• Title/Summary/Keyword: Certificate Authority

Search Result 146, Processing Time 0.03 seconds

Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network (모바일 Ad-hoc 네트워크에서 Hamming Distance를 이용한 인증프로토콜)

  • Lee, Seok-Lae;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.47-57
    • /
    • 2006
  • Mobile Ad-hoc networks have various implementation constraints such as infrastructure-free, no trusted authority, node mobility, and the limited power and small memory of mobile device. And just like wired networks, various security issues such as authentication, confidentiality, integrity, non-repudiation, access control, availability and so on have been arisen in mobile Ad-hoc networks. But we focus on authentication of these security issues because it is quitely affected by the characteristics of networks. In this paper, we propose the authentication protocol that can limit the size of certificate repository as $log_2N$ and assures to make a trusted certificate path from one node to another, adopting the concept of Hamming distance. Particularly, our protocol can construct a trusted certificate path in spite of decreasing or increasing the number of nodes in mobile Ad-hoc network.

An Efficient and Secure Method for Managing Logs of Certified e-Document Authority Using Hash Tree (공인전자문서 보관소에서 생성되는 로그의 효율적이고 안전한 보관방법에 대한 연구)

  • Kang, Shin-Myung;Moon, Jong-Sub
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.23-32
    • /
    • 2009
  • CeDA (Certified e-Document Authority) was adopted in March 2005. It is possible to register/store/send/receive/transfer/revoke e-documents by using trusted third party, CeDA. It is important to store not only e-documents of users but also logs produced by CeDA. Thus all logs must be electronically signed using certificate of CeDA. But management of electronically signed logs is difficult. In this paper, the method which can be applicable to authenticate all logs of CeDA using "Hash Tree" is present.

  • PDF

A Study on the Meaning and Prospect of the Certificate of Qualification in Private Security in Korea - Concerning the Enforcement of 2006' Examination - (민간자격증의 의의와 전망 -2006년 시험시행과 관련하여-)

  • Jeong, Ji-Woon
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.451-470
    • /
    • 2007
  • This study is concerned Meaning of the certificate of qualification and Prospect of the certificate of qualification in private security in korea. Now, private security area is need the certificate of qualification, and the first examination in 2006' in Korea has meaning that open the period of the certificate of qualification. The 40 university(include colleges) applied the first examination. This exam is enforced 11. 25. 2006. in six part area in Korea. The 822 students are applied and 763 students(the ratio of successful applicants 92.8%) passed this exam. This apply exam is meaning the start of new development and specialization in private security area. I hope that this exam is a opportunity of cooperation between industry and the academic world. Also, this exam is a opportunity of student in private security are more hard training before take a job. As my understanding this exam is the confirmation by an authority, this exam is only neutral evidence to get the confidence and credit from the clients.

  • PDF

Accountable Authority Revocable Identity-Based Encryption (사용자 폐기를 지원하는 책임 기관 ID 기반 암호)

  • Choi, Suri;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1281-1293
    • /
    • 2017
  • In 2001, Boneh and Franklin proposed Identity-Based Encryption(IBE) that does not require a certificate like Public Key Infrastructure(PKI) by using user's Identity as a public key. However, IBE has a key escrow problem because the Private Key Generator(PKG), who is a trusted authority, generates a secret key of every user. Also, it does not support efficient revocation when the user's secret key is exposed or the system needs to revoke the user. Therefore, in order to use IBE as PKI that currently used, it is necessary to solve the key escrow problem and the revocation problem. In this paper, to solve those two problems, we suggest Accountable Authority Revocable IBE(A-RIBE) based on Accountable Authority IBE that mitigates the key escrow problem and Revocable IBE that solves the revocation problem. Also, we define the security model suitable foe A-RIBE, and analyze the principle of designing A-RIBE according to based A-IBE and RIBE and their advantage and disadvantage.

An Efficient Anonymous Authentication Protocol Based on Multiple Anonymous Certificates in VANET (VANET에서 다중 익명 인증서 기반 효율적인 익명 인증 프로토콜)

  • Jung, Chae-Duk;Sur, Chul;Park, Young-Ho;Rhee, Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.16C no.5
    • /
    • pp.589-596
    • /
    • 2009
  • Until now, some protocols have been presented to provide vehicle's anonymity and unlinkability in VANET by means of issuing multiple anonymous certificates to each vehicle from the trust authority, or shot-time anonymous certificate to a vehicle after mutual authentication between a Roadside Unit (RSU) and the vehicle. However, these protocols have high overheads of the trust authority, RSUs and vehicles for generating anonymous certificate. In this paper, we propose an efficient anonymous authentication protocol, in which RSUs can issue multiple shot-time anonymous certificates to a vehicle to alleviate system overheads for mutual authentication between vehicles and RSUs. Several simulations are conducted to verify the efficiency of the proposed protocol in terms of RSU valid serve ratio and vehicle's computational costs. Moreover, the proposed protocol provides unlinkability and traceability when multiple RSUs are compromised, whereas previous protocols do not provide unlinkability and traceability.

A Study on Integrated ID Authentication Protocol for Web User (웹 사용자를 위한 통합 ID 인증 프로토콜에 관한 연구)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.197-205
    • /
    • 2015
  • Existing Web authentication method utilizes the resident registration number by credit rating agencies separating i-PIN authentication method which has been improved authentication using resident registration number via the real name confirmation database. By improving the existing authentication method, and it provides the available integrated ID authentication on Web. In order to enhance safety, the proposed authentication method by encrypting the user of the verification value, and stores the unique identifier in the database of the certificate authority. Then, the password required to log in to the Web is for receiving a disposable random from the certificate authority, the user does not need to remember a separate password and receives the random number by using the smart phone. It does not save the user's personal information in the database, and it is easy to management of personal information. Only the integration ID needs to be remembered with random number on every time. It doesn't need to use various IDs and passwords if you use this proposed authentication methods.

An Fingerprint Authentication Model of ERM System using Private Key Escrow Management Server (개인키 위탁관리 서버를 이용한 전자의무기록 지문인증 모델)

  • Lee, Yong-Joon;Jeon, Taeyeol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.1-8
    • /
    • 2019
  • Medical information is an important personal information for patients, and it must be protected. In particular, when medical personnel approach electronic medical records, authentication for enhanced security is essential. However, the existing public certificate-based certification model did not reflect the security characteristics of the electronic medical record(EMR) due to problems such as personal key management and authority delegation. In this study, we propose a fingerprint recognition-based authentication model with enhanced security to solve problems in the approach of the existing electronic medical record system. The proposed authentication model is an EMR system based on fingerprint recognition using PEMS (Private-key Escrow Management Server), which is applied with the private key commission protocol and the private key withdrawal protocol, enabling the problem of personal key management and authority delegation to be resolved at source. The performance experiment of the proposed certification model confirmed that the performance time was improved compared to the existing public certificate-based authentication, and the user's convenience was increased by recognizing fingerprints by replacing the electronic signature password.

Improving the reliability of Certificate bodies of Environmentally-Friendly Agricultural Products (친환경농산물 인증기관의 신뢰도 제고방안 - 민간인증기관 설문조사 결과를 바탕으로 -)

  • Shin, Y.K.;Park, J.K.
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.17 no.1
    • /
    • pp.113-124
    • /
    • 2015
  • The purposes of this study is to draw up some measures for improving the reliability of certificate bodies of environmentally-friendly agricultural products in Korea. For the purpose, this study investigated the current states of certification system through a survey of the private certificate bodies. Based on the survey, the main goals of this study are as follows : First, the main reason of providing the certification services is the academic-industrial collaboration(21.7%) followed by the revenue seeking of the organizations (20.0%). Second, the average number of cases per private certificate bodies is 277 cases for 1,195 farms, and the average net revenue per authority is estimated as 16.84 million Won with the average total revenue of 262.09 million Won and the average total cost of 255.04 million Won. Third, in order to improve the reliability of the certificate bodies requires a variety of policy options.

Design of KT′s Single Sign-On on Public Key Infrastructure (공개키 기반 구조에서 KT Single Sign-On 설계)

  • Yeon, Seung-Ho;Park, Hyun-Gyu;Oh, Hee-Soo;Kim, Yeong-Heon;Jun, Byoung-Min
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.231-239
    • /
    • 2002
  • This paper gives a comprehensive overview of the SSO solution design on the intranet. SSO described in this paper is based on LDAP, PKI and CA. We designed the data structure to hold many various application services by changing the attribute and DN of LDAP DB. We built LDAP DB using the employee records stored in our organization database. LDAP DB is routinely updated from the database. CA Server that depends on PKI is used to issue the certificates. SHTTP based on SSL is used to protect the data between certificate server and the intranet users.

A Study on Aircraft Type Certification and Compliance Determination (항공기 형식증명 및 적합성 입증에 관한 고찰)

  • Lee, Kang-Yi;Lee, Jonghee;Chung, Ha-Girl;Ryoo, Chang-Kyung
    • Journal of Aerospace System Engineering
    • /
    • v.9 no.3
    • /
    • pp.47-58
    • /
    • 2015
  • An aircraft, its engine and propeller are certified in processes of design, production, and operation respectively. Type Certificate is issued if the aviation authority finds that the design of aircraft, engine, or propeller complies with applicable airworthiness standards and environmental standards. The ICAO (International Civil Aviation Organization) prescribes the international standards and recommended practices of type certification for the contracting states. The FAA (Federal Aviation Administration) and the EASA (European Aviation Safety Agency) established their regulations and procedures applicable to type certification. In this paper, we compared the differences among the ICAO, the FAA, and the EASA regulations, and on this comparison, we proposed the rulemaking items to improve type certification regulations in Korea.