• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö

Current Result Document : 3 / 128 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) ÀÓ°è ¹æ½Ä ±â¹Ý ¾ÈÀü ºñ¹ÐÁ¶°¢ °øÀ¯ P2P ½Ã½ºÅÛ ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) Study on Threshold Scheme based Secure Secret Sharing P2P System
ÀúÀÚ(Author) ÃÖÁ¤Çö   Cheong-Hyeon Choi  
¿ø¹®¼ö·Ïó(Citation) VOL 23 NO. 03 PP. 0021 ~ 0033 (2022. 06)
Çѱ۳»¿ë
(Korean Abstract)
º» ³í¹®Àº ±â¾÷ºñ¹Ð ³ëÃâ·Î ÃÊ·¡µÉ ¼Õ½ÇÀ» Çö°ÝÈ÷ ÁÙÀÏ ¾ÈÀü ºñ¹ÐÁ¶°¢ °øÀ¯ ½Ã½ºÅÛÀ» Á¦¾ÈÇÑ´Ù. º» ¿¬±¸ ½Ã½ºÅÛÀº Áß¾Ó¼­¹ö ¹æ½ÄÀÌ ¾Æ´Ñ È¿À²Àû P2P ºÐ»ê ½Ã½ºÅÛÀ» Á¦¾ÈÇÑ´Ù. ÃÖ±Ù ºñÆ®ÄÚÀÎ À¯Åë ½Ã½ºÅÛµµ ¿ª½Ã P2P ºÐ»ê ¹æ½ÄÀ» »ç¿ëÇÏ°í ÀÖ´Ù. º» ¿¬±¸´Â ±â´ÉÀÌ ´Ü¼øÇÏ°í È®À强ÀÌ ³ô°í Àü¼Û È¿À²ÀûÀÎ Å䷻Ʈ P2P ºÐ»ê ±¸Á¶¿Í ±× ÇÁ·ÎÅäÄÝÀ» »ç¿ëÇÏ¿© Å䷻Ʈ ÆÄÀÏÁ¶°¢ ´ë½Å ÀÓ°è »þ¹Ì¸£(Shamir) ºñ¹ÐÁ¶°¢ÀÇ º¸¾È À¯ÅëÀ» ¼³°èÇÑ´Ù. º» ¿¬±¸´Â ÀÓ°è »þ¹Ì¸£ ºñ¹ÐÁ¶°¢ °øÀ¯±â¹ý (Threshold Shamir Secret Sharing Scheme)À» ½Ã½ºÅÛ¿¡ Àû¿ëÇÏ°í. µ¿½Ã¿¡ ´ÙÁß Çùµ¿ÀåÄ¡ÀÇ ¼­¸í±â¹ýÀ» »ç¿ëÇÏ¿© ¾ÈÀüÇÏ°í °­·ÂÇÑ ´ÙÁßÀÎÁõ¹æ½ÄÀÇ »ç¿ëÀÚ ÀÎÁõÀ» ¼öÇàÇÑ´Ù. ¾ÈÀüÇÑ ºñ¹Ð µ¥ÀÌÅÍ À¯Åëµµ °ø°³Å°·Î ¾Ïȣȭ ±³È¯µÈ ÀÓ½ÃÅ°ÀÇ ´ëĪ¾ÏÈ£¹æ½ÄÀÇ È¿À²Àû ¾Ïȣȭ·Î Àü¼ÛÀ» ÇÑ´Ù. ªÀº À¯È¿±â°£ÀÇ ÀÓ½ÃÅ°´Â ¼¼¼Ç µ¿¾È »ý¼ºµÇ°í ¼¼¼Ç ¸¶°¨ÈÄ ¼Ò¸êÇϹǷΠŰ ³ëÃâ¿¡¼­ ¾ÈÀüÇÏ´Ù. Ưº°È÷ º» Á¦¾ÈÇÑ ½Ã½ºÅÛÀÇ Æ¯Â¡Àº ÀÓ°è ºÐ»ê±â¹ýÀ» È¿À²Àû Å䷻Ʈ P2P ºÐ»ê ½Ã½ºÅÛ¿¡ ±¸Á¶Àû º¯°æ¾øÀÌ È¿°úÀûÀ¸·Î Àû¿ëÇÑ´Ù. µ¿½Ã¿¡ º» ½Ã½ºÅÛÀº È¿À²ÀûÀÎ ÀÓ½ÃÅ° ´ëĪ¾ÏÈ£¹æ½ÄÀ¸·Î ºñ¹ÐÆÄÀÏ À¯Åë¿¡ ±â¹Ð¼ºÀ» º¸ÀåÇÏ°í ÀÓ½ÃÅ°´Â °ø°³Å° ¾ÏÈ£¹æ½ÄÀ¸·Î ¾ÈÀüÇÏ°Ô ±³È¯µÈ´Ù, º» ½Ã½ºÅÛÀº ¿ÜºÎ À¯Ãâ ±â±âµµ »ç¿ëÀÚ·Î µ¿Àû µî·ÏÀÌ °¡´ÉÇÏ´Ù. ÀÌ È®À强À¸·Î ±â¹Ð¼º°ú ÀÎÁõ¼ºÀ» µ¿ÀûÀ¸·Î µî·ÏµÈ »ç¿ëÀÚ¿¡°Ôµµ Àû¿ëÇÒ ¼ö ÀÖ´Ù.
¿µ¹®³»¿ë
(English Abstract)
This paper is to suggest the secure secret sharing system in order to outstandingly reduce the damage caused by the leakage of the corporate secret. This research system is suggested as efficient P2P distributed system kept from the centrally controlled server scheme. Even the bitcoin circulation system is also based on P2P distribution scheme recenly. This research has designed the secure circulation of the secret shares produced by Threshold Shamir Secret Sharing scheme instead of the shares specified in the torrent file using the simple, highly scalable and fast transferring torrent P2P distribution structure and its protocol. In addition, this research has studied to apply both Shamir Threshold Secret Sharing scheme and the securely strong multiple user authentication based on Collaborative Threshold Autentication scheme. The secure transmission of secret data is protected as using the efficient symmetric encryption with the session secret key which is safely exchanged by the public key encryption. Also it is safer against the leakage because the secret key is effectively alive only for short lifetime like a session. Especially the characteristics of this proposed system is effectively to apply the threshold secret sharing scheme into efficient torrent P2P distributed system without modifying its architecture of the torrent system. In addition, this system guaranttes the confidentiality in distributing the secret file using the efficient symmetric encryption scheme, which the session key is securely exchanged using the public key encryption scheme. In this system, the devices to be taken out can be dynamically registered as an user. This scalability allows to apply the confidentiality and the authentication even to dynamically registerred users.
Å°¿öµå(Keyword) »þ¹Ì¸£ ÀÓ°è ºñ¹Ð Á¶°¢   Çùµ¿ÀÎÁõ   ½¬³ë¸£ ¾ÏÈ£±â¹ý   Shamir Threshold Secret Sharing   Schnorr Encryption Scheme   Collaborative Threshold Authentication  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå