ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0270-Part1 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2015-12-16 ÃÑ ÆäÀÌÁö 16
ÇÑ±Û Ç¥ÁØ¸í ÆÐ½º¿öµå¿Í IBC(ID ±â¹Ý ¾ÏÈ£½Ã½ºÅÛ)¸¦ ÀÌ¿ëÇÑ Å° ±³È¯ ÇÁ·ÎÅäÄÝ - Á¦1ºÎ ID ±â¹Ý ¾ÏÈ£ ÀÌ¿ë
¿µ¹® Ç¥Áظí Authenticated Key Exchange Protocols Using a Password and an ID-based Cryptosystem - Part 1. Using ID-based Encryption
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº Ŭ¶óÀ̾ðÆ®/¼­¹ö ¸ðµ¨¿¡¼­ »óÈ£ ÀÎÁõ ¹× Ű ±³È¯À» ÅëÇØ º¸¾È ¼¼¼ÇÀ» ¼ö¸³Çϴ Ű ±³È¯ ÇÁ·ÎÅäÄÝÀ» Á¤ÀÇÇÑ´Ù. Ŭ¶óÀÌ¾ðÆ®´Â ÀÚ½ÅÀÇ ÀÎÁõÀ» À§Çؼ­ º°µµÀÇ ºñ¹Ð ۸¦ ¼ÒÁöÇÏÁö ¾Ê°í ±â¾ïÇϱ⠽¬¿î ÆÐ½º¿öµå¸¸À» ÀÌ¿ëÇÏ°í ¼­¹ö´Â ID ±â¹Ý ¾Ïȣȭ ±â¹ý(ID-based encryption scheme)À» ÀÌ¿ëÇÏ¿© ¼­¹ö ÀÎÁõÀ» Á¦°øÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à In order to establish a secure session in a client-server model, this standard specifies authenticated key exchange protocols to perform mutual authentication and key computation. In the protocols, a password is used to authenticate the client and an ID-based encryption scheme is used to authenticate the server.
°ü·Ã IPR È®¾à¼­    [È®¾à¼­ º¸±â]
°ü·ÃÆÄÀÏ    TTAK.KO-12.0270-Part1.pdf TTAK.KO-12.0270-Part1.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
ÆÐ½º¿öµå¿Í IBC(ID ±â¹Ý ¾ÏÈ£½Ã½ºÅÛ)¸¦ ÀÌ¿ëÇÑ Å° ±³È¯ ÇÁ·ÎÅäÄÝ - Á¦1ºÎ ID ±â¹Ý ¾ÏÈ£ ÀÌ¿ë TTAK.KO-12.0270-Part1 2015-12-16 Á¦Á¤ À¯È¿ 2015-008
TTAK.KO-12.0270-Part1.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2019-05-31 À¯Áö ÇöÀç Ȱ¿ëµÇ°í Àִ ǥÁØÀ̹ǷΠÀ¯Áö°¡ ÇÊ¿äÇÔ