Zero-knowledge proofs, digital signature variants, and their applicants = 영지식 증명, 변형 전자서명 및 그의 응용

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 384
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Kwang-Jo-
dc.contributor.advisor김광조-
dc.contributor.authorLee, Byoung-Cheon-
dc.contributor.author이병천-
dc.date.accessioned2011-12-28T02:54:50Z-
dc.date.available2011-12-28T02:54:50Z-
dc.date.issued2002-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=392121&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/54769-
dc.description학위논문(박사) - 한국정보통신대학원대학교 : 공학부, 2002, [ xv, 166 p. ]-
dc.description.abstractA protocol is a series of steps, involving two or more entities, designed to accomplish a task. If mistrusting entities interact in non-face-to-face way over an open network environment, such as the Internet, various security requirements can occur, and they can be satisfied by using cryptographic technologies. A crytographic protocol is a protocol that uses cryptography to achieve the task and to satisfy security requirements together. Recently, with the advance of the Internet, many traditional off-line services, such as voting, cash, and auction, are moving to online services over the Internet.Because these real world applications are familiar with us, various and complicated security requirements are already existent. To satisfy them, proper cryptographic primitive technologies should be used in well-designed way. Efficiency or performance issue is also very important in the real world. To improve efficiency, some application protocols are designed assuming the existence of trusted third party(TTP)who provides special service. Note that TTP is very familiar experience in our real world. But, in non-face-to-face interaction over an open network environment, trusting somebody over the network is difficult , therefore reducing the trustedness on TTP is an important research issue. In this thesis ,we try to review recent active researches on real world cryptographic protocols, such as electronic voting, electronic auction, mobile signature on a message and a condition together. By imposing a signer-chosen condition which describes expected action of a specified receiver, conditional signature can be used as a private negotiation statement in two-party communication. We model negotiation problem using conditional signature and then construct a fair exchange protocol. We show that matching negotiation and real exchange give a fair exchange of digital signatures.eng
dc.languageeng-
dc.publisher한국정보통신대학원대학교-
dc.subjectZero-Knowledge Proof-
dc.subjectDigital Signature Variant-
dc.subject전자서명-
dc.subject영지식 증명-
dc.titleZero-knowledge proofs, digital signature variants, and their applicants = 영지식 증명, 변형 전자서명 및 그의 응용-
dc.typeThesis(Ph.D)-
dc.identifier.CNRN392121/225023-
dc.description.department한국정보통신대학원대학교 : 공학부, -
dc.identifier.uid000985843-
dc.contributor.localauthorKim, Kwang-Jo-
dc.contributor.localauthor김광조-
Appears in Collection
School of Engineering-Theses_Master(공학부 석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0