DOI QR코드

DOI QR Code

부분 암호화를 위한 해쉬 트리 체인 기반 키 생성 및 관리 알고리즘

Key Generation and Management Scheme for Partial Encryption Based on Hash Tree Chain

  • 투고 : 2016.06.10
  • 심사 : 2016.07.21
  • 발행 : 2016.09.30

초록

본 논문에서는 부분 암호화를 위한 키 생성 및 관리 알고리즘의 연구한다. 제안하는 알고리즘에서는 해쉬 트리 구조를 이용하여 적은 양의 해쉬키로부터 다양한 암호화 키를 생성하는 기능을 제공하고 있다. 본 논문에서는 새로운 키 생성 알고리즘을 이용하여 부분 암호화 및 부분 복호화하는 방법을 제시하고 시뮬레이션을 통하여 그 성능을 분석한다.

A new key generation scheme is proposed to support partial encryption and partial decryption of data in cloud computing environment with a minimal key-related traffic overhead. Our proposed scheme employs a concept of hash tree chain to reduce the number of keys that need to be delivered to the decryption node. The performance of the proposed scheme is evaluated through simulation.

키워드

참고문헌

  1. Boneh. D., G.D. Crescenzo, R. Ostrovsky, "Public key encryption with keyword search", Adcances in Cryptology - EUROCRYPT, Interlaken, Switzerland, 2004, 506-522.
  2. Boneh, D., B. Waters, "Conjunctive, subset, and range queries on encrypted data", Theory of Cryptography. Amsterdam, Netherlands. 2007, 535-554.
  3. Droogenbroeck. M.V., R. Benedett, "Techniques for a selective encryption of uncompressed and compressed images", Advanced Concepts for Intelligent Vision Systems, Ghent, Belgium, 2002, 90-97.
  4. Droogenbroeck. M.V., "Partial encryption of images for real-time applications", Fourth IEEE Benelux Signal Processing, Belgium, 2004, 11-15.
  5. Kim, H.Y., "MS, BPOS 클라우드 데이터 유출", 2010, http://www.zdnet.co.kr/news/news_view.asp?artice_id=20101224105449 (Accessed June 09).
  6. Kim, K.M., S.Y. Nam, "Partial encryption algorithm based on block cipher algorithm", Proceedings of the 33th KSII Spring Conference, Kyoungsan, Korea, 2016, 119-120
  7. Kuranda, S., "The 10 Biggest Data Breaches of 2015", 2015, http://www.crn.com/slide-shows/security/300077563/the-10-biggest-data-breaches-of-2015-so-far.htm (Accessed June 09).
  8. Lee, D.Y., "2013년 최악의 데이터 유출 사고", 2014, www.itworld.co.kr/slideshow/86276 (Accessed June 09).
  9. Pandurange, H.T., S.K. Kumar, "Advanced partial image encryption using two-stage hill cipher technique" International Journal of Computer Application, Vol.60, No.16, 2012, 14-19. https://doi.org/10.5120/9775-4341
  10. Shi, E., H. Bethencourt, T.H. Chan, D. Song, A. Perrig, "Multi-dimensional range query over encrypted data", 2007 IEEE Symposium on Security and Privacy, Berkeley, USA, 2007, 350-364.
  11. Song, D., D. Wagner, A. Perrig, "Practical techniques for searches on encrypted data", Security and Privacy, Berkeley, USA, 2000, 44-55.
  12. Takabi, H., J.B.D. Joshi, G. Ahn, "Security and Privacy Challenges in Cloud Computing Environments", IEEE SECURITY & PRIVACY, Vol.8 No.6, 2010, 24-31. https://doi.org/10.1109/MSP.2010.186