DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Kim, Kwang-Jo | - |
dc.contributor.advisor | 김광조 | - |
dc.contributor.author | Lee, Song-Won | - |
dc.contributor.author | 이송원 | - |
dc.date.accessioned | 2011-12-30 | - |
dc.date.available | 2011-12-30 | - |
dc.date.issued | 2004 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=392357&flag=dissertation | - |
dc.identifier.uri | http://hdl.handle.net/10203/55273 | - |
dc.description | 학위논문(석사) - 한국정보통신대학교 : 공학부, 2004, [ x, 41 p. ] | - |
dc.description.abstract | These days many real world systems still rely on password authentication to verify the user``s identity before allowing that user to be given certain network services. So far many protocols based on password have been proposed, even if there are many security concerns associated with password-based protocol. Thus many researchers have studied how to make the password-like weak key to be more stronger one. On the other hand, with rapid development on the Internet, users can easily access the network anywhere and anytime, which is so called ubiquitous computing paradigm. Thus, we want to give users password-authenticated access to private keys from anywhere, while protecting the password and those private keys from being revealed to an attacker. We present a new threshold password-authenticated key retrieval protocol that allows a $\emph{roaming user}$, who accesses a network from different client terminals, to download a private key from remote servers with knowledge of only his identity and password information, assuming that the user does not carry the smart card storing user``s private information. We note that as a goal of a multi-server roaming system, the protocol has to allow a user to get his private key from the servers, even if some of the servers are compromised. With this point of view, we give the first description of a $\emph{threshold password-only roaming protocol using bilinear pairings}$. In this paper, we use $\emph{(k,n)-threshold scheme}$ in which only $\emph{k}$ honest servers or more are engaged to reconstruct a secret key. Our scheme is based on bilinear pairings which could be built from Weil pairing or Tate pairing. | eng |
dc.language | eng | - |
dc.publisher | 한국정보통신대학교 | - |
dc.subject | Threshold password-authenticated key retrieval protocol | - |
dc.subject | Bilinear pairings | - |
dc.title | Threshold password-authenticated key retrieval protocol using bilinear pairings | - |
dc.title.alternative | 겹선형 쌍을 이용한 Threshold 패스워드-인증 키 Retrieval 프로토콜 | - |
dc.type | Thesis(Master) | - |
dc.identifier.CNRN | 392357/225023 | - |
dc.description.department | 한국정보통신대학교 : 공학부, | - |
dc.identifier.uid | 020024071 | - |
dc.contributor.localauthor | Kim, Kwang-Jo | - |
dc.contributor.localauthor | 김광조 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.