 |
·ORIGINAL ASPECTS AND THE ORGANIZATION OF THE THESIS | 第26-29页 |
·Original Aspects and Contributions of the Thesis | 第26-28页 |
·Organization of the Thesis | 第28-29页 |
CHAPTER 2 SECRET KEY GENERATION | 第29-46页 |
·GENERAL CONCEPTS ON KEY GENERATION | 第29-38页 |
·Requirements for Key Length | 第29-31页 |
·Information Entropy of Key | 第31-33页 |
·Random Requirements for Key Generation | 第33-34页 |
·Unpredictability | 第34-36页 |
·Comparison between F-sequences and M-sequences | 第36-38页 |
·COOPERATIVE KEY GENERATION | 第38-46页 |
·Motivation of Cooperative Key Generation | 第38-39页 |
·A New Cooperative RSA Key Generation Scheme | 第39-40页 |
·Description of the Proposed Scheme | 第40页 |
·Distributed Algorithm to Generate Modulus N | 第40-41页 |
·Primality Testing | 第41-42页 |
·Generation of Exponent | 第42-43页 |
·An Illustrative Example | 第43-44页 |
·Summary | 第44-46页 |
CHAPTER 3 ACCESS LEVEL-BASED KEY DISTRIBUTION SCHEME BASED ON SEMIGROUP THEORY | 第46-57页 |
·CONCEPTS AND NOTATIONS | 第46-49页 |
·A PREVIOUS SCHEME AND ITS SECURITY | 第49-50页 |
·THE PROPOSED KEY DISTRIBUTION SCHEME BASED ON SEMIGROUP THEORY | 第50-51页 |
·Secret Key Distribution Process | 第50-51页 |
·Secret Key Reconstruction | 第51页 |
·SECURITY AND IMPLEMENTATION ISSUES | 第51-53页 |
·ILLUSTRATION EXAMPLES | 第53-55页 |
·Unequal Access Levels | 第53-55页 |
·Equal access levels | 第55页 |
·CONCLUDING REMARKS | 第55-57页 |
CHAPTER 4 ACCESS KEY DISTRIBUTION SCHEME | 第57-64页 |
·ACCESS CONTROL | 第57页 |
·EXISTING ACCESS KEY CONTROL SCHEMES AND THEIR LIMITATIONS | 第57-58页 |
·AN IMPROVED SCHEME | 第58-62页 |
·Preliminary | 第58-60页 |
·Access Key Generation Algorithm | 第60-61页 |
·Key derivation algorithm | 第61页 |
·Dynamic access control | 第61-62页 |
·SECURITY AND ANALYSIS | 第62页 |
·COMPLEXITY ANALYSIS | 第62-63页 |
·CONCLUDING REMARKS | 第63-64页 |
CHAPTER 5 VERIFIABLE SECRET KEY SHARING SCHEME | 第64-75页 |
·CONCEPTS AND CLASSIFICATION OF SECRET SHARING SCHEMES | 第64-68页 |
·Concepts of Secret Sharing Scheme | 第64-66页 |
·Classification of Secret Sharing Schemes | 第66-68页 |
·EXISTING THRESHOLD SECRET SHARING SCHEMES AND THEIR LIMITATIONS | 第68页 |
·A NEW VERIFIABLE SECRET SHARING SCHEME WITH THRESHOLD ACCESS STRUCTURE | 第68-72页 |
·The Model and Notations | 第69页 |
·Zero knowledge proof protocol | 第69-70页 |
·Shadow generation | 第70-72页 |
·Algorithm of Reconstruction | 第72页 |
·SECURITY ANALYSIS | 第72-74页 |
·General security | 第72-73页 |
·Detection of cheaters | 第73-74页 |
·CONCLUDING REMARK | 第74-75页 |
CHAPTER 6 GROUP KEY AGREEMENT PROTOCOL | 第75-90页 |
·CONCEPTS AND MOTIVATION | 第75-78页 |
·Application Background | 第75-77页 |
·Related Works and Motivations | 第77-78页 |
·A KEY AGREEMENT PROTOCOL BASED ON S-MULTIPLICATION | 第78-83页 |
·Three order LFSR sequences and S-multiplication | 第78-80页 |
·GH-2 party Key Exchange Protocol (GH-KEP) | 第80页 |
·Parameter Selection of GH-2 parties Key Exchange Protocol | 第80-81页 |
·Security of GH-2 party Key Exchange Protocol (GH-KEP) | 第81-82页 |
·Proposed Group Key Agreement Protocol | 第82-83页 |
·PERFORMANCE ANALYSIS AND DISCUSSIONS ON THE PROPOSED PROTOCOL | 第83-86页 |
·Security Analysis | 第83-85页 |
·Efficiency Analysis | 第85-86页 |
·DYNAMIC GROUP PROTOCOL | 第86-87页 |
·AUTHENTICATION METHOD | 第87-88页 |
·CONCLUDING REMARKS | 第88-90页 |
CHAPTER 7 CONCLUSIONS AND FUTURE DIRECTIONS | 第90-94页 |
·CONTRIBUTIONS OF THE THESIS | 第90-93页 |
·RECOMMENDATION FOR FURTHER RESEARCH | 第93-94页 |
ACKNOWLEDGMENTS | 第94-95页 |
APPENDIX 1. LIST OF ABBREVIATIONS | 第95-96页 |
APPENDIX 2. LIST OF BASIC SYMBOLS AND NOTATIONS | 第96-97页 |
REFERENCES | 第97-103页 |
LIST OF PUBLICATIONS AND PARTICIPATED PROJECTS | 第103-104页 |