• Title/Summary/Keyword: Signcryption

Search Result 56, Processing Time 0.022 seconds

Practical Secure E-mail Protocols Providing Perfect Forward Secrecy (완전한 전방향 안전성을 제공하는 실용적인 전자우편 프로토콜)

  • Lee, Chang-Yong;Kim, Dae-Young;Shim, Dong-Ho;Kim, Sang-Jin;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.27-38
    • /
    • 2007
  • One of the most important security issues of e-mail service is user privacy. Currently, various security protocols, like PGP(pretty Good Privacy), S/MIME(Secure/Multipurpose Internet Mail Extension), have been proposed. These protocols, however, do not provide forward secrecy. Recently, some security protocols that provide forward secrecy were proposed. But all of them require changes to the current e-mail infrastructure. Moreover, contrary to authors' intention, some of them do not actually provide perfect forward secrecy. In this paper, we propose a new practical e-mail security protocol. The proposed protocol provides perfect forward secrecy and uses a practical e-mail model that dose not require any changes to existing e-mail servers. It encrypts and authenticates messages efficiently using elliptic curve based signcryption scheme. In addition, we provide a way to send secure group e-mails.

An Efficient ECDSA Verifiable POP protocol for WAP PKI (ECDSA 검증이 가능한 효율적인 WAP PKI용 POP 프로토콜)

  • Kim Sung-Duk;Kim Seung-Joo;Won Dong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.873-876
    • /
    • 2006
  • POP는 공개키 인증서의 발급과정에서 인증기관(CA)이 신청자가 제출한 공개키에 대응하는 비밀키를 가지고 있는가와 선택한 암호 알고리즘 및 용도에 적합한 연산을 수행할 능력이 있는 가를 확인하는 절차를 의미한다. WAP PKI에서는 POP 확인을 위해 암호화용 인증서는 WTLS 프로토콜을 수행하고, 전자서명용은 signText()함수를 이용하여 전자서명을 생성하도록 정의하고 있다. 이런 방식은 WTLS 프로토콜의 수행과 전자서명의 생성과정에서 많은 연산과 통신 부담이 발생한다. 본 논문에서는 ECDSA에 기반한 Signcryption 방식을 이용하여 효율적으로 POP를 검증하는 방식을 제안한다.

  • PDF

Secure Key Exchange Using Human-Memorable Password (인간이 기억할 수 있는 패스워드를 이용한 안전한 키교환)

  • 김성학;이정배;서광석;임종인
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.71-74
    • /
    • 2001
  • 패스워드는 가장 광범위한 인증의 수단으로 사용되어지고 있다. 안전성 측면에서는 패스워드의 길이가 길수록 안전하고 Dictionary Attack 등에 강할 것이다. 그러나, 긴 패스워드를 기억하고 있는 것은 어려운 일이다. 또한, 하나 이상의 패스워드가 필요한 경우 현실적으로 긴 패스워드를 모두 기억하고 있는 것은 현실적으로 불가능, 혹은 어려운 일이다. 또한, 인터넷 보안을 위한 비밀성을 보장하기 위해서 블록암호알고리즘을 사용하고 있다. 공개키보다 빠른 연산속도를 가지고 있고, 키 분배의 문제를 해결한다면 안전한 인터넷을 이용할 수 있을 것이다. 따라서, 본 논문에서는 짧은 패스워드를 이용하여 키 분배를 이루는 프로토콜을 제안한다. 또한 공격에 강한 알고리즘을 위해서 본 논문에서는 Signcryption 알고리즘을 이용하여 짧은 패스워드를 가지고 키분배를 하고, Dictionary Attack에 강한 알고리즘을 설계한다.

  • PDF

Private Blockchain-Based Secure Access Control for Smart Home Systems

  • Xue, Jingting;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6057-6078
    • /
    • 2018
  • Smart home systems provide a safe, comfortable, and convenient living environment for users, whereby users enjoy featured home services supported by the data collected and generated by smart devices in smart home systems. However, existing smart devices lack sufficient protection in terms of data security and privacy, and challenging security and privacy issues inevitably emerge when using these data. This article aims to address these challenging issues by proposing a private blockchain-based access control (PBAC) scheme. PBAC involves employing a private blockchain to provide an unforgeable and auditable foundation for smart home systems, that can thwart illegal data access, and ensure the accuracy, integrity, and timeliness of access records. A detailed security analysis shows that PBAC could preserve data security against various attacks. In addition, we conduct a comprehensive performance evaluation to demonstrate that PBAC is feasible and efficient.

A Relay-assisted Secure Handover Mechanism for High-speed Trains

  • Zhao, Yue;Tian, Bo;Chen, Zhouguo;Yang, Jin;Li, Saifei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.582-596
    • /
    • 2019
  • Considering that the existing Long Term Evolution is not suitable for the fast and frequent handovers of high-speed trains, this paper proposes a relay-assisted handover mechanism to solve the problems of long handover authentication time and vulnerable to security attacks. It can achieve mutual authentication for train-ground wireless communication, and data transmission is consistent with one-time pad at the same time. The security analysis, efficiency analysis and simulation results show that the proposed mechanism not only realizes the forward security and resists many common attacks, but also effectively reduces the computational overhead of train antenna during the secure handover process. When the running speed of a train is lower than 500km/h, the handover delay is generally lower than 50ms and the handover outage probability is less than 1.8%. When the running speed of a train is 350km/h, the throughput is higher than 16.4mbps in the process of handover. Therefore, the secure handover mechanism can improve the handover performance of high-speed trains.

A Study on Data Sharing Scheme using ECP-ABSC that Provides Data User Traceability in the Cloud

  • Hwang, Yong-Woon;Kim, Taehoon;Seo, Daehee;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4042-4061
    • /
    • 2022
  • Recently, various security threats such as data leakage and data forgery have been possible in the communication and storage of data shared in the cloud environment. This paper conducted a study on the CP-ABSC scheme to solve these security threats. In the existing CP-ABSC scheme, if the data is obtained by the unsigncryption of the data user incorrectly, the identity of the data owner who uploaded the ciphertext cannot be known. Also, when verifying the leaked secret key, the identity information of the data user who leaked the secret key cannot be known. In terms of efficiency, the number of attributes can affect the ciphertext. In addition, a large amount of computation is required for the user to unsigncrypt the ciphertext. In this paper, we propose ECP-ABSC that provides data user traceability, and use it in a cloud environment to provide an efficient and secure data sharing scheme. The proposed ECP-ABSC scheme can trace and verify the identity of the data owner who uploaded the ciphertext incorrectly and the data user who leaked the secret key for the first time. In addition, the ciphertext of a constant size is output and the efficiency of the user's unsigncryption computation were improved.