Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0308 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2017-12-13 ÃÑÆäÀÌÁö 22
ÇѱÛÇ¥Áظí IBC(ID ±â¹Ý ¾ÏÈ£ ½Ã½ºÅÛ)¸¦ ÀÌ¿ëÇÑ ÀÎÁõ ¹× Å° ÇÕÀÇ ÇÁ·ÎÅäÄÝ
¿µ¹®Ç¥Áظí Authentication and Key Agreement Protocols using an ID-based Cryptosystem
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº »ç¿ëÀÚ °£ »óÈ£ ÀÎÁõ ¹× Å° ÇÕÀǸ¦ ÅëÇØ ¾ÈÀüÇÑ Ã¤³ÎÀ» Çü¼ºÇÏ´Â ÀÎÁõ ¹× Å° ÇÕÀÇ ÇÁ·ÎÅäÄÝÀ» Á¤ÀÇÇÑ´Ù. º» Ç¥ÁØ¿¡¼­ Á¤ÀÇÇÏ´Â ÇÁ·ÎÅäÄÝÀº ID ±â¹Ý ¼­¸í ±â¼úÀ» ÀÌ¿ëÇÏ¿© »ó´ë¹æÀÇ ID¸¦ ÀÌ¿ëÇÑ »óÈ£ ÀÎÁõÀ» Á¦°øÇϸç, ±× °úÁ¤¿¡¼­ Å° ÇÕÀǸ¦ À§ÇÑ ¿ä¼Ò¸¦ µµÃâÇÏ¿© ÀÎÁõ°ú Å° ÇÕÀÇ°¡ µ¶¸³ÀûÀ¸·Î ¼öÇàµÇÁö ¾Ê°í ÇϳªÀÇ °ø°³ ÆĶó¹ÌÅÍ·Î µ¿½Ã¿¡ ¼öÇàµÇ´Â Ư¡À» °¡Áø´Ù.
¿µ¹®³»¿ë¿ä¾à The standard defines an authentication and key agreement protocol that establishes a secure channel through mutual authentication and key agreement between users. The ID-based signature technology is used to provide mutual authentication using each other¡¯s ID. In the process, authentication and key agreement are not performed independently but are performed simultaneously with existing parameters.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0308.pdf TTAK.KO-12.0308.pdf            

ÀÌÀü
IoT ±â±â °£ Á¢±ÙÁ¦¾î ¸ÞÄ¿´ÏÁò ¹× È°¿ë ¿¹
´ÙÀ½
±ÝÀ¶ ¼­ºñ½º¿¡ ½Å·Ú ½Â±ÞÀÌ °¡´ÉÇÑ ÀÎÁõ µî±Þ