DOI QR코드

DOI QR Code

Distributed Secure Mail System For Roaming User

이동 사용자를 위한 분산 보안 메일 시스템

  • 양종필 (부경대학교 대학원 전자계산학과) ;
  • 서철 (부경대학교 대학원 전자계산학과) ;
  • 이경현 (부경대학교 전자컴퓨터멀티미디어공학부)
  • Published : 2003.10.01

Abstract

In this paper, we propose a new certified e-mail system which reduces user's computational overhead and distributes confidentiality of TTP(Trusted Third Partty). Based on the traditional cryptographic schemes and server-supported signiture for fairness and confidentiality of message, we intend to minimize to computation overhead of mobile device on public key algorithm. Therefore, our proposal becomes to be suitable for mail user sho uses mobile devices such as cellular phone and PDA. Moreover, the proposed system is fault-tolerant, secure against mobile adversary and conspiracy attack, since it is based on the threshold cryptography on server-side.

본 논문에서는 매일 사용자의 오버헤드를 최소화하고 TTP(Trusted Third Party)의 기밀성을 분산시킨 새로운 Certified E-mail System을 제안한다. 제안 시스템은 전달 메시지의 공정성 및 기밀성 보장을 위하여 전통적인 암호기법과 함께 서버 지원된 서명 기법을 사용함으로써, 매일 사용자의 공개키 암호 알고리즘 연산에 따른 오버해드를 최소화하는 구조를 가진다. 따라서, 제안 방안은 셀룰러 폰이나 무선 PDA와 같은 컴퓨팅 파워가 취약한 이동 장치를 이용하는 매일 사용자에 적합하다. 또한, 제안된 시스템은 임계 암호시스쳄에 기반하여 설계되었으므로 이동 공격자에 대하여 강겅하며 공모 공격으로부터 안전하다.

Keywords

References

  1. M. Franklin and M. Reiter, 'Fair exchange with a semitrusted third party,' In Proc. ACM Conference on Computer and Communications Security, 1997 https://doi.org/10.1145/266420.266424
  2. William Stallings, 'CRYPTOGRAPHY AND NETWORK SECURITY : Principles and Practice,' Second Edition, Prentice- Hall
  3. Kenji Imamoto, Kouichi Sakurai, 'A Certified E-mail System with Receiver's Selective Usage of Delivery Authority,' INDOCRYPT 2002, LNCS 2551, 2002
  4. G. Ateniese, B. D. Medeiros and M. T. Goodrich. 'TRICERT : A Distributed Certified E-Mail Scheme,' In ISOC 2001 Network and Distributed System Security Symposium (NDSS '01), San Diego, CA, USA, Feb., 2001
  5. J. Zhou and D. Gollmann, 'Certified electronic mail,' In Computer Security-ESORICS '96 Proceedings, pp.55-61. Springer Verlag, 1996
  6. B. Schneier and J. Riordan, 'A certified e-mail protocol,' 13th Annual Computer Security Applications Conference, pp.100-106, Dec., 1998
  7. N. Asokan, G. Tsudic, M. Waidner, 'Server Supported Signatures,' European Symposium on Research in Computer Security, September, 1996
  8. X. Ding, D. Mazzocchi and G. Tsudik, 'Experimenting with Server-Aided Signatures,' 2002 Network and Distributed Systems Security Symposium (NDSS '02), February, 2002
  9. D. Malkhi and M. Reiter, 'Byzantine quorum systems,' Distributed Computing, 11(4), pp.203-213, 1998 https://doi.org/10.1007/s004460050050
  10. A. De Santis, Y. Desmedt, Y. Frankel and M. Yung, 'How to share a function securely,' In Proceedings of the 26th ACM Symposium on the Theory of Computing, Santa Fe, pp.522-533, 1994 https://doi.org/10.1145/195058.195405
  11. P. Gemmel, 'An introduction to threshold cryptography,' in CryptoBytes, a technical newsletter of RSA Lab. Vol. 2, No.7, 1997
  12. R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin, 'Robust and efficient sharing of RSA functions,' In Advances in Cryptology-Crypto '96, LNCS 1109, pp.157-172, 1996
  13. Victor Shoup, 'Practical threshold signatures,' in Proc. Eurocrypt, 2000
  14. L. Harn, 'Group oriented (n, t) digital signature scheme,' IEE Proceedings-Computer and Digital Techniques, 141(5), pp.307-313, September, 1994 https://doi.org/10.1049/ip-cdt:19941293
  15. M. Cerecedo, T. Matsumoto, H. Imai, 'Efficient and secure multiparty generation of digital signatures based on discret logarithms,' IEICE Transactions on Fundamentals of Electronics, Information and Communication Engineers, April, 1993
  16. Alfred, J. Menezes, Paul, C. van Oorshot, Scoot, A. Vanstone, 'Handbook of Applied Cryptography,' CRC Press, 1997
  17. A. Herzberg, S. Jarechi. H. Krawczyk and M. Yung 'Proactive secret sharing or: How to cope with perpetual leakage,' Advances in Cryptology -Crypto '95, the 15th Annual International Cryptology Conference, Proceedings, volumn 963 of LNCS, pp.457-469
  18. S. Jarecki, 'Proactive Secret Sharing and Public Key Cryptosystems,' Master thesis, MIT, 1996