Browse > Article
http://dx.doi.org/10.13067/JKIECS.2013.8.4.605

A Study on Securities of Cryptosystems for Hierarchic Groups  

Kim, Yong-Tae (광주교육대학교 수학교육과)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.8, no.4, 2013 , pp. 605-610 More about this Journal
Abstract
A cryptography for enforcing hierarchic groups in a system where hierarchy is represented by a partially ordered set was introduced by Akl et al. But the key generation algorithm of Akl et al. is infeasible when there is a large number of users. To overcome this shortage, in 1985, MacKinnon et al. proposed a paper containing a condition which prevents cooperative attacks and optimizes the assignment. In 2005, Kim et al. proposed the key management systems for using one-way hash function, RSA algorithm, poset dimension and Clifford semigroup in the context of modern cryptography, the key management system using Clifford semigroup of imaginary quadratic non-maximal orders. We, in this paper, show that Kim et al. cryptosystem is insecure in some reasons and propose a revised cryptosystem.
Keywords
hierarchic group; key distribution; class semigroup; non-invertible ideal;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 Selim G. Akl, Peter D. Talor, "Cryptographic Solution to a Multilevel Security Problem," CRYPTO 1982, pp. 237-249, 1982.
2 S. J. MacKinnon, P. D. Taylor, H. Meijer, S. G. Akl, "An Optimal Algorithm for Assignment Cryptographic Keys to Control Access in a Hierarchy", IEEE Trnas. Computers Vol. 34, No. 9, pp. 797-802, 1985.
3 H. Kim, B. Park, J. Ha, B. Lee, D. Park, "New Key Management Systems for Multilevel Security", ICCSA 2005, LNCS 3481, pp. 245-253, 2005.
4 R. L. Rivest, A. Shamir, L. Adelman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems", Comm. of ACM21 pp. 120-126, 1978.
5 김용태, "복소 이차체 위에서의 공개키 암호계에 관한 소고", 한국전자통신학회논문지, 4권, 4호, pp. 270-273, 2009.   과학기술학회마을
6 K. F. Gauss, "Disquisitiones Arithmeticae", translation A. C. Clarke, S.J., Yale Univ. Press, 1966.
7 김용태, "복소이차 류 반군위에서의 암호계의 안전성에 관한 소고", 한국전자통신학회논문지, 6권, 1호, pp. 90-96, 2011.   과학기술학회마을
8 P. Zanardo, U. Zannier, "The class semigroup of orders in number fields", Math. Proc.. Camb. Phil. Soc. 115, pp. 379-391, 1994.   DOI   ScienceOn
9 김용태, "이차 복소 order에서의 계산 복잡도에 관한 소고", 한국전자통신학회논문지, 7권, 3호, pp. 545-551, 2012.   과학기술학회마을
10 조성진, 임지미, 김진경, 김석태, "GMW 수열과 No 수열에 의해서 생성된 수열의 확장수열", 한국전자통신학회논문지, 7권, 2호, pp. 271-277, 2012.   과학기술학회마을
11 김한두, 조성진, 권민정, 안현주, " 확장 Zeng 수열의 상호상관 함숫값에 대한 연구", 한국전자통신학회논문지, 7권, 1호, pp. 61-67, 2012.   과학기술학회마을
12 D. Hunlein, "Cryptosystems based on quadratic orders", PhD-thesis, TU-Darmstadt, Germany, 2000.
13 최언숙, 조성진, 권숙희,"확장된 비선형 이진수열의 상호상관관계 분석", 한국전자통신학회논문지, 7권, 2호, pp. 263-270, 2012.   과학기술학회마을