-
公开(公告)号:FR2742618B1
公开(公告)日:2004-08-27
申请号:FR9613973
申请日:1996-11-15
Applicant: KOREA TELECOMMUNICATION
Inventor: AHN KEUM HYUG , LEE YUN HO , PARK ILL HWAN , JANG CHUNG RYONG
Abstract: An identification scheme, a digital signature scheme giving message recovery, and a digital signature scheme with appendix are disclosed. In processing and transmitting information, a transmitting counterpart of a transmission message is confirmed. The unauthorized modification of the message is confirmed and transmitting behavior is detected, thereby providing the reliable information service.
-
公开(公告)号:FR2743236B1
公开(公告)日:2004-09-10
申请号:FR9613974
申请日:1996-11-15
Applicant: KOREA TELECOMMUNICATION
Inventor: AHN KEUM HYUG , LEE YUN HO , PARK ILL HWAN , JANG CHUNG RYONG
Abstract: An identification scheme, a digital signature scheme giving message recovery, and a digital signature scheme with appendix are disclosed. In processing and transmitting information, a transmitting counterpart of a transmission message is confirmed. The unauthorized modification of the message is confirmed and transmitting behavior is detected, thereby providing the reliable information service.
-
公开(公告)号:FR2742618A1
公开(公告)日:1997-06-20
申请号:FR9613973
申请日:1996-11-15
Applicant: KOREA TELECOMMUNICATION
Inventor: AHN KEUM HYUG , LEE YUN HO , PARK ILL HWAN , JANG CHUNG RYONG
Abstract: An identification scheme, a digital signature scheme giving message recovery, and a digital signature scheme with appendix are disclosed. In processing and transmitting information, a transmitting counterpart of a transmission message is confirmed. The unauthorized modification of the message is confirmed and transmitting behavior is detected, thereby providing the reliable information service.
-
公开(公告)号:FR2738437A1
公开(公告)日:1997-03-07
申请号:FR9613643
申请日:1996-11-08
Applicant: KOREA TELECOMMUNICATION
Inventor: PARK ILL HWAN , JANG CHUNG RYONG
Abstract: An identification scheme which allows a prover to identify his own identity to a verifier more certainly and prevents already used authentication information from being re-used, a key exchange which uses a common secret key between two users in order not to allow an unauthorized to find it out, a digital signature scheme giving message recovery and digital signature scheme with appendix for producing a digital signature of a message recovery type or appendix type according to the size of a message to be signed, a multi-digital signature scheme for allowing multiple signers to generate digital signatures with respect to the same message and producing them in a message recovery type or appendix type according to the length of the message to be signed, and a blind digital signature scheme for producing a digital signature when a message to be signed should not be opened to the public as well as the signer and therefore a signer does not know the contents thereof.
-
公开(公告)号:FR2735307A1
公开(公告)日:1996-12-13
申请号:FR9606473
申请日:1996-05-24
Applicant: KOREA TELECOMMUNICATION
Inventor: PARK ILL HWAN , JANG CHUNG RYONG
Abstract: The method involves the authenticating partner choosing a number r and using three coefficients g, q and p to obtain a mathematical equation x. The equation number, together with the identity, I, is sent as authentication. A verifier signal (y) is generated by forming a mathematical function and using the value q. A secret key is then added to form the output verifier. The receiver investigates the values of the authentication and verification numbers. The secret key is then recovered and compared with the sender identity, to authenticate the information received.
-
公开(公告)号:FR2743236A1
公开(公告)日:1997-07-04
申请号:FR9613974
申请日:1996-11-15
Applicant: KOREA TELECOMMUNICATION
Inventor: AHN KEUM HYUG , LEE YUN HO , PARK ILL HWAN , JANG CHUNG RYONG
Abstract: An identification scheme, a digital signature scheme giving message recovery, and a digital signature scheme with appendix are disclosed. In processing and transmitting information, a transmitting counterpart of a transmission message is confirmed. The unauthorized modification of the message is confirmed and transmitting behavior is detected, thereby providing the reliable information service.
-
公开(公告)号:FR2738438A1
公开(公告)日:1997-03-07
申请号:FR9613644
申请日:1996-11-08
Applicant: KOREA TELECOMMUNICATION
Inventor: PARK ILL HWAN , JANG CHUNG RYONG
Abstract: An identification scheme which allows a prover to identify his own identity to a verifier more certainly and prevents already used authentication information from being re-used, a key exchange which uses a common secret key between two users in order not to allow an unauthorized to find it out, a digital signature scheme giving message recovery and digital signature scheme with appendix for producing a digital signature of a message recovery type or appendix type according to the size of a message to be signed, a multi-digital signature scheme for allowing multiple signers to generate digital signatures with respect to the same message and producing them in a message recovery type or appendix type according to the length of the message to be signed, and a blind digital signature scheme for producing a digital signature when a message to be signed should not be opened to the public as well as the signer and therefore a signer does not know the contents thereof.
-
公开(公告)号:FR2735308A1
公开(公告)日:1996-12-13
申请号:FR9606154
申请日:1996-05-17
Applicant: KOREA TELECOMMUNICATION
Inventor: AHN KEUM HYUG , LEE YUN HO , PARK ILL HWAN , JANG CHUNG RYONG
Abstract: The method involves the sender (A) selecting a first arbitrary number (r1) and calculating a remainder x from a preset formula to produce an identification number h(x,IDA) which is transmitted to the receiver (B). The sender also selects second and third random numbers (r2,r3) and calculates further remainders (r4,r5) using predetermined formulae. A further calculation is then carried out using the initially generated identification and the new remainders to provide further remainders (y1,y2). The coding produced is passed to the receiver. The receiver can then validate and recover the message received, using further agreed formulae.
-
公开(公告)号:FR2718309A1
公开(公告)日:1995-10-06
申请号:FR9503802
申请日:1995-03-31
Applicant: KOREA TELECOMMUNICATION
Inventor: AHN KEUM HYUG , JANG CHUNG RYONG , PARK ILL HWAN
Abstract: The method involves establishing system parameters p and g where g lies between 1 and q and has a value of 1 when it is raised to the qth power and then divided by p. The coefficient for q can be replaced by p-1. A number n of secret and public keys are used for each user where n is not less than 2. The public keys Vn correspond respectively to the secret keys Sn and numbers between 1 and q are produced based on the equation Vn=(g Sn)mod p.
-
-
-
-
-
-
-
-