Verifiable Self-Certified Schemes for Authentication Service of Electronic Commerce

전자상거래 인증 서비스를 위한 검증 가능한 자체인증 방식

  • 주미리 (성균관대학교 전기전자및컴퓨터공학부) ;
  • 이보영 (인덕대학교 정보통신학과) ;
  • 양형규 (강남대학교 전자계산학과) ;
  • 원동호 (성균관대학교 전기전자 및 컴퓨터공학부)
  • Published : 2000.09.01

Abstract

In this paper, for authentication service of electronic commerce, we propose the verifiable self-certified schemes based on the $\gamma^{th}$-residuosity, thich are combine the benefit of certifiction based schemes and Girault's self-certified public keys. The security of our schemes is based on the difficulty of $\gamma^{th}$-residuosity problem and discrete logarithm problem simultaneously.

본 논문에서는 전자성거래 인증 서비스를 제공하기 위하여 인증서에 기반한 방식의 정점과 Girault의 자체인증 공개키 방식의 장점을 결합한 검증 가능한 자체인증 방식을 고차잉여류 문제에 기반하여 제안한다. 제안한 방식의 안전성은 고차잉여류 문제와 이산대수 문제에 기반을 두고 있다.

Keywords

References

  1. 이승원, '전자상거래 정책 추진 방향', 정보처리학회지'99, Vol.6. No.1, pp.3-6
  2. 김홍근, 최영철, '전자상거래 정보보호기술 현황 및 대응 방안', 정보처리학회지99, Vol.6, No.1, 22-34
  3. Shamir, 'Identity-Based Cryptosysterns and Sig-nature Schemes', Crypto'84, pp.47-53, 1984
  4. M. Girault, 'Self-certified public keys', Advances in Cryptology EUROCRYPT'91, pp.490-497, 1991
  5. C. Y. Kwon, D. H. Won, 'A study on self-certified public key scheme', The Review of Korea Institute of Information Security & Cryptology, Vol.3, No.3, 1993. 9
  6. Seung-joo Kim, Soo-hyun Oh, Sang-joan Park and Dong-ho Won, 'Verifiable self-certified public keys', Daniel AUGOT and Claude CARLET (Eds.) : Proc. of WCC'99, INRlA Workshop on Coding and Cryptography, pp.139-148, 1999
  7. Y. Zneng, T. Matsumoto and H. Imai, 'Residuosity Problem and its Application to Cryptography', Trans, IEICE, Vol.E71, No.8, pp.759-767, 1988
  8. S. J. Park, H. K Yang, D. H. Won, 'A class of public key residue cryptosystems', Proc. of CISC'95, Conference on Information Security & Cryptology, Vol.5, No.1, 1995
  9. S. J. Kim, C. Y. Kwon, S. G. Kang, D. H. Won, 'A study on public key authentication schemes', The Review of Korea Institute of Information Security & Cryptology, Vol.6, No.4, 1996
  10. B. Y. Lee, Y. Y. Choi, M. R. Joo, D. H. Won, 'An efficient ID-based authentication scheme based on the ${\gamma}^{th}$-residuosity problem in wireless environ-ment', Journal of the Korea Institute of Information Security and Cryptology, Vol.9, No.2, 1999. 6
  11. M. R. Joo, B. Y. Lee, H. K Yang, D. H. Won, 'Ver-ifiable self-certified schemes based on ${\gamma}^{th}$-residuosity problem', Journal of the Korea Institute of Information Security and Cryptology, Vol.9, No.4, 1999. 12