View : 1144 Download: 0

Full metadata record

DC Field Value Language
dc.contributor.advisor이상호-
dc.contributor.author권세란-
dc.creator권세란-
dc.date.accessioned2016-08-26T04:08:15Z-
dc.date.available2016-08-26T04:08:15Z-
dc.date.issued2007-
dc.identifier.otherOAK-000000028054-
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/208946-
dc.identifier.urihttp://dcollection.ewha.ac.kr/jsp/common/DcLoOrgPer.jsp?sItemId=000000028054-
dc.description.abstract최근 컴퓨터 기술의 발달과 통신망의 급속한 확장으로 인해 컴퓨터 관련 자원과전송되는 데이터들에 대한 보안 문제가 큰 이슈로 부각되고 있다.이러한 문제를 해결할 수 있는 하나의 대안으로 암호 기반 시스템이 이용되고 있는데,현재까지 가장크게 기여한 암호 시스템으로는 Diffie와 Hellman에 의해 1976년도에 처음으로 도입된 공개키 암호 시스템이 있다.하지만 이와 같은 전통적 공개키 시스템에서는 사용자의 공개키를 미리 인증해야 하고 또한 문제가 발생한 인증서는 유효기간 종료 전이라도 폐기해야 하므로 공개키의 인증서 관리에 관련한 어려움이 발생하게 된다.1984년 Shamir에 의해 처음으로 개인의 신원 (identity또는 ID)을 기반으로 하는 ID 기반공개키 시스템 (ID-PKC)이 제안되었고,2001년 Boneh와 Franklin이 타원곡선상의pairing의 성질을 이용하여 실지 구현해서 사용할 수 있는 ID-PKC 를 개발하였다.신원 기반 암호 시스템에서는 개인의 공개키는 개인이 갖고 있는 공개된 정보(identity)로 누구나 인증 없이 사용할 수 장점이 있지만 어려운 점은 개인의 비밀키는 키 발행기관 (KGC)이라고 일컬어지는 어떤 신뢰기관에서 발행해서 또한 안전하게 개인에게 전달해야 하는 문제가 있다. 본 논문에서 우리는 ID-PKC 상에서 키 발행기관이 개인의 비밀 키를 발행해주는 것과 관련된 효율적인 프로토콜을 제안하고 있다.또한 기존의 키 발행과 관련된여러 프로토콜 중에서 취약성을 갖고 있는 프로토콜들을 분석 (cryptanalysis)하여 이들에 대한 개선책도 제시하였다.다음으로 ID-PKC 상에서 검증은 가능하지만 암호화되어 있어 직접 서명을 볼 수는 없는 서명 기법인 검증 가능한 암호화된 서명(verifiably encryptedsignature또는 VES)에 관한 연구를 하였다.특히 Hess의 ID관련 서명을 기반으로 하는 효율적인 ID 기반의 VES 스킴을 제안하였다.더 나아가서 스킴의 안전성 증명에서 random oracles를 사용하지 않고 안전성을 증명할 수 있으면서 기존의 스킴에 비해 크기가 2/3정도인 VES 스킴을 제안하였다.마지막으로역시 random oracles를 사용하지 않고 안전성을 증명할 수 있으면서 보다 강한 의미에서 위조 불가능한 ID-기반 서명 스킴과 ID-기반 VES 스킴을 제안하였다.;With the rapid expansion of computer systems and their interconnection via networks, security problems to protect computer resources and data have emerged; and cryptographic systems have been used as one of the solutions to resolve them. The idea of public key cryptographic system was initiated by Diffie and Hellman in 1976. The concept of identity (ID)-based public key cryptography (ID-PKC) was introduced by Shamir in 1984 for simplifying certificate management related to the guarantee of user’s public key in traditional public key cryptosystems. Boneh and Franklin (2001) first presented the fully practical and secure identity-based encryption scheme (IBE) built from the bilinear pairing on elliptic curves where an entity’s public key is directly derived from its identity information and corresponding private key is generated by a trusted third party called as the key generation center (KGC) (or the Private Key Generator (PKG)), and handed to each user through a secure channel. In cryptographic protocol or scheme designs, provable security is the basic requirement to show the soundness of the system. Most of existing cryptographic works deploy the random oracle model in deducing provable security. However, it has been shown that the security of Cryptographic schemes in the random oracle model does not always guarantee the security of the schemes when implementing the random oracle by cryptographic hash functions. Waters (2005) succeeded to construct an efficient IBE scheme proved secure in the standard model without random oracles. In this thesis, we construct the protocol related with private key issuing between the KGC (or the PKG) and participants in ID-based public key cryptosystem together with the cryptanalysis of the existing protocols, and primitives such as ID-based signatures or verifiably encrypted signatures in the frame of both the random oracle model and the standard model without random oracles. Our schemes are designed on the Gap Diffie-Hellman (GDH) groups in the ID-based public key cryptosystem built from the pairing which can be implemented via the Weil pairing or the Tate pairing on the elliptic curves. The results are summarized as follows: First, the related works on private or partial private key issuing by the KGC in ID-PKC are reviewed and security problems for schemes with weakness are analyzed. In addition, improvements are presented. Subsequently, a new key issuing scheme is proposed; it reasonably reduces the burden imposed on the KGC in checking the identifications of all users, providing secure transmission channel between the KGC and users through a blinding technique, and dealing efficiently with the key escrow problem. Second, a new efficient ID-based verifiably encrypted signature scheme (IDVES) is proposed; it is based on Hess’s signature scheme known as the most concise and secure ID-based signature scheme in ID-PKC. Also, efficiency of the proposed scheme is examined, and its security is proved in the random oracle model based on the security model. Third, a new enhanced verifiably encrypted signature, provably secure in the standard model, is presented; it is computationally efficient and reduced in size. And it’s security is proved without random oracles. Last, the first strongly unforgeable ID-based signature (IBS) scheme in the standard model is presented; its security is reduced to the hardness of the CDH problem. Also, an ID-based VES (ID-VES) scheme provably secure in the standard model is presented through combining the property of a VES with our proposed IBS. Subsequently, securities of our IBS and ID-VES schemes are proved without random oracles.-
dc.description.tableofcontentsChapter Ⅰ. Introduction = 1 1.1 Background and Motivation = 1 1.2 Research Goals = 5 1.3 Contributions = 6 1.4 Preliminaries = 9 1.4.1 Bilinear Pairings = 9 1.4.2 Gap Diffie-Hellman (GDH) Groups and Some Problems = 10 1.4.3 The One-More-RSA Inversion Problem and Its Assumption = 11 1.5 Organization = 12 Chapter Ⅱ. Key Issuing Schemes in ID-based Cryptography = 14 2.1 Related Works and Security Analysis = 15 2.2 Security Analysis and Improvement for Key Issuing Scheme by Lee et al. = 20 2.2.1 Review = 20 2.2.2 Weakness and Attack = 22 2.2.3 Improvement = 24 2.3 Security Analysis for Key Issuing Scheme by Gangishetti et al = 27 2.3.1 Review = 27 2.3.2 Weakness, Attack and Improvement = 29 2.4 A New Separable Key Issuing Scheme Without Secure Channel between KGC and Users in Broad Area = 31 2.4.1 Our Key Issuing Model = 32 2.4.2 Proposed Key Issuing Protocol = 35 2.4.3 Separable Key Issuing without Key Escrow = 37 2.4.4 Analysis = 38 2.5 Summary = 42 Chapter Ⅲ. An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess’s Scheme = 44 3.1 Overview and Related Works = 45 3.2 Definition of Verifiably Encrypted Signatures = 48 3.3 Our ID-Based Verifiably Encrypted Signature Based on Hess’s Scheme = 50 3.3.1 Description = 50 3.4 Analysis = 52 3.4.1 Efficiency = 52 3.4.2 Security Model of VES = 53 3.4.3 Security Proof of Our Scheme = 55 3.5 Summary = 60 Chapter Ⅳ. An Efficient Verifiably Encrypted Signature Without Random Oracles = 61 4.1 Related Works = 62 4.2 Definition of Verifiably Encrypted Signatures and Security Model = 63 4.2.1 Definition of Verifiably Encrypted Signatures = 63 4.2.2 Security Model of VES = 64 4.3 Our Verifiably Encrypted Signature Without Random Oracles = 66 4.3.1 Description = 66 4.4 Analysis = 69 4.4.1 Efficiency = 70 4.4.2 Security Proof of Our Scheme = 71 4.5 Summary = 78 Chapter Ⅴ. Strongly Unforgeable Identity-Based Signature and Verifiably Encrypted Signature Without Random Oracles = 79 5.1 Overview and Related Works = 80 5.2 Definition and Security Model = 82 5.2.1 Security Model of Strongly Unforgeable ID-based Signatures = 82 5.2.2 Definition of ID-based Verifiably Encrypted Signatures = 84 5.2.3 Security Model of Strongly Unforgeable ID-VES = 85 5.3 Our ID-based Signature and ID-VES Without Random Oracles = 87 5.3.1 Description = 87 5.4 Proof of Security = 91 5.5 Summary = 100 Chapter Ⅵ. Conclusion = 101 Bibliography = 104-
dc.formatapplication/pdf-
dc.format.extent732220 bytes-
dc.languageeng-
dc.publisher이화여자대학교 대학원-
dc.subject.ddc621-
dc.titleID-Based Cryptosystems Using Pairing-
dc.typeDoctoral Thesis-
dc.title.subtitleKey Issuing and Verifiably Encrypted Signatures-
dc.title.translatedPairing을 이용한 identity기반 암호시스템 : 키 발행과 검증 가능한 암호화된 서명 스킴-
dc.creator.othernameKwon, Sae Ran-
dc.format.pageⅶ, 112 p.-
dc.identifier.thesisdegreeDoctor-
dc.identifier.major대학원 컴퓨터정보통신공학과-
dc.date.awarded2007. 8-
Appears in Collections:
일반대학원 > 컴퓨터정보통신공학과 > Theses_Ph.D
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE