Àüü
ÀüÀÚ/Àü±â
Åë½Å
ÄÄÇ»ÅÍ
·Î±×ÀÎ
ȸ¿ø°¡ÀÔ
About Us
ÀÌ¿ë¾È³»
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±³À°Á¤º¸
¿¬±¸ ù°ÉÀ½
ÇаúÁ¤º¸
°ÀÇÁ¤º¸
µ¿¿µ»óÁ¤º¸
E-Learning
¿Â¶óÀÎ Àú³Î
½ÉÈÁ¤º¸
¿¬±¸ ¹× ±â¼úµ¿Çâ
Áֿ俬±¸ÅäÇÈ
ÁÖ¿ä°úÁ¦ ¹× ±â°ü
Çؿܱâ°ü °ü·ÃÀÚ·á
¹ÙÀÌ¿À Á¤º¸±â¼ú
ÁÖ¿ä Archive Site
Æ÷Ä¿½ºiN
¿¬±¸ÀÚ Á¤º¸
¶óÀÌ¡½ºÅ¸
ÆÄ¿öiNÅͺä
¼¼ÁßÇÑ
¿¬±¸ÀÚ·á
¹®ÀÚ DB
¿ë¾î»çÀü
¾Ë¸²¸¶´ç
ºÎ½Ç ÇмúÈ°µ¿ ¿¹¹æ
³í¹®¸ðÁý
´ëȸ¾È³»
What's New
¿¬±¸ºñÁ¤º¸
±¸ÀÎÁ¤º¸
°øÁö»çÇ×
CSERIC ±¤Àå
Post-Conference
¿¬±¸ÀÚ Ä«Æä
ÀÚÀ¯°Ô½ÃÆÇ
Q&A
´Ý±â
»çÀÌÆ®¸Ê
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±³À°Á¤º¸
¿¬±¸ ù°ÉÀ½
ÇаúÁ¤º¸
°ÀÇÁ¤º¸
µ¿¿µ»óÁ¤º¸
E-Learning
¿Â¶óÀÎ Àú³Î
½ÉÈÁ¤º¸
¿¬±¸ ¹× ±â¼úµ¿Çâ
Áֿ俬±¸ÅäÇÈ
ÁÖ¿ä°úÁ¦ ¹× ±â°ü
Çؿܱâ°ü °ü·ÃÀÚ·á
¹ÙÀÌ¿À Á¤º¸±â¼ú
ÁÖ¿ä Archive Site
ÄÄÇ»ÅÍiN
¿¬±¸ÀÚ Á¤º¸
¿¬±¸ÀÚ·á
¹®ÀÚ DB
Ȧ·Î±×·¥ DB
¿ë¾î»çÀü
¾Ë¸²¸¶´ç
ºÎ½Ç ÇмúÈ°µ¿ ¿¹¹æ
³í¹®¸ðÁý
´ëȸ¾È³»
What's New
¿¬±¸ºñ Á¤º¸
±¸ÀÎÁ¤º¸
°øÁö»çÇ×
IT Daily
CSERIC ±¤Àå
Post-Conference
¿¬±¸ÀÚ Ä«Æä
ÀÚÀ¯°Ô½ÃÆÇ
Q&A
¼ºñ½º ¹Ù·Î°¡±â
¼³¹®Á¶»ç
¿¬±¸À±¸®
°ü·Ã±â°ü
Please wait....
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±¹³» ³í¹®Áö
Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö >
Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)
Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)
Current Result Document :
1
/ 4
´ÙÀ½°Ç
ÇѱÛÁ¦¸ñ(Korean Title)
¹«ÀÎÁõ¼ °ø°³Å° ¾ÏÈ£ ±â¹ýÀÇ Àç°í: ¾ÈÀü¼º ¸ðµ¨ ¹× ¼³°è
¿µ¹®Á¦¸ñ(English Title)
Certificateless Public Key Encryption Revisited: Security Model and Construction
ÀúÀÚ(Author)
±è¼ÛÀÌ
¹Ú½Âȯ
À̱¤¼ö
Songyi Kim
Seunghwan Park
Kwangsu Lee
¿ø¹®¼ö·Ïó(Citation)
VOL 20 NO. 06 PP. 1109 ~ 1122 (2016. 06)
Çѱ۳»¿ë
(Korean Abstract)
¹«ÀÎÁõ¼ °ø°³Å° ¾ÏÈ£(Certificateless Public Key Encryption scheme)´Â »ç¿ëÀÚ ID¸¦ °ø°³Å°·Î »ç¿ëÇÔÀ¸·Î½á °ø°³ Å° ¾ÏÈ£ ½Ã½ºÅÛÀÇ ÀÎÁõ¼ °ü¸® ¹®Á¦¸¦ ÇØ°áÇÏ°í ID±â¹Ý ¾ÏÈ£ ±â¹ýÀÇ Å° À§Å¹(key escrow) ¹®Á¦¸¦ ÇØ°áÇÒ ¼ö ÀÖ´Â ±â¼ú ÀÌ´Ù. ÀÌ¿¡ ´ëÇÑ ¿¬±¸°¡ È°¹ßÈ÷ ÁøÇàµÇ¾úÀ½¿¡µµ ºÒ±¸ÇÏ°í, ±âÁ¸ÀÇ ¿©·¯ ¹«ÀÎÁõ¼ ¾ÏÈ£ ±â¹ýµéÀº »ç¿ëÀÚ°¡ ¼±ÅÃÇÑ ºñ¹Ð°ª°ú º¹È£È Å° ³ëÃâ °ø°Ý¿¡ ´ëÇÑ ¾ÈÀü¼ºÀ» °í·ÁÇÏÁö ¾Ê°í ¼³°èµÇ¾ú´Ù. ºñ¹Ð°ª°ú º¹È£È Å° ³ëÃâ °ø°ÝÀ̶õ ÇÑ ¹øÀÌ¶óµµ °ø°³Å°°¡ ±³Ã¼µÈ ÀÌÈÄ ÀÌÀü¿¡ »ç¿ëÇß´ø ºñ¹Ð°ª°ú º¹È£È Å°°¡ ³ëÃâµÈ´Ù¸é ±×·ÎºÎÅÍ ID¿¡ ´ëÀÀÇÏ´Â ºÎºÐ °³ÀÎ Å°¸¦ ȹµæÇØ ÇöÀçÀÇ Á¤´çÇÑ º¹È£È Å°¸¦ ¿¬»êÇÒ ¼ö ÀÖ´Â °ø°ÝÀÌ´Ù. º» ³í¹®¿¡¼´Â Å° ³ëÃâ °ø°Ý¿¡ ´ëÇØ ¾ÈÀüÇÑ »õ·Î¿î ¾ÈÀü¼º ¸ðµ¨À» Á¦¾ÈÇÏ°í, ÇØ´ç ¾ÈÀü¼º ¸ðµ¨¿¡¼ ±âÁ¸ÀÇ ¹«ÀÎÁõ¼ °ø°³Å° ¾ÏÈ£ ±â¹ýµéÀÌ ¾ÈÀüÇÏÁö ¾ÊÀ½À» º¸ÀδÙ. ¶ÇÇÑ, Á¦¾ÈÇÑ ¸ðµ¨¿¡¼ ¾ÈÀüÇÑ »õ·Î¿î ¹«ÀÎÁõ¼ °ø°³Å° ¾ÏÈ£ ±â¹ýÀ» Á¦½ÃÇÏ°í, DBDH(Decision Bilinear Diffie-Hellman) °¡Á¤À» ±â¹ÝÀ¸·Î ¾ÈÀü¼ºÀ» Áõ¸íÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Certificateless public key cryptography is a technique that can solve the certificate management problem of a public key cryptosystem and clear the key escrow issue of ID-based cryptography using the public key in user ID. Although the studies were actively in progress, many existing schemes have been designed without taking into account the safety of the secret value with the decryption key exposure attacks. If previous secret values and decryption keys are exposed after replacing public key, a valid private key can be calculated by obtaining the partial private key corresponding to user¡¯s ID. In this paper, we propose a new security model which ensures the security against the key exposure attacks and show that several certificateless public key encryption schemes are insecure in the proposed security model. In addition, we design a certificateless public key encryption scheme to be secure in the proposed security model and prove it based on the DBDH(Decisional Bilinear Diffie-Hellman) assumption.
Å°¿öµå(Keyword)
¹«ÀÎÁõ¼
¾ÏÈ£
Å° ³ëÃâ °ø°Ý
DBDH °¡Á¤
Certificateless
Cryptography
Key Exposure Attack
Decision Bilinear Diffie-Hellman assumption
etc
ÆÄÀÏ÷ºÎ
PDF ´Ù¿î·Îµå
¸ñ·Ï
Copyright(c)
Computer Science Engineering Research Information Center
. All rights reserved.