Browse > Article
http://dx.doi.org/10.13089/JKIISC.2002.12.3.119

A Identity Escrow mechanism supporting key recovery  

이용호 (순천향대학교 정보기술공학부)
이임영 (순천향대학교 정보기술공학부)
김주한 (한국전자통신연구원 능동보안기술연구팀)
문기영 (한국전자통신연구원 능동보안기술연구팀)
Abstract
In case certification between user and service provider is achieved, problem that user's identity is revealed is occurring by social issue, so it was presented identity escrow scheme to solve these problem. In identity escrow scheme, the issuer who have correct user's identity transmits securely anonymity authentication information to user, and user achieves authentication phase with service provider keeping oneself anonymity using this. In this paper, we present requirement for security and trusty of identity escrow scheme and propose new mechanism that can security this. Also, propose method that service provider can deliver securely contents to user and propose mechanism that improve that support ky recovery at encryption communication that using secret key that it was generated by key agreement between users.
Keywords
신원위탁;키 복구;익명성 제어;익명성 제거 공개 검증성;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Camenisch, 'Efficient and generalized group signatures', Advances in Cryptology-EUROCRYPT '97, pp. 465-479, 1997
2 J. Kilian and E. Petrank. 'Identity Escrow' Advances in Cryptology-CRYPT0'98. pp, 169-184. 1998
3 M. Stadler, 'Fair blind signatures', In Proc. Eurocrypt 95, LNCS 921, pp. 209-219, 1995
4 http://www.epic.org, 'Escrowed Encryption Standard(EES)', Approval of FIPS 185 1994
5 http://csrc.nist.gov, 'Requriements for Key Recovery Prodeucts', NIST, 1998
6 이용호, 이임영, '익명성 제거의 공개 검증이 가능한 신원위탁 방식', CISC 2001, pp. 79-82, 2001
7 황보성, 이임영. '사용자의 익명성을 제어하는 신원위탁 방식 제안'. 멀티미디어학회 논문지 제3권. 제6호, pp. 617-624, 2000
8 황보성, 이임영, '신원위탁 방식의 설계', WISC2000, pp. 588-602. 2000
9 최용락. 소우영. 이재광, 이임영. 컴퓨터 통신보안, 도서출판그린, 2001
10 K. Sakurai and Y. Yamane, 'Key Escrow system of Protecting User's Privacy by Blind Decoding', pp. 147-157, 1998
11 J. Kilian and E. Petrank, 'Identity Escrow', Theory of Cryptography Library, ftp://theory.lcs.mit.edu/pub/ tcryptol/97-ll. ps, 1997
12 S. Micali, 'Fair Cryptosystems', Advances in Cryptology-CRYPTO '92. pp. 113-138, 1992