Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0328-Part1 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2018-12-19 | ÃÑÆäÀÌÁö | 12 |
ÇѱÛÇ¥Áظí | ÆÛÁö ÀÎÁõ ÇÁ·ÎÅäÄÝ - Á¦1ºÎ: ÀÏ¹Ý ¸ðµ¨ | ||
¿µ¹®Ç¥Áظí | Fuzzy Authentication Protocol - Part1: General Model | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº ÆÛÁö ÀÎÁõ ÇÁ·ÎÅäÄÝÀÇ ÀÏ¹Ý ¸ðµ¨À» Á¦½ÃÇÑ´Ù. ÆÛÁö ÀÎÁõ ÇÁ·ÎÅäÄÝÀº »ç¿ëÀÚ°¡ À¯ÀÏÇÏ°Ô °íÁ¤µÈ ÇüÅ·ΠÁ¤ÀǵÇÁö ¾Ê´Â ÆÛÁö Á¤º¸(¿¹: ¹ÙÀÌ¿À Á¤º¸)¸¦ ºñ¹Ð ÀÎÁõÅ°·Î ÀÌ¿ëÇÏ¿© ÀÎÁõÀ» ¼öÇàÇÒ ¼ö ÀÖ´Â ÇÁ·ÎÅäÄÝÀÌ´Ù. º» Ç¥ÁØÀº ÆÛÁö ÀÎÁõ ÇÁ·ÎÅäÄÝÀÇ °³¿ä, Âü¿©ÀÚµé, ±×¸®°í ÀϹÝÀûÀÎ µ¿ÀÛ ¹æ½Ä¿¡ ´ëÇÑ ¼³¸íÀ» Æ÷ÇÔÇÑ´Ù. ÀϹÝÀûÀÎ µ¿ÀÛ ¹æ½ÄÀº µî·Ï°ú ÀÎÁõÀÇ µÎ ´Ü°è¸¦ ±¸¼ºÇÑ´Ù. µî·Ï´Ü°è¿¡¼ Áõ¸íÀÚ(prover)´Â ÆÛÁö Á¤º¸·ÎºÎÅÍ »ý¼ºµÈ °ËÁõÅ°¸¦ °ËÁõÀÚ(verifier)¿¡ µî·ÏÇÑ´Ù. ÀÎÁõ´Ü°è¿¡¼ Áõ¸íÀÚ(prover)´Â ÆÛÁö Á¤º¸·ÎºÎÅÍ »ý¼ºµÈ ÀÎÁõ °ªÀ» Á¦°øÇÏ°í °ËÁõÀÚ(verifier)´Â µî·ÏµÈ °ËÁõÅ°¸¦ ÀÌ¿ëÇÏ¿© ÀÎÁõ °ªÀ» °ËÁõÇÏ¿© Áõ¸íÀÚ(prover)¸¦ ÀÎÁõÇÑ´Ù. °ËÁõÅ°·ÎºÎÅÍ´Â ÇÕ¸®ÀûÀÎ ¼öÁØÀÇ º¸¾È °µµ·Î º»·¡ÀÇ ÆÛÁö Á¤º¸°¡ ´©ÃâµÇÁö ¾Ê´Â´Ù°í °¡Á¤µÇ¸ç, µû¶ó¼ °ËÁõÀÚ(verifier)¿¡°Ô ÆÛÁö Á¤º¸°¡ Á÷Á¢ ³ëÃâµÇÁö ¾Ê´Â´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard specifies a general model of a fuzzy authentication protocol. In the fuzzy authentication protocol, a client makes use of non-deterministic fuzzy information such as biometrics as an private authentication key. The standard includes overview, participants, and a general procedure. The general procedure
consists of two phases, registration and authentication. In the registration phase, a prover registers a verification key, which is generated with fuzzy information, to a verifier. In the authentication phase, the prover provides an authentication value to the verifier and the verifier verifies the authentication value using the registered verification key to authenticate the prover. It is assumed that no useful information for fuzzy information is revealed (to even the verifier) from the verification key. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0328-Part1.pdf |