ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0270-Part2 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2015-12-16 ÃÑ ÆäÀÌÁö 11
ÇÑ±Û Ç¥ÁØ¸í ÆÐ½º¿öµå¿Í IBC(ID ±â¹Ý ¾ÏÈ£½Ã½ºÅÛ)¸¦ ÀÌ¿ëÇÑ Å° ±³È¯ ÇÁ·ÎÅäÄÝ - Á¦2ºÎ ID ±â¹Ý ¼­¸í ÀÌ¿ë
¿µ¹® Ç¥Áظí Authenticated Key Exchange Protocols Using a Password and an ID-based Cryptosystem - Part 2. Using ID-based Signatures
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº Ŭ¶óÀ̾ðÆ®/¼­¹ö ¸ðµ¨¿¡¼­ »óÈ£ ÀÎÁõ ¹× Ű ±³È¯À» ÅëÇØ º¸¾È ¼¼¼ÇÀ» ¼ö¸³ÇÏ´Â ÀÎÁõµÈ Ű ±³È¯ ÇÁ·ÎÅäÄÝÀ» Á¤ÀÇÇÑ´Ù. Ŭ¶óÀÌ¾ðÆ®¿Í ¼­¹ö´Â ÆÐ½º¿öµå ±â¹Ý Ű ±³È¯ ÇÁ·ÎÅäÄÝÀ» ¼öÇàÇϸç, ¼­¹ö´Â Ãß°¡·Î ID ±â¹Ý ¼­¸í ±â¹ý(ID-based signature scheme)À» ÀÌ¿ëÇÏ¿© ¼­¹ö ÀÎÁõÀ» Á¦°øÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This standard specifies authenticated key exchange protocols to perform mutual authentication and key computation, in order to establish a secure session in a client-server model. Basically, a password-based authenticated key exchange protocol is executed between a client and a server. In addition, an ID-based signature scheme is used to authenticate the server.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0270-Part2.pdf TTAK.KO-12.0270-Part2.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
ÆÐ½º¿öµå¿Í IBC(ID ±â¹Ý ¾ÏÈ£½Ã½ºÅÛ)¸¦ ÀÌ¿ëÇÑ Å° ±³È¯ ÇÁ·ÎÅäÄÝ - Á¦2ºÎ ID ±â¹Ý ¼­¸í ÀÌ¿ë TTAK.KO-12.0270-Part2 2015-12-16 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0270-Part2.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2019-05-31 À¯Áö ÇöÀç Ȱ¿ëµÇ°í Àִ ǥÁØÀ̹ǷΠÀ¯Áö°¡ ÇÊ¿äÇÔ