Abstract:
Provided are a device for privacy protection document authentication information using various privacy protection electronic signatures and multidimensional codes and a method for authenticating a privacy protection document using the same. The provided device comprises: an electronic signature information generation unit to generate privacy protection electronic signature information about document content; a multidimensional code generation unit to generate a multidimensional code corresponding to the generated privacy protection electronic signature information; and a multidimensional code output unit to output the generated multidimensional code to a document. According to the device of the present invention, a privacy protection electronic signature value generated by a personalized smart device can be output to a physical document in the form of a multidimensional code to authenticate the document.
Abstract:
Provided are an apparatus and a method for anonymity-based authentication and key agreement which are capable of providing transmission message binding properties, which ensure that the messages received via a plurality of rounds by participants who desire key agreement as well as anonymity have been sent by the same counterpart participants. The provided apparatus comprises: a signature verification unit which receives a plurality of messages, each carrying a signature generated based on link information of a sender, and verifies the signature of each of the messages; and a binding checking unit which determines whether the messages have been sent by an identical sender, if it is determined by the signature verification unit that the signature is valid, based on the link information of the signature.
Abstract:
PURPOSE: A lightweight group signature system with short signatures and a method thereof are provided to improve operation efficiency in signature generation, signature verification, and revocation on smart terminals, while providing security characteristics at a similar level with group signature mechanisms which provide controllable linkability. CONSTITUTION: A key issuing unit(110) initially generates a group public key as a trusted subject and generates a master issuing key(mik), a master opening key(mok), and a master linking key(mlk) corresponding thereto. The key issuing unit performs an interactive protocol, when receiving a join request from a new user device(140), and issues a signature key to the user device. A key revocation identifying unit(120) identifies whether revocation is performed using the updated revocation list and the master opening key when the revocation identification request is received from the signature verifying unit(150) and then, returns the identified results to the signature verifying unit. The key revocation identifying unit uses the master opening key to output the verification information for identifying a signer when a valid signature is given. A signer identification proof evaluating unit(160) evaluates the validity of the signer identification proof generated from a signature control unit(100). [Reference numerals] (100) Control unit; (110) Key issuing unit; (120) Key revocation identifying unit; (130) Signature connecting unit; (140) User device; (150) Signature verifying unit; (160) Signer identification proof evaluating unit; (AA) Generating a group public key; (BB) Master issuing key; (CC) Master identifying key; (DD) Master connecting key; (EE) Confirming signature connection information; (FF) Requesting confirmation of signature connection; (GG) Confirming key revocation; (HH) Requesting confirmation of key revocation; (II) Requesting identification of a signer; (JJ) Issuing a signature key; (KK) Generating a signature; (LL) Generating signer identification proof; (MM) Confirming signer identification proof;
Abstract:
PURPOSE: A method for verifying key validity and a sever for performing the same are provided to reduce necessary operation times for verifying key validity in a signature process or a signature verification process by providing various services based on anonymous authentication. CONSTITUTION: An anonymous authentication server(110) revokes an anonymous secret key owned currently(S810). The anonymous authentication server is opened by generating a revocation list(S820). A service providing server(120) generates a LRL(Local Revocation List) by using a revocation list and its own LL secret key(S830). The service providing server calculates a virtual index of a service user through the signature of a service user(S840). The service providing server verifies the validity of a key of the service user based on the presence of the virtual index included in the local revocation list(S850).
Abstract:
PURPOSE: A system and a method for managing client information and a client terminal and an apparatus for managing the client information are provided to manage corresponding information by using an authentication element and an encryption key. CONSTITUTION: A system for managing client information comprises a client terminal group(100), a network(200), a client information management apparatus(300). The client terminal group requests subscription and authentication by using an authentication element and an encryption key. The network connects the client terminal group with the client information management apparatus. The network includes a broadband communication network and a local area network, etc. The client information management apparatus manages client information in an encrypted type.
Abstract:
PURPOSE: A content management method, system, and rights object management apparatus are provided to prohibit illegal usage for content by enabling a user who has rights for releasing rights object to use content through a mobile storage apparatus. CONSTITUTION: A content playback apparatus receives content from a content service providing apparatus(S504). A rights object management apparatus receives binding rights objects from a content service providing apparatus(S506). When the content playback apparatus requests the rights objects of the content to the rights object management apparatus, the right object management apparatus release the binding of the binding rights objects. The released binding rights objects are loaded on the content playback apparatus(S514).
Abstract:
PURPOSE: A content protection device and a method thereof through combination between additional information and encoding key are provided to prevent decoding of additional information by changing an encoded key when changing additional information. CONSTITUTION: An encoding unit(150) generates an encoding key for encoding requested data and generates encoded data. An additional information managing unit(170) manages additional information including right information about the encoded data. A white box password processing unit(160) generates a white box password table for combining the encoded key and the additional information. A combined data generating unit(180) generates combined data for combining additional information through encoding of the white box encoding table.
Abstract:
PURPOSE: Personalized service providing system and method are provided to maintain anonymity and to offer personalized service by adding an approval function for supporting personalized service to an authentication function using signature. CONSTITUTION: A service providing server(30) requests an attribute certificate according to service request, confirming the validity of the attribute certificate, and determines the offer of the service. An anonymous authentication server(11) provides the anonymous information of a user in response to request. An attribute issuance server(20) transmits the request for issuing attribute certificate of a user terminal(40) to an anonymous certificate server.
Abstract:
PURPOSE: An anonymity authentication and qualification verification method is provided to accomplish authentication on the basis of a short group signature scheme offering anonymity. CONSTITUTION: A user terminal(120) selects a random number as a personal key. In case the personal key ownership verification information of the user terminal is effective, a group management server(110) issues a signature key for the user terminal through a master secret key. The group management server issues a qualification certificate for the user terminal through the issued signature key. A service providing server(130) performs authentication and qualification verification for the user terminal.