Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0328-Part1 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑÆäÀÌÁö 12
ÇѱÛÇ¥Áظí ÆÛÁö ÀÎÁõ ÇÁ·ÎÅäÄÝ - Á¦1ºÎ: ÀÏ¹Ý ¸ðµ¨
¿µ¹®Ç¥Áظí Fuzzy Authentication Protocol - Part1: General Model
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº ÆÛÁö ÀÎÁõ ÇÁ·ÎÅäÄÝÀÇ ÀÏ¹Ý ¸ðµ¨À» Á¦½ÃÇÑ´Ù. ÆÛÁö ÀÎÁõ ÇÁ·ÎÅäÄÝÀº »ç¿ëÀÚ°¡ À¯ÀÏÇÏ°Ô °íÁ¤µÈ ÇüÅ·ΠÁ¤ÀǵÇÁö ¾Ê´Â ÆÛÁö Á¤º¸(¿¹: ¹ÙÀÌ¿À Á¤º¸)¸¦ ºñ¹Ð ÀÎÁõÅ°·Î ÀÌ¿ëÇÏ¿© ÀÎÁõÀ» ¼öÇàÇÒ ¼ö ÀÖ´Â ÇÁ·ÎÅäÄÝÀÌ´Ù. º» Ç¥ÁØÀº ÆÛÁö ÀÎÁõ ÇÁ·ÎÅäÄÝÀÇ °³¿ä, Âü¿©ÀÚµé, ±×¸®°í ÀϹÝÀûÀÎ µ¿ÀÛ ¹æ½Ä¿¡ ´ëÇÑ ¼³¸íÀ» Æ÷ÇÔÇÑ´Ù. ÀϹÝÀûÀÎ µ¿ÀÛ ¹æ½ÄÀº µî·Ï°ú ÀÎÁõÀÇ µÎ ´Ü°è¸¦ ±¸¼ºÇÑ´Ù. µî·Ï´Ü°è¿¡¼­ Áõ¸íÀÚ(prover)´Â ÆÛÁö Á¤º¸·ÎºÎÅÍ »ý¼ºµÈ °ËÁõÅ°¸¦ °ËÁõÀÚ(verifier)¿¡ µî·ÏÇÑ´Ù. ÀÎÁõ´Ü°è¿¡¼­ Áõ¸íÀÚ(prover)´Â ÆÛÁö Á¤º¸·ÎºÎÅÍ »ý¼ºµÈ ÀÎÁõ °ªÀ» Á¦°øÇÏ°í °ËÁõÀÚ(verifier)´Â µî·ÏµÈ °ËÁõÅ°¸¦ ÀÌ¿ëÇÏ¿© ÀÎÁõ °ªÀ» °ËÁõÇÏ¿© Áõ¸íÀÚ(prover)¸¦ ÀÎÁõÇÑ´Ù. °ËÁõÅ°·ÎºÎÅÍ´Â ÇÕ¸®ÀûÀÎ ¼öÁØÀÇ º¸¾È °­µµ·Î º»·¡ÀÇ ÆÛÁö Á¤º¸°¡ ´©ÃâµÇÁö ¾Ê´Â´Ù°í °¡Á¤µÇ¸ç, µû¶ó¼­ °ËÁõÀÚ(verifier)¿¡°Ô ÆÛÁö Á¤º¸°¡ Á÷Á¢ ³ëÃâµÇÁö ¾Ê´Â´Ù.
¿µ¹®³»¿ë¿ä¾à The standard specifies a general model of a fuzzy authentication protocol. In the fuzzy authentication protocol, a client makes use of non-deterministic fuzzy information such as biometrics as an private authentication key. The standard includes overview, participants, and a general procedure. The general procedure
consists of two phases, registration and authentication. In the registration phase, a prover registers a verification key, which is generated with fuzzy information, to a verifier. In the authentication phase, the prover provides an authentication value to the verifier and the verifier verifies the authentication value using the registered verification key to authenticate the prover. It is assumed that no useful information for fuzzy information is revealed (to even the verifier) from the verification key.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0328-Part1.pdf TTAK.KO-12.0328-Part1.pdf            

ÀÌÀü
3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;Study on the security aspects of Artificial Intelligence (AI)/Machine Learning (ML) for the Next Generation Radio Access Network (NG-RAN)(Release 18)
´ÙÀ½
3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;Study on security enhancements for 5G multicast-broadcast services phase 2(Release 18)