Acknowledgement
이 논문은 2023년도 정부(과학기술정보통신부)의 재원으로 정보통신기획평가원의 지원을 받아 수행된 연구임. (RS-2023-00229400, 안전한 메타버스 환경을 위한 사용자 인증 및 프라이버시 보호 기술 개발)
References
- J. Smart, J. Cascio, J. Paffendorf, C. Bridges, J. Hummel, J. Hursthouse, and R. Moss, "A cross-industry public foresight project," Metaverse Roadmap Pathways 3D Web, Acceleration Studies Foundation, Apr. 2007.
- A.C. Yao, "Protocols for secure computations," Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, pp.160-164, Nov. 1982.
- O. Goldreich, S. Micali and A. Wigderson, "How to play any mental game, or a completeness theorem for protocols with honest majority," Proceedings of the 19th Annual ACM Symposium on Theory of Computing, pp. 218-229, May. 1987.
- A. Shamir, "How to share a secret," Communication of the ACM, vol. 22,no. 11, pp. 612-613, Nov. 1979.
- M. Ben-Or, S. Goldwasser and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pp. 1-10, May. 1988.
- D. Beaver, S. Micali and P. Rogaway, "The round complexity of secure protocols," Proceedings of the 22ndAnnual ACM Symposium on Theory of Computing, pp. 503-513, May. 1990.
- M.S. Riazi, M. Javaheripi, S.U. Hussain, and F. Koushanfar, "MPCircuits: optimized circuit generation for secure multi-party computation," Proceedings of the 2019 IEEE International Symposium on Hardware Oriented Security and Trust, pp. 198-207, May. 2019.
- R. Tso, A. Alelaiwi, S.M. Mizanur Rahman, M.E. Wu, and M.S. Hossain, "Privacy-preserving data communication through secure multi-party computation in healthcare sensor cloud," Journal of Signal Processing Systems, vol. 89, no. 1, pp. 51-59, Oct. 2017.
- M. Zanin, T.T. Delibasi, J.C. Triana, V. Mirchandani, E. Alvarez Pereira, A. Enrich, D. Perez, C. Pasaoglu, M. Fidanoglu, E. Koyuncu, G. Guner, I. Ozkol, and G. Inalhan, "Towards a secure trading of aviation CO2 allowance," Journal of Air Transport Management, vol. 56, no. Part A, pp. 3-11, Sep. 2016.
- R. Lindemann, D. Baghdasaryan, B. Hill, J.E. Hill and D. Biggs, "FIDO security reference," fido-security-ref-v2.1-ps-20220523, May. 2022.
- J. Bradley, J. Hodges, M.B. Jones, A. Kumar, R. Lindemann, C. Armstrong, K. Georgantas, F. Kaczmarczyck, N. Satragno and N. Sung, "Client to authenticator protocol (CTAP)," fido-client-to-authenticator-protocol-v2.1-pserrata-20220621, Jun. 2022.
- J. Hodges, J.C. Jones, M.B. Jones, A. Kumar, E. Lundberg, J. Bradley, C. Brand, A. Langley, G. Mandyam, N. Satragno, N. Steele, J. Tan, S. Weeden, M. West and J. Yasskin, "Web authentication: an API for accessing public key credentials level 2-W3C recommendation," REC-webauthn-2-20210408, Apr. 2021.
- H.J. Cho, "E-democracy and internet voting: a case study of the Estonia," Journal of Korean Association of Party Studies, 7(2), pp. 159-187, Aug.2008.
- Estonian National Electoral Committee, "E-voting system: General overview," Estonian National Electoral Committee, 2010.
- P. Vinke, "Internet voting inestonia," Proceedings of the 16thNordicConference on Secure IT Systems, LNCS 7161, pp. 4-12, 2012.
- A.Y. Kim, "Private data ecosystem in metaverse platforms," 2021 KISA Report 6(8), Korean Internet & Security Agency, Jul. 2021.
- K.S. Min, G.Y. Kim, J.S. Park, J.H. Baek, H. Kwon, and J.D. Jang,"Metaverse and NFT, cybersecurity threat outlook and analysis," KISA Insight 2022 Vol.04, Korean Internet & Security Agency, Jun. 2022.
- D. Springall, T. Finkenauer, Z. Durumeric, J. Kitcat, H. Hursti, M. MacAlpine and J. A. Halderman, "Security analysis of the Estonian internet voting system," Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 703-715, Nov. 2011.