A Study on Non-repudiation and Lawful Access Mechanisms
|關鍵字:||Information Security;Non-repudiation;Lawful Access;Key Recovery;Key Escrow;International Standard;資訊安全;不可否認性;依法取用;金鑰回復;金鑰代管;國際標準|
Due to the explosive growth of electronic businesses on the Internet, security has become increasingly important. Four security services are conducted as fundamental requirements for information security. These are authentication, confidentiality, integrity, and non-repudiation. In this dissertation, the author focuses on two subjects of the non-repudiation service requirement: non-repudiation protocols, and lawful access mechanisms. Focusing on the first subject-non-repudiation protocols, the author proposes three non-repudiation protocols with different security and effective issues. Furthermore, the author introduces a centralized evidence management scheme that could improve the following properties. First, the author alleviates the assumption that trusted delivery agents are unconditionally trusted by all entities involved in the transaction. Second, the author reduces the overhead for users in managing evidence. Finally, the proposed scheme strengthens the ability of preventing evidence from being forged. Focusing on the second subject-lawful access mechanisms, the author proposes two key recovery protocols, which are suitable for symmetric and asymmetric key cryptosystems . Key recovery systems have been widely studied in network security. In such systems, a copy of the decryption key for each user is escrowed by one or more trusted parties, and is available if a warrant is issued for it. In this study, the author proposes two novel key recovery systems. Furthermore, this method could resolve the time span problem in the conventional key recovery systems at the same time. Based on the results obtained from these two research subjects , the author has contributed innovative ideas to the non-repudiation service. The purpose of the schemes in this dissertation is to maintain evidence and track behavior in the Internet virtual society to prevent computer crimes. Based on the results obtained from the two research subjects aforementioned, the author has contributed innovative ideas to the non-repudiation service. The purport of schemes in this dissertation is to keep the evidence and the tracks of behavior in the Internet virtual sociality for preventing computer crimes.
|Appears in Collections:||Thesis|