DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Kim, Kwang-Jo | - |
dc.contributor.advisor | 김광조 | - |
dc.contributor.author | Kim, Jong-Seong | - |
dc.contributor.author | 김종승 | - |
dc.date.accessioned | 2011-12-30 | - |
dc.date.available | 2011-12-30 | - |
dc.date.issued | 2003 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=392205&flag=dissertation | - |
dc.identifier.uri | http://hdl.handle.net/10203/55171 | - |
dc.description | 학위논문(석사) - 한국정보통신대학원대학교 : 공학부, 2003, [ x, 48 p. ] | - |
dc.description.abstract | An anonymous authentication scheme allows a user to identify himself as a member of a group of users in a secure and anonymous way. It seems to be crucial and indispensable components in English auction, electronic voting and open procurement, which are getting very popular business areas in E-commerce. In wireless network with power-limited devices, managing a group dynamically is much more difficult to perform within specific time periods. Moreover, all participants must make a decision timely to win against competitors. Therefore, an efficient and practical protocol is indeed required. We propose an anonymous authentication protocol that not only allows much lower computational complexity for practical use but also meets requirements of dynamic groups, especially with power-limited devices. Our special contribution is to provide the strict analysis of security based on the framework of provable security. Our protocol consists of a group manager, a verification center, and $\emph{m}$ group members. In the protocol, the verification center that acts like a TTP does not possess any information needed to identify group members. Similar to the verification center, the group manager also cannot identify the group member without the verification center``s help. In particular, our protocol is suitable for English auction or open bidding systems where the change of participating entities in a group occurs frequently and, at the same time, the processing must be executed within short time period. | eng |
dc.language | eng | - |
dc.publisher | 한국정보통신대학교 | - |
dc.subject | Authentication Protocol | - |
dc.subject | 익명성 인증 프로토콜 | - |
dc.title | Provably secure anonymous authentication protocol based on hash chains | - |
dc.title.alternative | 해쉬 체인을 이용한 안전성 증명 가능한 익명성 인증 프로토콜 | - |
dc.type | Thesis(Master) | - |
dc.identifier.CNRN | 392205/225023 | - |
dc.description.department | 한국정보통신대학원대학교 : 공학부, | - |
dc.identifier.uid | 020013958 | - |
dc.contributor.localauthor | Kim, Kwang-Jo | - |
dc.contributor.localauthor | 김광조 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.