Abstract:
PURPOSE: A group signature system and method for providing controllable connectivity are provided to systematically control anonymity by providing not only unforgeability, traceability, non-frameability, and controllable anonymity but also additional controllable linkability. CONSTITUTION: User equipment provides a subscription request message and user information to an issuer server(S300). The issuer server verifies the validity of the subscription request message. The issuer server transmits a partial parameter necessary for generating a secret key from the user equipment which is generated by using a master issuing key(S302). The user equipment verifies the validity of the received partial parameter. The user equipment stores the secret key for the user equipment(S304). The issuer server verifies the validity of a received signature. The issuer server approves the effective registration of the user equipment. The issuer server stores partial secret key information(S306).
Abstract:
PURPOSE: An anonymous authentication method using a group authentication profile based on x.509 is provided to obtain anonymous authentication by combining a group signature and an authentication method without privacy invasion. CONSTITUTION: An anonymous authentication certificate issuing unit(210) and an anonymous ID confirmation unit(230) are initialized. A service unit(200) confirms the identity of a user. The service unit issues a group public key certificate and a secret key. The service unit performs an identification process by issuing an anonymous authentication certificate. The service unit is issued with the anonymous authentication and the secret key through a subscription. The service unit performs a group signature by using the secret key and the public key on the anonymous authentication certificate. A service providing unit(220) verifies a group authentication certificate.
Abstract:
PURPOSE: A portable storage device, a method for decoding digital rights management(DRM) contents using the same, and an apparatus and a method for providing the contents using a white-box encryption table are provided to encrypt or decode right objects(RO) without a separate RO encryption key. CONSTITUTION: A contents providing part(110) transmits DRM to an external terminal(170) by receiving a request for the DRM from the external terminal. A table generating part(120) generates a locked white-box encryption table by using the user specific information of the terminal. An RO providing part(130) hides an encryption RO for decoding the DRM in the locked white-box encryption table. The RO providing part provides the encryption RO to the terminal.
Abstract:
PURPOSE: An apparatus and a method for installing software using white-box cryptography are provided to use a mixed key by combining an install authentication key and a white-box encryption key. CONSTITUTION: When a software authentication key is input to a user terminal, a mixed key is generated by combining the software authentication key and a white-box encryption key(S10, S20). The generated mixed key decodes the encrypted part of software(S30). The decoding operation is completed, and a white-box encryption table value is changed(S40). After the decoding operation is completed, the software is normally installed at the user terminal(S50).
Abstract:
PURPOSE: A safe software execution apparatus and method using an encrypted dynamic library are provided to safely execute the application of service providers in a remote user terminal without exposing the internal information of the application program. CONSTITUTION: A disc(120) stores an encrypted dynamic library(210) necessary to the execution of application. A confidence module(130) deciphers the stored encrypted dynamic library of the disc. The confidence module decodes the dynamic library with a corresponding encryption key. A dynamic loader(140) duplicates the decoded dynamic library to a memory(110). The dynamic loader maps the copied library image to an address area which the application can use.