DOI QR코드

DOI QR Code

무선통신 환경에서 사용 가능한 고차잉여류 문제에 기반을 둔 자체 인증방식

An efficient ID-based authentication scheme based on the rth -residuosity problem in wireless environment

  • 이보영 (성균관대학교 전기.전자 및 컴퓨터 공학부 정보통신보호연구실)
  • 발행 : 1999.06.01

초록

이동하는 모빌노드(mobile node)의 인증 기법 중에, 홈 에이전트(home agent)와 모빌노드, 외부 에이전트(foreign agent)를 거치는 triangle 인증 기법이 있다. 이 기법의 문제점은, 모빌노드의 이동이 빈번하게 발생되면 인증 절차 또한 비례적으로 이루어져야 하므로 무선통신 환경상의 통신 오버헤드가 증가하게 된다. 이러한 문제점을 개선하기 위해서 본 논문에서는, 고차잉여류의 개념에 근거한 다중서명방식을 이용하여 모빌노드가 이동할 때마다 필요했던 홈 에이전트와 외부 에이전트간의 인증을 생략한 자체 인증 방식을 제안하고자 한다. In an open network computing environment a host cannot to identity its users correctly to network services. In order to prevent this thing we present the design of a authentication scheme 솟 using the notion of rth -residuosity problem and discrete logarithm problem which is proposed by S. J. Park et al. The proposed scheme described here is efficient method for mutual authentication without leakage of users identity in mobile communication system that ensure user anonymity and untraceability.

In an open network computing environment a host cannot to identity its users correctly to network services. In order to prevent this thing we present the design of a authentication scheme 솟 using the notion of rth -residuosity problem and discrete logarithm problem which is proposed by S. J. Park et al. The proposed scheme described here is efficient method for mutual authentication without leakage of users identity in mobile communication system that ensure user anonymity and untraceability.

키워드

참고문헌

  1. IEEE Trans. Inform. Theory v.IT-22 New Direction in Cryptography W. Diffie;M. Hellman
  2. Telecommunications Review v.Ⅴ no.5 디지틀 이동 통신을 위한 안전 대책 박춘식
  3. IEEE Network Magazine, Special issue on Mobile Communications Authentication of Mobile Users R. Molva;D. Samfat;G. Tsudik
  4. An Authentication and Security Protocol for Mobile Computing Y. Zheng
  5. Electronic Letters v.26 no.18 RSA blocking and multisignature schemes with no bit extension T. Kiesler;L. Harn
  6. Proc. of Asiscrypt'91 A digital multisignature scheme based on the Fiat-Shamir scheme K. Ohta;T. Okamoto
  7. Electronic Letters v.30 no.5 New digital signature scheme based on discrete logarithm L. Harn
  8. Trans. IEICE v.E71 no.8 Residuosity Problem and its Application to Cryptography Y. Zheng;T. Matsumoto;H. Imai
  9. MDMC'96 A Paradoxical ID-Based Key Distribution Protocol for Mobile Communication System Y. Y. Choi;S. J. Kim;S. J. Park;D. H. Won
  10. JWISC'97 ID-based Multisignature Scheme based on the High Residuosity Problem B. Y. Lee;S. J. Kim;D. H. Won
  11. KIISC v.4 no.2 A paradoxical identity-based scheme based on $γ^{th}$- residuosity problem and discrete logarithm problem S. J. Park;D. H. Won
  12. 정보처리학회 논문지 v.6 no.3 고차잉여류 문제에 기반을 둔 다중서명 방식 이보영;박택진;원동호
  13. IEEE GLOBECOM'95 A Generalized Public Key Residue Cryptosystem and Its Applications S. J. Park;B. Y. Lee;D. H. Won