이동 컴퓨팅 환경에서의 로컬 신뢰 센터 기반 효율적 이동 노드 인증 기법

Efficient Mobile Node Authentication Scheme Based on the Trusted Local Third Party in Mobile Computing Environments

  • 노환주 (동국대학교 전자계산원) ;
  • 이기현 (명지대학교 컴퓨터공학과)
  • 발행 : 2000.04.01

초록

이동 노드와 같은 분산 이동 객체를 사용한 이동 컴퓨팅 시스템은 원격 이동 엔티티에 대한 정확하고 안전한 신분 확인 및 신원 검증 과정이 필요하다. 본 연구에서는 기존의 대화형 기반 이동 노드 인증 기법에 대한 성능 분석 및 안전성 분석을 통해 이산 대수 기법에 기반한 Schnorr형 인증 기법을 개선하고 ElGamal 기법을 변형 발전시킨 효율적 인증 기법을 제시하였다. 제안한 기법은 이동 노드 서버에 기반한 컴퓨팅 시스템에 적용하기 위해 불확정 전송 기반 비대화형 인증 기법으로 분산 이동 컴퓨팅 환경에서의 노드 인증에 적합한 성능과 안전성을 제공한다.

Mobile computing system requires both precise identification and secure authentication scheme on remote mobile entities, which is based on the distributed mobile node. In this paper, existing discrete logarithm based $Schnorr^{[7]}$ like entity authentication schemes are improved by the analysis of performance and security on the hi-directional interactive proofs. And $EIGamal^{[14]}$ like efficient authentication schemes are also proposed. Then, these are enhanced with oblivious transfer based mono directional authentication schemes based on trusted third party for applying to the mobile agent based computing systems. Therefore, proposed schemes provide compatible performance and safety on mobile entity authentication processes.

키워드

참고문헌

  1. Proc. of the 2nd Aizu Int'l Symposium on Parallel Algorithm/Architecture Synthesis(pAs97) Mobile Agents for Mobile Computing R. Gray;D. kotz;S. Nog;D. Rus;G. Cybenco
  2. Mobile Object Systems Security and Communication in Mobile Agents Systems J. Vitek;M. Serrao;D. Thanos
  3. Mobile Object Systems Safe and Secure Execution Mechanisms for Mobile Objects Kazuhiko Kato
  4. Proceedings of the IEEE v.76 no.5 A Survey of Information Authentication Gustavus J. Simmons
  5. IEEE Transactions on Information Theory v.IT-22 no.6 New directions in cryptography W. Diffie;M. Hellman
  6. Proceedings of the IEEE v.76 no.5 The First Ten Years of Public-Key Cryptography Whitfield Diffie
  7. Advances Cryptology, Proceedings of Crypto'89 Efficient Identification and Signatures for Smart Cards C. P. Schnorr
  8. Advances in Cryptology, Proceedings of Crypto'92 Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes Tatsuaki Okamoto
  9. Applied Cryptography(2nd Edition) B. Schneier
  10. Handbook of Applied Cryptography Alfred J.;Menezed Paul C. van Oorschot;Scott A. Vanstone
  11. Advances in Cryptology, Proceedings of CRYPTO'86 How to Prove Yourself: Practical Solution to Identification and Signature Problems A. Fiat;A. Shamir
  12. Proceedings of the 19th Annual ACM Symposium of Theory of Computing Zero Knowledge Proofs of Identity U. Feige;A. Fiat;A. Shamir
  13. Advances in Cryptology, Proceedings of Eurocrypt'88 A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory L. C. Guillou;J. J. Quisquater
  14. IEEE Transactions on Information Theory v.IT-30 no.4 A Public Key Cryptosystem and a Signature Scheme based on Discrete logarithms T. ElGamal
  15. Communications of the ACM v.21 no.2 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems R. L. Rivest;A. Shamir;L. Adleman
  16. SIAM Journal of Computing v.18 no.1 The Knowledge Complexity of Interactive Proofs S. Goldwasser;S. micali;C. Rackoff
  17. Advances in Cryptology, Proceedings of Crypto'99 A Modification of the Fiat-Shamir Scheme Kazuo Ohta;Tatsuaki Okamoto
  18. Technical Report TR-81 How to exchange secrets by oblivious transfer M. Rabin
  19. Advances in Cryptology-Crypto 89 v.435 Non-Interactive Oblivious Transfer and Applications Mihir Bellare;Silvio Micali
  20. Proceedings of the 20th Annual ACM Symposium on Theory of Computing Non-Interactive Zero-Knowledge Proof System and Applications M. Blum;P. Feldman;S. Micali
  21. ICALP'97 Conference Randomness-Efficient Non-Interactive Zero Knowledge Alfredo De Santis;Giovanni Di Crescenzo;Pino Persino
  22. Advances in Cryptology -Crypto'87 v.293 Non-Interactive Zero-Knowledge Proof-Systems A. D. Santis;S. Micali;G. Persiano
  23. Advances in Cryptology-Crypto'88 v.403 Non-Interactive Zero-Knowledge Proof-Systems with Preprocessing A. D. Santis;S. Micali;G. Persiano
  24. Technical Reports MIT/LCS/TR-579b Fair Cryptosystems S. Micali
  25. Proc. of 2nd Aizu Int'l Symposium on Parallel Algorithm/Architecture Synthesis(pAs97) Mobile Agents for Mobile Computing R. Gray;D. Kotz;S. Nog;D. Rus;G. Cybenco
  26. Technical Report Mobile Agents: Are they a good idea? C. G. Harrison;D. M. Chess;A. Kershenbaum
  27. Communication of the ACM v.37 no.7 Software Agents M. R. Genesereth;S. P. Ketchpel
  28. paper for the Mobile Object Systems ECoop Workshop'97 Protecting Mobile Agents through Tracing Vigna;Giovani