Browse

An Improved Authentication and Key Exchange Scheme
개선된 인증과 키 분배 기법

DC Field Value Language
dc.contributor.advisor김명환-
dc.contributor.author김경국-
dc.date.accessioned2017-07-14T00:40:42Z-
dc.date.available2017-07-14T00:40:42Z-
dc.date.issued2014-02-
dc.identifier.other000000017010-
dc.identifier.urihttps://hdl.handle.net/10371/121276-
dc.description학위논문 (박사)-- 서울대학교 대학원 : 수리과학부, 2014. 2. 김명환.-
dc.description.abstractNowadays, anonymity property of user authentication scheme becomes important. From 2003, Park et al., Juang et al., and other researchers proposed a useful, secure and efficient authenticated-key exchange scheme. However, There schemes did not provide the useful methods against the various efficient attacks. They argued that they provided the identity privacy- mutual authentication-half-forward secrecy. But their suggestions have limited solutions. So we have researched the about 30 papers and suggested an improved authentication and key exchange scheme. Then, we show that the proposed scheme is secure against the various attacks methods (linear attack, inverse, dictionary, MTMD attacks etc).-
dc.description.tableofcontentsChapter 1 Introduction ........................................................ 6
1.1 Motivation ...............................................................................6
1.2 Organization ............................................................................8
Chapter 2 Secure Authenticated Key Exchange .................. 11
2.1 AKE Security ........................................................................11
2.2 Protocol Attack Types ...........................................................17
Chapter 3Secure Authenticated Key Exchange ................... 19
3.1 The Authentication Key Protocol..........................................19
3.2 General Security-Analysis Discussion..................................26
Chapter 4Authenticated Key Exchange Protocol................ 40
4.1 The Improved AKE ...............................................................41
4.2 An Improved Anonymous AKE Scheme ..............................62
Chapter 5Conclusion ...................................................... 75
Bibliography .................................................................... 77
Abstract ........................................................................... 87
-
dc.formatapplication/pdf-
dc.format.extent1706732 bytes-
dc.format.mediumapplication/pdf-
dc.language.isoen-
dc.publisher서울대학교 대학원-
dc.subjectCryptographic-
dc.subjectTraitor tracing-
dc.subjectrevoke scheme-
dc.subjectlinear attack-
dc.subject.ddc510-
dc.titleAn Improved Authentication and Key Exchange Scheme-
dc.title.alternative개선된 인증과 키 분배 기법-
dc.typeThesis-
dc.description.degreeDoctor-
dc.citation.pages87-
dc.contributor.affiliation자연과학대학 수리과학부-
dc.date.awarded2014-02-
Appears in Collections:
College of Natural Sciences (자연과학대학)Dept. of Mathematical Sciences (수리과학부)Theses (Ph.D. / Sc.D._수리과학부)
Files in This Item:
  • mendeley

Items in S-Space are protected by copyright, with all rights reserved, unless otherwise indicated.

Browse