-
公开(公告)号:FR2742618B1
公开(公告)日:2004-08-27
申请号:FR9613973
申请日:1996-11-15
Applicant: KOREA TELECOMMUNICATION
Inventor: AHN KEUM HYUG , LEE YUN HO , PARK ILL HWAN , JANG CHUNG RYONG
Abstract: An identification scheme, a digital signature scheme giving message recovery, and a digital signature scheme with appendix are disclosed. In processing and transmitting information, a transmitting counterpart of a transmission message is confirmed. The unauthorized modification of the message is confirmed and transmitting behavior is detected, thereby providing the reliable information service.
-
公开(公告)号:FR2743236B1
公开(公告)日:2004-09-10
申请号:FR9613974
申请日:1996-11-15
Applicant: KOREA TELECOMMUNICATION
Inventor: AHN KEUM HYUG , LEE YUN HO , PARK ILL HWAN , JANG CHUNG RYONG
Abstract: An identification scheme, a digital signature scheme giving message recovery, and a digital signature scheme with appendix are disclosed. In processing and transmitting information, a transmitting counterpart of a transmission message is confirmed. The unauthorized modification of the message is confirmed and transmitting behavior is detected, thereby providing the reliable information service.
-
公开(公告)号:FR2742618A1
公开(公告)日:1997-06-20
申请号:FR9613973
申请日:1996-11-15
Applicant: KOREA TELECOMMUNICATION
Inventor: AHN KEUM HYUG , LEE YUN HO , PARK ILL HWAN , JANG CHUNG RYONG
Abstract: An identification scheme, a digital signature scheme giving message recovery, and a digital signature scheme with appendix are disclosed. In processing and transmitting information, a transmitting counterpart of a transmission message is confirmed. The unauthorized modification of the message is confirmed and transmitting behavior is detected, thereby providing the reliable information service.
-
公开(公告)号:FR2743236A1
公开(公告)日:1997-07-04
申请号:FR9613974
申请日:1996-11-15
Applicant: KOREA TELECOMMUNICATION
Inventor: AHN KEUM HYUG , LEE YUN HO , PARK ILL HWAN , JANG CHUNG RYONG
Abstract: An identification scheme, a digital signature scheme giving message recovery, and a digital signature scheme with appendix are disclosed. In processing and transmitting information, a transmitting counterpart of a transmission message is confirmed. The unauthorized modification of the message is confirmed and transmitting behavior is detected, thereby providing the reliable information service.
-
公开(公告)号:FR2735308A1
公开(公告)日:1996-12-13
申请号:FR9606154
申请日:1996-05-17
Applicant: KOREA TELECOMMUNICATION
Inventor: AHN KEUM HYUG , LEE YUN HO , PARK ILL HWAN , JANG CHUNG RYONG
Abstract: The method involves the sender (A) selecting a first arbitrary number (r1) and calculating a remainder x from a preset formula to produce an identification number h(x,IDA) which is transmitted to the receiver (B). The sender also selects second and third random numbers (r2,r3) and calculates further remainders (r4,r5) using predetermined formulae. A further calculation is then carried out using the initially generated identification and the new remainders to provide further remainders (y1,y2). The coding produced is passed to the receiver. The receiver can then validate and recover the message received, using further agreed formulae.
-
公开(公告)号:FR2718309A1
公开(公告)日:1995-10-06
申请号:FR9503802
申请日:1995-03-31
Applicant: KOREA TELECOMMUNICATION
Inventor: AHN KEUM HYUG , JANG CHUNG RYONG , PARK ILL HWAN
Abstract: The method involves establishing system parameters p and g where g lies between 1 and q and has a value of 1 when it is raised to the qth power and then divided by p. The coefficient for q can be replaced by p-1. A number n of secret and public keys are used for each user where n is not less than 2. The public keys Vn correspond respectively to the secret keys Sn and numbers between 1 and q are produced based on the equation Vn=(g Sn)mod p.
-
-
-
-
-