DOI QR코드

DOI QR Code

Verifiable self-certified schemes based on ${\gamma}$th -residuosity problem

고차잉여류 문제에 기반한 검증 가능한 자체인증방식

  • 이보영 (성균관대학교 전기·전자 및 컴퓨터 공학부 정보통신보호연구실)
  • Published : 1999.12.01

Abstract

In this paper we propose the verifiable self-certified schemes(key distribution scheme identification scheme digital signature scheme) based on ${\gamma}$th -residuosity which make up for defects of Girault's self-certified schemes allow the authenticity of public keys to be verified during the use of the keys. The security of our schemes is based on the difficulty of ${\gamma}$th -residuosity problem and discrete logarithm problem simultaneously.

본 논문에서는 공개키가 사용될 때만 공개키 정당성을 검증할수 있다는 Girault의 자체인증공개 키 방식의 단점을 개선한 검증가능한 자체인증 공개키 방식의 개념을 이용하여 고차잉여류 에 기반한 검 증 가능한 자체인증 방식(키분배 방식. 개인식별 방식 디지털 서명방식 등)을 제안한다. 제 안한 방식의 안정성은 고차잉여류와 이산대수 문제에 기반을 두고 있다. In this paper we propose the verifiable self-certified schemes(key distribution scheme identification scheme digital signature scheme) based on ${\gamma}$th -residuosity which make up for defects of Girault's self-certified schemes allow the authenticity of public keys to be verified during the use of the keys. The security of our schemes is based on the difficulty of ${\gamma}$th -residuosity problem and discrete logarithm problem simultaneously.

Keywords

References

  1. Crypto'84 Identity-Based Cryptosystems and Signature Schemes Shamir
  2. Advances in Cryptology EUROCRYPT'91 Self-certified public keys M. Girault
  3. The Review of Korea Institute of Information Security & Cryptology v.3 no.3 A study on self-certified public key scheme C.Y.Kwon;D.H.Won
  4. KIISC v.4 no.2 A paradoxical identity-based scheme based on $γ^{th}$-residuosity problem and discrete logarithm problem S. J. Park;D. H. Won
  5. Proc. of CISC'94(Conference on Information Security & Cryptology) v.4 no.1 Self-certified identity S. J. Park;H. K. Yang;D. H. Won
  6. Proc. of WCC'99, INRIA Workshop on Coding and Cryptography Verifiable self-certified public keys Seung-joo Kim;Soo-hyun Oh;Sang-joon Park;Dong-ho Won;Daniel AUGOT(ed.);Claude CARLET(ed.)
  7. Trans, IEICE v.E71 no.8 Residuosity Problem and its Application to Cryptography Y. Zneng;T. Matsumoto;H. Imai
  8. Proc. of CISC'95, Conference on Information Security & Cryptology v.5 no.1 A class of public key residue cryptosystems S. J. Park;H. K. Yang;D. H. Won
  9. The Riview of Korea Institute of information Security & Cryptology v.6 no.4 A study on public key authentication schemes S.J. Kim;C.Y. Kwon;S.G. Kang;D.H. Won
  10. Journal of the Korea Institute of Information Security and Cryptology v.9 no.2 An efficient ID-based authentication scheme based on the $γ^{th}$-residuosity problem in wireless environment B.Y. Lee;Y.Y. Choi;M.R. Joo;D.H. Won