English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113311/144292 (79%)
Visitors : 50934248      Online Users : 921
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/153386
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/153386


    Title: ECQV 證書:整合秘密分享和批次驗證以提升隱私和效率
    Improved ECQV Implicit Certificates Providing Privacy Enhancement and Batch Verification
    Authors: 陳羽暉
    Chen, Yu-Hui
    Contributors: 左瑞麟
    Tso, Ray-Lin
    陳羽暉
    Chen, Yu-Hui
    Keywords: ECQV 憑證
    秘密分享
    批量驗證
    ECQV Certificate
    Secret Sharing
    Batch Verification
    Date: 2024
    Issue Date: 2024-09-04 15:01:09 (UTC+8)
    Abstract: 在物聯網(IoT)應用中,如智慧城市、智慧家庭,以及基於UTXO的區塊鏈如比特幣中,公開金鑰和相應的設備或地址是用戶的身份標識。利用證書授權機構(CA)頒發的證書,證明地址的所有權或身份。通常,如果有n個不同的地址,則需要n個不同的證書來綁定相同的身份,可能會花費過多的存儲空間和計算時間。劉等人通過擴展ECQV隱式憑證解決了這個問題。他們的方案使得ECQV憑證持有者能夠生成多個代理憑證和相應的公私鑰對,所有代理憑證都可供他人使用。此外,劉等人還提出了另一個方案,確保藉由ECQV憑證所生成的新憑證僅由ECQV憑證持有者使用。在本研究中,我們進一步改進了他們的方案,使用秘密分享技術解決第一個方案中的密鑰託管問題,並使第二個方案中的所有新憑證可進行批量驗證。這一增強可以顯著提高隱私性和性能。並且,我們進行了嚴格的安全性證明,以證明修改後方案的安全性。通過秘密分享技術解決密鑰託管問題和批量驗證的優勢,所提出的方案適合部署在物聯網和區塊鏈環境。
    In IoT such as smart cities, smart homes and UTXO-based blockchains such as Bitcoin, a public key and the corresponding device or address serve as the sole identifiers for a user. To prove ownership or an ID of the address, a certificate issued by a Certificate Authority (CA) is required. Generally, if there are n different addresses, then n different certificates binding the same identity are needed, which can be costly in terms of storage and expenses. Liu et al. solve this problem by extending an ECQV implicit certificate. Their scheme enables an ECQV certificate holder to generate proxy multiple credentials and corresponding key pairs, these proxy credentials are available for others to use. Furthermore, there is another scheme that make sure to ensure that the credentials are exclusively utilized by the ECQV certificate holder by Liu et al. In this paper, we further improve their schemes to fix the key escrow problem in the first scheme using secret sharing and make all the extended credentials batch verifiable in the second scheme. This enhancement can significantly improve privacy and performance. And also conduct a rigorous security proof to demonstrate the security of the modified scheme. With the secret sharing that fix the key escrow problem and the advantage of batch verification, the proposed scheme is highly suitable for deployment in IoT and blockchain environments.
    Reference: [1] Abhay Kumar Agrahari and Shirshu Varma. A provably secure rfid authentication protocol based on ecqv for the medical internet of things. Peer-to-Peer Networking and Applications, 14(3):1277–1289, 2021.
    [2] Abdullah M Almuhaideb and Sammar S Algothami. Ecqv-based lightweight revocable authentication protocol for electric vehicle charging. Big Data and Cognitive Computing, 6(4):102, 2022.
    [3] Abdullah M Almuhaideb and Sammar S Algothami. Efficient privacy-preserving and secure authentication for electric-vehicle-to-electric-vehicle-charging system based on ecqv. Journal of Sensor and Actuator Networks, 11(2):28, 2022.
    [4] An Braeken. Pairing free certificate based signcryption schemes using ecqv implicit certificates. KSII Transactions on Internet and Information Systems (TIIS), 13(3):1546–1565, 2019.
    [5] An Braeken, Ji-Jian Chin, and Syh-Yuan Tan. Ecqv-ibi: Identity-based identification with implicit certification. Journal of Information Security and Applications, 63:103027, 2021.
    [6] Daniel RL Brown, Robert Gallant, and Scott A Vanstone. Provably secure implicit certificate schemes. In Financial Cryptography: 5th International Conference, FC 2001 Grand Cayman, British West Indies, February 19–22, 2001 Proceedings 5, pages 156–165. Springer, 2002.
    [7] Miguel Castro, Barbara Liskov, et al. Practical byzantine fault tolerance. In OsDI, volume 99, pages 173–186, 1999.
    [8] Chun-I Fan, Pei-Hsiu Ho, and Yi-Feng Tseng. Strongly secure certificateless signature scheme supporting batch verification. Mathematical Problems in Engineering, 2014(1):854135, 2014.
    [9] Duy An Ha, Kha Tho Nguyen, and John K Zao. Efficient authentication of resourceconstrained iot devices based on ecqv implicit certificates and datagram transport layer security protocol. In Proceedings of the 7th Symposium on Information and Communication Technology, pages 173–179, 2016.
    [10] Wanling Huang, Jingqiang Lin, Qiongxiao Wang, Yajun Teng, Huiqing Wan, and Wei Wang. Certificate transparency for ecqv implicit certificates. In ICC 2021-IEEE International Conference on Communications, pages 1–6. IEEE, 2021.
    [11] Apurva S Kittur and Alwyn Roshan Pais. Batch verification of digital signatures: approaches and challenges. Journal of information security and applications, 37:15– 27, 2017.
    [12] Hee-Yong Kwon and Mun-Kyu Lee. Fast verification of signatures with shared ecqv implicit certificates. IEEE Transactions on Vehicular Technology, 68(5):4680–4694, 2019.
    [13] Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Peter Shaojui Wang, and Qin-Wen Su. Extension of elliptic curve qu–vanstone certificates and their applications. Journal of Information Security and Applications, 67:103176, 2022.
    [14] Manisha Malik, Maitreyee Dutta, Jorge Granjal, et al. L-ecqv: Lightweight ecqv implicit certificates for authentication in the internet of things. IEEE Access, 11:35517– 35540, 2023.
    [15] Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2008.
    [16] Chang-Seop Park. A secure and efficient ecqv implicit certificate issuance protocol for the internet of things applications. IEEE Sensors Journal, 17(7):2215–2223, 2016.
    [17] Douglas R Stinson. Cryptography: theory and practice. Chapman and Hall/CRC, 2005.
    [18] Maarten Van Steen. Distributed systems principles and paradigms. Network, 4:20, 2004.
    Description: 碩士
    國立政治大學
    資訊科學系
    111753156
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0111753156
    Data Type: thesis
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    315601.pdf794KbAdobe PDF0View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback