속성기반 암호기술

  • 박광용 (동국대학교 전자상거래협동과정) ;
  • 송유진 (동국대학교 정보경영학과)
  • Published : 2010.04.30

Abstract

인터넷상에서 각종 민감한 데이터들이 공유 유통되어지는 가운데 외부공격자나 내부사용자의 관리 미흡으로 인해 데이터 유출문제가 발생되고 있다. 이를 안전하게 관리하기 암호방식으로 본 논문에서는 ID기반 암호의 확장된 개념의 속성 기반 암호방식에 대해 검토한다. 그리고 속성기반 프록시 재암호화 방식도 함께 검토 하였다.

Keywords

References

  1. W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
  2. D. Boneh and M. Franklin, "Identity based encryption from the weil pairing," Proc. of Crypto'01, LNCS 2139, pp. 213-229, 2001.
  3. M. Mambo and E. Okamoto, "Proxy cryptosystems: Delegation of the power to decrypt cipertext," IEICE Trans. Fund Electronics Communications and Computer Science, 1997.
  4. A. Sahai and B. Waters, "Fuzzy identity- based encryption," Proc. of Eurocrypt'05, LNCS 3494, pp. 457-473, 2005.
  5. X. Liang, Z. Cao, H. Lin and Jun Shao, "Attribute Based Proxy Re-encryption with Delegating Capabilities," ASIACCS 2009, Sydney, Australia, 10-12 March 2009. ACM, pp. 276-286, 2009.
  6. GUO Shanqing, ZENG Yingpei, WEI Juan and XU Qiuliang, "Attribute-Based Re- Encryption Scheme in the Standard Model," Wuhan University Journal of Natural Sciences, Vol.13 No.5, pp. 621-625, 2008. https://doi.org/10.1007/s11859-008-0522-5
  7. D. Boneh and X. Boyen, "Efficient selective- id secure identity based encryption without random oracles," Proc. of Eurocrypt'04, LNCS 3027, pp. 223-238, 2004.
  8. D. Boneh and X. Boyen, "Secure identity based encryption without random oracles," Proc. of Crypto'04, LNCS 3152, pp. 443-459, 2004.
  9. A. Beimel, "Secure schemes for secret sharing and key distribution," PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel, 1996.
  10. L. Cheung and C. Newport, "Provably secure ciphertext policy ABE," Proc. ACM Conference on Computer and Communications Security (CCS), pp. 456-465, 2007.
  11. V. Goyal, O. Pandey, A. Sahai and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," Proc. of ACM CCS'06, pp. 89-98, 2006.