Abstract:
A method for transmitting data safely in an RFID(Radio Frequency IDentification) system is provided to prevent forgery, information leakage, and tracking, use a PIN(Personal ID Number) safely, and use an EPCgloblal(Electronic Product Code) class-1 gen(generation)-2 application by using a session procedure of EPCgloblal(Electronic Product Code) class-1 gen-2 without any modification. A tag generates RT32, which is a pseudo random number, when a reader requests a query(203), and the tag calculates M1 by using RT32 and transmits M1 to the reader(206). The reader generates RR32, which is the new pseudo random number, and transmits acknowledgement for M1 and RR32 to the tag when M1 is received from the tag(209). The tag calculates M2, M3, and E by using RR32, and transmits PC, E, and CRC16 to the reader(215). The reader transmits E, M1, and RR32 to a backend server(218), and the backend server finds an EPC and transmits information corresponding to the tag to the reader when the EPC is found(224).
Abstract:
A visibly verifiable key exchange apparatus, a visibly verifiable key exchange system using a reliable authentication agent, and a method and recording medium thereof are provided to secure the anonymity of a user ID by using a picture of the user as the user ID. A visibly verifiable key exchange method includes the steps of: transmitting an encrypted picture of a user to a terminal of the other user(310), and receiving the encrypted picture of the other user from the terminal of the other user(320); and if the user and the other user check the picture of a counterpart(330), applying a session key which is generated by using the pictures of the user and the other user to the communication between the terminal of the user and the terminal of the other user(340). The communication applying step includes the steps of: displaying the picture of the counterpart on the terminal of the user and the terminal of the other user; and if a check button is pushed, deciding that the user and the other user check the picture of the counterpart.
Abstract:
A method and a system for exchanging a key among three-party using a smart card and a recording medium thereof are provided to improve the security by performing an authentication and key exchange between a client and a client without exposing session key information, which is exchanged between the clients, to a server. A method for exchanging a key among three-party using a smart card includes the steps of: selecting a first random number and a second random number as a predetermined random number at a smart card of a source client, transmitting an encryption sentence having the second random number to a server, and transmitting the encryption sentence having the first random number to a target client(310); transmitting the encryption sentence having the second random number to the target client(320); selecting third and fourth random numbers as a predetermined random number in the smart card of the target client, decoding the encryption sentence having the second random number, calculating the second random number, calculating a session key using the second and fourth random numbers(330), and transmitting the encryption sentence having the third and fourth random numbers to the source client(340); and decoding the encryption sentence having the third and fourth random numbers in the smart card of the source client, calculating the session key using the second and fourth random numbers, and sharing the session key(350).
Abstract:
A method for searching information from an encrypted database and a system thereof are provided to perform systematic information management and efficient information search via hierarchical database access rights as well as to prevent information from being illegally used or abused. A method for searching information from an encrypted database comprises the following several steps. If an authenticated user inputs a document and a representative keyword for the document, a client encrypts the inputted document via a document encryption key, encrypts the inputted representative keyword via a search key, generates an index, and transmits the encrypted document and index to a server(210). The client determines whether a user authenticated in an arbitrary client inputs a keyword for a document to be searched(220). If so, the client generates a trapdoor by using the inputted keyword and the search key of the user, and sends a query to a server(225). The server searches for the encrypted document by using the trapdoor and the index and transmits the searched document to the client(230).
Abstract:
본 발명은 투표결과의 반영 여부를 검증 가능한 전자투표 방법 및 시스템에 관한 것으로, 투표관리서버와 개표관리서버로 구성된 전자투표 시스템에서의 전자투표 방법에 있어서, 투표관리서버가 투표자명단을 생성하고, 개표관리서버가 투표관리서버로부터 전송받은 투표자명단에 포함되어 있는 투표자 수에 대응하는 티켓을 생성하는 투표사전단계; 개표관리서버가 투표자 단말기에 티켓을 암호화하여 전송하고, 투표관리서버가 투표자 단말기로부터 수신한 암호화된 티켓을 복호화한 티켓과 투표내용 및 개표검증비밀번호가 개표관리서버의 공개키로 암호화된 투표값을 수신하여 투표함에 저장하는 투표단계; 및 개표관리서버가 투표관리서버로부터 수신된 투표함에 저장된 암호화된 투표값을 개표관리서버의 비밀키로 복호화하여 투표내용을 집계하여 공개하고, 복호화된 투표내용과 개표검증비밀번호를 공개하는 개표단계로 구성된다. 이와같이 투표 결과에 대하여 검증하기 위한 검증 자료를 개표결과 공고시 함께 공개함으로써 개표결과에 대해 신뢰할 수 있는 전자투표 방법 및 시스템을 제공한다.
Abstract:
An ID-based key agreement method and an apparatus thereof are provided to efficiently perform ID-based key agreement between two users(server and client) having different computing power. An ID-based key agreement method includes the steps of: transmitting IDu, X, and Y to a server by a client; receiving the IDu, X, and Y to certify the client, and transmitting z and tv when being certified to the client and generating a session key(sk) by the server; and receiving the z, tv from the server to certify the server and generating a session key identical to the session key of the server by the client when the server is certified.