Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0270-Part1 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2015-12-16 ÃÑÆäÀÌÁö 16
ÇѱÛÇ¥Áظí Æнº¿öµå¿Í IBC(ID ±â¹Ý ¾ÏÈ£½Ã½ºÅÛ)¸¦ ÀÌ¿ëÇÑ Å° ±³È¯ ÇÁ·ÎÅäÄÝ - Á¦1ºÎ ID ±â¹Ý ¾ÏÈ£ ÀÌ¿ë
¿µ¹®Ç¥Áظí Authenticated Key Exchange Protocols Using a Password and an ID-based Cryptosystem - Part 1. Using ID-based Encryption
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº Ŭ¶óÀ̾ðÆ®/¼­¹ö ¸ðµ¨¿¡¼­ »óÈ£ ÀÎÁõ ¹× Å° ±³È¯À» ÅëÇØ º¸¾È ¼¼¼ÇÀ» ¼ö¸³ÇÏ´Â Å° ±³È¯ ÇÁ·ÎÅäÄÝÀ» Á¤ÀÇÇÑ´Ù. Ŭ¶óÀ̾ðÆ®´Â ÀÚ½ÅÀÇ ÀÎÁõÀ» À§Çؼ­ º°µµÀÇ ºñ¹Ð Å°¸¦ ¼ÒÁöÇÏÁö ¾Ê°í ±â¾ïÇϱ⠽¬¿î Æнº¿öµå¸¸À» ÀÌ¿ëÇÏ°í ¼­¹ö´Â ID ±â¹Ý ¾Ïȣȭ ±â¹ý(ID-based encryption scheme)À» ÀÌ¿ëÇÏ¿© ¼­¹ö ÀÎÁõÀ» Á¦°øÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à In order to establish a secure session in a client-server model, this standard specifies authenticated key exchange protocols to perform mutual authentication and key computation. In the protocols, a password is used to authenticate the client and an ID-based encryption scheme is used to authenticate the server.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0270-Part1.pdf TTAK.KO-12.0270-Part1.pdf            

ÀÌÀü
nºñÆ® ºí·Ï ¾ÏÈ£ ¿î¿µ ¸ðµå - Á¦2ºÎ ºí·Ï ¾ÏÈ£ LEA
´ÙÀ½
HMAC ±â¹Ý Å° À¯µµ ÇÔ¼ö