Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0222 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2013-12-18 ÃÑÆäÀÌÁö 35
ÇѱÛÇ¥Áظí À͸í ÀÎÁõµÈ Å° µ¿ÀÇ ÇÁ·ÎÅäÄÝ
¿µ¹®Ç¥Áظí Anonymous Authenticated Key Agreement Protocol
Çѱ۳»¿ë¿ä¾à À͸í ÀÎÁõ ÇÁ·ÎÅäÄÝÀº »ç¿ëÀÚ°¡ ½ÅºÐÀ» ³ëÃâÇÏÁö ¾ÊÀ¸¸é¼­µµ Á¤´çÇÑ »ç¿ëÀÚÀÓÀ» Áõ¸íÇÒ ¼ö ÀÖ´Â ¾ÏÈ£ÇÐÀû ±â¹ýÀÌ´Ù. ÀÎÁõµÈ Å° µ¿ÀÇ ÇÁ·ÎÅäÄÝÀº ½Çüµé »çÀÌ¿¡¼­ ¾ÈÀüÇÑ Åë½Å ¼¼¼ÇÀ» ¸¸µé±â À§Çؼ­ Âü°¡ÀÚ¸¦ ÀÎÁõÇÏ°í ¾ÏÈ£ Å°¸¦ °øÀ¯ÇÏ´Â ¾ÏÈ£ÇÐÀû ±â¹ýÀÌ´Ù. À§ µÎ °¡Áö ±â´ÉÀ» µ¿½Ã¿¡ Á¦°øÇϱâ À§ÇØ À͸í ÀÎÁõµÈ Å° µ¿ÀÇ ÇÁ·ÎÅäÄÝÀÌ °í¾ÈµÇ¾ú´Ù.
±âÁ¸ÀÇ ±×·ì ¼­¸í ±â¹ÝÀÇ À͸í ÀÎÁõµÈ Å° µ¿ÀÇ ÇÁ·ÎÅäÄÝ¿¡¼­ °ËÁõÀÚ(verifier)´Â ÁÖÀåÀÚ(claimant)°¡ Çã°¡¹ÞÀº ±×·ì¿¡ ¼ÓÇÑ Á¤´çÇÑ »ç¿ëÀÚÀÎÁöÀÇ ¿©ºÎ¸¸À» È®ÀÎÇÏ°Ô µÈ´Ù. ÀÌ ¶§¹®¿¡ ÇÁ·ÎÅäÄÝÀ» ½ÃÀÛÇÑ ÁÖÀåÀÚ°¡ ¾Æ´Ñ, °°Àº ±×·ì¿¡ ¼ÓÇÑ ´Ù¸¥ »ç¿ëÀÚ°¡ ÇÁ·ÎÅäÄÝ ÁøÇà °úÁ¤ Áß°£¿¡ °³ÀÔÇÒ ¼ö ÀÖ´Ù´Â ¹®Á¦°¡ ÀÖ´Ù. À̸¦ ÇØ°áÇϱâ À§ÇÑ °ÍÀÌ ¹­ÀÓ ¼ºÁú(binding property)À» °®´Â À͸í ÀÎÁõµÈ Å° µ¿ÀÇ ÇÁ·ÎÅäÄÝÀÌ´Ù. ¹­ÀÓ ¼ºÁúÀ̶õ À͸í ÀÎÁõµÈ Å° µ¿ÀÇ ÇÁ·ÎÅäÄÝ¿¡¼­ Àü´Þ¹ÞÀº ¸Þ½ÃÁö°¡ ÇÁ·ÎÅäÄÝÀ» ½ÃÀÛÇÑ °°Àº »ç¿ëÀڷκÎÅÍ Àü´ÞµÇ¾úÀ½À» º¸ÀåÇÏ´Â ¼ºÁúÀÌ´Ù.
º» Ç¥ÁØ¿¡¼­´Â À͸í ÀÎÁõµÈ Å° µ¿ÀÇ ÇÁ·ÎÅäÄÝ¿¡¼­ »ç¿ëµÇ´Â ¿ë¾î¿Í ±âÈ£, ÇÁ·ÎÅäÄÝÀÇ Âü°¡ÀÚ¿¡ ´ëÇؼ­ ±ÔÁ¤ÇÏ°í, º» Ç¥ÁØ¿¡¼­ ±ÔÁ¤ÇÏ´Â À͸í ÀÎÁõµÈ Å° µ¿ÀÇ ÇÁ·ÎÅäÄÝ¿¡¼­ÀÇ ¿ä±¸ »çÇ׿¡ ´ëÇØ ±â¼úÇÏ°í ÀÖ´Ù. ¶ÇÇÑ, ÇØ´ç ¿ë¾î¿Í Âü°¡ÀÚ ¹× ¿ä±¸ »çÇ׿¡ ±Ù°ÅÇÑ ¹­ÀÓ ¼ºÁúÀ» °®´Â À͸í ÀÎÁõµÈ Å° µ¿ÀÇ ÇÁ·ÎÅäÄÝÀ» ±ÔÁ¤ÇÏ°í ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à Anonymous entity authentication protocol is a cryptographic technique which can prove whether an entity is a legitimate user without revealing the user's identity. An authenticated key agreement protocol is a cryptographic technique through which entities authenticate each other and share common cryptographic keys for secure communication session between entities. Anonymous authenticated key agreement protocol can provide anonymous authentication and key agreement at the same time.
In existing anonymous authenticated key agreement protocol based on group signature, a verifier only verifies whether the claimant is a member of authorized group or not. Because of this property, another member of authorized group who didn't start protocol can intervene in the middle of the protocol and impersonate an original claimant. An anonymous authenticated key agreement protocol with binding property can solve this problem. A binding property guarantees that transmitted messages came from the same user who initiated the anonymous authenticated key agreement protocol.
This standard includes the definition of terms, symbols, participants, and requirements for anonymous authenticated key agreement protocol. Moreover, it specifies anonymous authenticated key agreement protocols with weak binding property and with strong binding property based on previously defined terms, entities and requirements.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0222.pdf TTAK.KO-12.0222.pdf            

ÀÌÀü
Á¤¹Ð°¡°ø ¾÷Á¾ ½º¸¶ Æ®°øÀå Àû¿ë Áöħ – Á¦3ºÎ: Á¤º¸ ¸ðµ¨
´ÙÀ½
Ç¥¸éó¸® ¾÷Á¾ ½º¸¶Æ® °øÀå Àû¿ë Áöħ – Á¦2ºÎ: Á¤º¸±³È¯ ÀÎÅÍÆäÀ̽º