期刊文献+

电子数据取证的可信固定方法 被引量:11

One Trusted Fix Method of Digital Data Forensics
下载PDF
导出
摘要 在介绍传统电子数据固定方法的基础上,针对可信取证理念,给出电子数据静态属性可信的支撑框架和可信固定方法.运用DSA数字签名、时间戳技术,并结合基于证实数字签名的第3方保证方案,研究电子数据具体的可信固定算法.通过形式化分析,定义并描述电子数据静态属性可信的约束规则,为电子数据可信固定提供支持.结合取证实例,运用已总结的公理和规则进行可信取证的形式化分析.结果表明,该方法能对电子证据进行可信固定. After an introduction of the traditional fix method of digital data, in view of trusted forensics, a framework and its corresponding trusted fix method which supports the digital data' s static properties is provided. Using DSA digital signature, timestamp, and the third confirmer signature scheme, the specific trusted fix algorithm of digital data is studied. Via formalized analyzing, the constraint rules for the digital data' s static properties have been defined to be trusted, which also supports to the trusted fix. At last, with introduced axioms, theorems and rules, the formalized analyzing of trusted forensics is validated by certain examples.
出处 《北京工业大学学报》 EI CAS CSCD 北大核心 2010年第5期621-626,共6页 Journal of Beijing University of Technology
基金 国家'十一五'计划资助项目(2007BAK34B06) 国家自然科学基金资助项目(60703086) 南京邮电大学樊登计划资助项目(NY208009)
关键词 电子数据取证 可信取证 可信固定 形式化分析 digital data forensics trusted forensics trusted fix formalized analyzing
  • 相关文献

参考文献8

二级参考文献26

  • 1杨泽明,许榕生,曹爱娟.网络取证与分析系统的设计与实现[J].计算机工程,2004,30(13):72-74. 被引量:17
  • 2张科伟,唐晓波.时间戳协议研究[J].计算机应用研究,2004,21(10):100-103. 被引量:10
  • 3丁丽萍,王永吉.计算机取证的相关法律技术问题研究[J].软件学报,2005,16(2):260-275. 被引量:84
  • 4[1]Chaum D, van Antwerpen H. Undeniable signatures. In: Brassard G, ed. Proceedings of the Advances in Cryptology (CRYPTO'89). LNCS 435, Berlin: Springer-Verlag, 1990. 212~216.
  • 5[2]Chaum D. Designated confirmer signatures. In: De Santis A, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'94). LNCS 950, Berlin: Springer-Verlag, 1994. 86~89.
  • 6[3]Okamoto T. Designated confirmer signatures and public-key encryption are equivalent. In: Desmendt YG, ed. Proceedings of the Advances in Cryptology (CRYPTO'94). LNCS 839, Berlin: Springer-Verlag, 1994. 61~74.
  • 7[4]Michels M, Stadler M. Generic constructions for secure and efficient confirmer signature schemes. In: Nyberg K, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'98). LNCS 1403, Berlin: Springer-Verlag, 1998. 406~412.
  • 8[5]Camenisch J, Michels M. Confirmer signature secure against adaptive adversaries. In: Preneel B, ed. Proceedings of the Advances in Cryptology (EUROCRYPT 2000). LNCS 1807, Berlin: Springer-Verlag, 2000. 243~258.
  • 9[6]Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978,21(2):120~126.
  • 10[7]Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H, ed. Proceedings of the Advances in Cryptology (CRYPTO'98). LNCS 1462, Berlin: Springer-Verlag, 1998. 13~25.

共引文献49

同被引文献52

引证文献11

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部