Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0270-Part1 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2015-12-16 | ÃÑÆäÀÌÁö | 16 |
ÇѱÛÇ¥Áظí | Æнº¿öµå¿Í IBC(ID ±â¹Ý ¾ÏÈ£½Ã½ºÅÛ)¸¦ ÀÌ¿ëÇÑ Å° ±³È¯ ÇÁ·ÎÅäÄÝ - Á¦1ºÎ ID ±â¹Ý ¾ÏÈ£ ÀÌ¿ë | ||
¿µ¹®Ç¥Áظí | Authenticated Key Exchange Protocols Using a Password and an ID-based Cryptosystem - Part 1. Using ID-based Encryption | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº Ŭ¶óÀ̾ðÆ®/¼¹ö ¸ðµ¨¿¡¼ »óÈ£ ÀÎÁõ ¹× Å° ±³È¯À» ÅëÇØ º¸¾È ¼¼¼ÇÀ» ¼ö¸³ÇÏ´Â Å° ±³È¯ ÇÁ·ÎÅäÄÝÀ» Á¤ÀÇÇÑ´Ù. Ŭ¶óÀ̾ðÆ®´Â ÀÚ½ÅÀÇ ÀÎÁõÀ» À§Çؼ º°µµÀÇ ºñ¹Ð Å°¸¦ ¼ÒÁöÇÏÁö ¾Ê°í ±â¾ïÇϱ⠽¬¿î Æнº¿öµå¸¸À» ÀÌ¿ëÇÏ°í ¼¹ö´Â ID ±â¹Ý ¾ÏÈ£È ±â¹ý(ID-based encryption scheme)À» ÀÌ¿ëÇÏ¿© ¼¹ö ÀÎÁõÀ» Á¦°øÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | In order to establish a secure session in a client-server model, this standard specifies authenticated key exchange protocols to perform mutual authentication and key computation. In the protocols, a password is used to authenticate the client and an ID-based encryption scheme is used to authenticate the server. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0270-Part1.pdf |