• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document : 1 / 4   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) ¹«ÀÎÁõ¼­ °ø°³Å° ¾ÏÈ£ ±â¹ýÀÇ Àç°í: ¾ÈÀü¼º ¸ðµ¨ ¹× ¼³°è
¿µ¹®Á¦¸ñ(English Title) Certificateless Public Key Encryption Revisited: Security Model and Construction
ÀúÀÚ(Author) ±è¼ÛÀÌ   ¹Ú½Âȯ   À̱¤¼ö   Songyi Kim   Seunghwan Park   Kwangsu Lee  
¿ø¹®¼ö·Ïó(Citation) VOL 20 NO. 06 PP. 1109 ~ 1122 (2016. 06)
Çѱ۳»¿ë
(Korean Abstract)
¹«ÀÎÁõ¼­ °ø°³Å° ¾ÏÈ£(Certificateless Public Key Encryption scheme)´Â »ç¿ëÀÚ ID¸¦ °ø°³Å°·Î »ç¿ëÇÔÀ¸·Î½á °ø°³ Å° ¾ÏÈ£ ½Ã½ºÅÛÀÇ ÀÎÁõ¼­ °ü¸® ¹®Á¦¸¦ ÇØ°áÇÏ°í ID±â¹Ý ¾ÏÈ£ ±â¹ýÀÇ Å° À§Å¹(key escrow) ¹®Á¦¸¦ ÇØ°áÇÒ ¼ö ÀÖ´Â ±â¼ú ÀÌ´Ù. ÀÌ¿¡ ´ëÇÑ ¿¬±¸°¡ È°¹ßÈ÷ ÁøÇàµÇ¾úÀ½¿¡µµ ºÒ±¸ÇÏ°í, ±âÁ¸ÀÇ ¿©·¯ ¹«ÀÎÁõ¼­ ¾ÏÈ£ ±â¹ýµéÀº »ç¿ëÀÚ°¡ ¼±ÅÃÇÑ ºñ¹Ð°ª°ú º¹È£È­ Å° ³ëÃâ °ø°Ý¿¡ ´ëÇÑ ¾ÈÀü¼ºÀ» °í·ÁÇÏÁö ¾Ê°í ¼³°èµÇ¾ú´Ù. ºñ¹Ð°ª°ú º¹È£È­ Å° ³ëÃâ °ø°ÝÀ̶õ ÇÑ ¹øÀÌ¶óµµ °ø°³Å°°¡ ±³Ã¼µÈ ÀÌÈÄ ÀÌÀü¿¡ »ç¿ëÇß´ø ºñ¹Ð°ª°ú º¹È£È­ Å°°¡ ³ëÃâµÈ´Ù¸é ±×·ÎºÎÅÍ ID¿¡ ´ëÀÀÇÏ´Â ºÎºÐ °³ÀÎ Å°¸¦ ȹµæÇØ ÇöÀçÀÇ Á¤´çÇÑ º¹È£È­ Å°¸¦ ¿¬»êÇÒ ¼ö ÀÖ´Â °ø°ÝÀÌ´Ù. º» ³í¹®¿¡¼­´Â Å° ³ëÃâ °ø°Ý¿¡ ´ëÇØ ¾ÈÀüÇÑ »õ·Î¿î ¾ÈÀü¼º ¸ðµ¨À» Á¦¾ÈÇÏ°í, ÇØ´ç ¾ÈÀü¼º ¸ðµ¨¿¡¼­ ±âÁ¸ÀÇ ¹«ÀÎÁõ¼­ °ø°³Å° ¾ÏÈ£ ±â¹ýµéÀÌ ¾ÈÀüÇÏÁö ¾ÊÀ½À» º¸ÀδÙ. ¶ÇÇÑ, Á¦¾ÈÇÑ ¸ðµ¨¿¡¼­ ¾ÈÀüÇÑ »õ·Î¿î ¹«ÀÎÁõ¼­ °ø°³Å° ¾ÏÈ£ ±â¹ýÀ» Á¦½ÃÇÏ°í, DBDH(Decision Bilinear Diffie-Hellman) °¡Á¤À» ±â¹ÝÀ¸·Î ¾ÈÀü¼ºÀ» Áõ¸íÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Certificateless public key cryptography is a technique that can solve the certificate management problem of a public key cryptosystem and clear the key escrow issue of ID-based cryptography using the public key in user ID. Although the studies were actively in progress, many existing schemes have been designed without taking into account the safety of the secret value with the decryption key exposure attacks. If previous secret values and decryption keys are exposed after replacing public key, a valid private key can be calculated by obtaining the partial private key corresponding to user¡¯s ID. In this paper, we propose a new security model which ensures the security against the key exposure attacks and show that several certificateless public key encryption schemes are insecure in the proposed security model. In addition, we design a certificateless public key encryption scheme to be secure in the proposed security model and prove it based on the DBDH(Decisional Bilinear Diffie-Hellman) assumption.
Å°¿öµå(Keyword) ¹«ÀÎÁõ¼­   ¾ÏÈ£   Å° ³ëÃâ °ø°Ý   DBDH °¡Á¤   Certificateless   Cryptography   Key Exposure Attack   Decision Bilinear Diffie-Hellman assumption   etc  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå