Intrusion-resilient key-evolving protocol under the discrete logarithm problem안전한 비밀키 갱신이 가능한 프로토콜에 대한 연구

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 287
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Kwang-Jo-
dc.contributor.advisor김광조-
dc.contributor.authorKim, Joong-Man-
dc.contributor.author김중만-
dc.date.accessioned2011-12-30-
dc.date.available2011-12-30-
dc.date.issued2004-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=392332&flag=dissertation-
dc.identifier.urihttp://hdl.handle.net/10203/55248-
dc.description학위논문(석사) - 한국정보통신대학교 : 공학부, 2004, [ vii, 39 p. ]-
dc.description.abstractThese days, with the advancement and propagation of the Internet and Information Technology, many security issues have emerged. One of keys enabling to deal with such issues is to adopt Cryptography. Unfortunately, cryptography will not work well if a piece of critical information ($\emph{e.g. secret key}$) is not kept secret from unauthorized entities. When the secret key is revealed, all cryptographic systems will be compromised. Actually, exposing secret keys seems to be unavoidable. And we call this the key exposure problem. Recently, the notion of $\emph{key-evolving paradigm (or key-evolving protocol)}$ was proposed as a means of mitigating the harmful effects that key exposure can cause. In this model, the whole lifetime is divided into distinct periods such that at time period j, the signer holds the secret key $SK_j$ and updates it periodically, while the public key PK is fixed during its lifetime. In this thesis, we investigate the key exposure problem in a key-evolving protocol. We then present the concept of intrusion-resilience, one of alternative concepts such as forward-security, key-insulated security, etc., standing against the key exposure problem. Our intrusion-resilience has the following property: If secret keys of all periods are not compromised, it is impossible to forge signatures relating to non-exposed secret keys. In the next stage, we propose a key-evolving protocol which guarantees intrusion-resilience. Our scheme is constructed from the unforgeably secure Schnorr signature scheme, one of the schemes based on the $\emph{discrete logarithm problem}$ (DLP). Applying for a threshold scheme is also enabling to make our scheme robust. Finally, we can show equivalence between existence of a forger and feasibility of solving the DLP under the random oracle model.eng
dc.languageeng-
dc.publisher한국정보통신대학교-
dc.subjectIntrusion-Resilient key-Evolving protocol-
dc.subjectDiscrete logarithm problem-
dc.titleIntrusion-resilient key-evolving protocol under the discrete logarithm problem-
dc.title.alternative안전한 비밀키 갱신이 가능한 프로토콜에 대한 연구-
dc.typeThesis(Master)-
dc.identifier.CNRN392332/225023-
dc.description.department한국정보통신대학교 : 공학부, -
dc.identifier.uid020023990-
dc.contributor.localauthorKim, Kwang-Jo-
dc.contributor.localauthor김광조-
Appears in Collection
School of Engineering-Theses_Master(공학부 석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0