Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2005.12C.2.169

Electronic Signature Model and Application of Security Server System using Identity Information  

Kim Young-Soo (국민대학교 대학원 정보관리학과)
Shin Seung-Jung (한세대학교 IT학부)
Abstract
Electronic signature system is required to be used in the promotion of the e-Commerce. Because the application system for electronic signature system has inconvenience and vulnerability of security, users are reluctant to use it. Therefore, the electronic signature system should give a guarantee of convenience and security. In this paper, we propose server-based application model, which uses identity information and makes users access transparently to solve electronic signature problems. We also design and verify electronic signature system that reduces threats to security, which cause server attack by distributing the part of signature key to both server and client. The application model with lightweight server system based on the electronic signature system is expected to be used in the promotion of the e-Commerce and help to make its business more efficient and competitive.
Keywords
보안성;전자서명;식별정보;응용모델;서명키의 조각;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Krawcyzk, H., 'The Order of Encryption and Authentication for Protecting Communications', Proc. Crypto '01, 2001
2 Chokhani, S., 'Towards a national public-key infrastructure', IEEE Communications Magagine, Vol.32, No.9, pp.70-74, 1994   DOI   ScienceOn
3 Sarbari and Stephen, 'Public Key Infrastructure: Analysis of Existingand Needed Protocols and Object Formats for Key Recovery,' Computer and Security Vol.19(1), pp.56-68, April 2000   DOI   ScienceOn
4 Merkle, R., 'A Certified Digital Signature, Advances in Cryptology', CRYPTO
5 Mambo, M. and K. Usuda, and E. Okamoto, 'Proxy signatures for delegating signing operation,' in Proc. of the Third ACM Conf. on Computer and Communications Security, pp.48-57, 1996   DOI
6 Lamport, L., 'Constructing digital signatures from oneway functions', SRI intl. CSL-98, October, 1979
7 Damgard, I. B., 'Collision Free Hash Functions and Public Key Signature Schemes', Eurocrypt, 1987
8 Rompel, J., 'One-way functions are necessary and sufficient for secure signatures.', In Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing, pp.387-394, ACM Press, 1990   DOI
9 Fiat, A. and A. Shamir, 'How to prove yourself: Practical solutions to identification and signature problems', Proc. Crypto'86, pp.186-194, 1986
10 김영수, 메시지보안시스템의 인증 프로토콜 설계및 검증', 박사학위논문, 국민대학교 대학원, 2003
11 Whittle, R., Public Key Authentication Framework : Tutorial, 1996. 6
12 Fujisaki, E. and T. Okamoto, 'Secure integration of asymmetric and symmetric encryption schemes', Proc. Crypto '99 pp.537-554, 1999
13 Merkle, R. C., 'A digital signature based on a conventional encryption function,' in Advances in Cryptology-Crypto'87, pp.369-378, 1987
14 Rivest, R., A. Shamir and L. Adleman, 'A Method for Obtaining Digital Signature and Public Key Cryptosystems', Comm. of ACM, 21, pp.120-126, 1978   DOI   ScienceOn
15 Shamir, A., 'Identity-based cryptosystems and signature schemes,' In Advances in Cryptology, Crypto'84, Volume 196 of LNCS, 2001
16 Asokan, N. and G. Tsudik, and M. Waidner, 'Serversupported signatures,' Journal of Computer Security, Vol.5, No.1, 1997