This application claims benefit under 35 U.S.C. §119 from Korean Patent Application No. 2005-35214 filed on Apr. 27, 2005, the entire content of which is incorporated herein by reference.
1. Field of the Invention
The present invention relates to a security method using an electronic signature, and more particularly, to a security method using an electronic signature, which effectively authenticates a signature through a mediator and guarantees a forward security.
2. Description of the Related Art
A security system is typically associated with an authentication system and a data encryption system. Although there exists other systems, the encryption system is generally classified into a secret key (referred to as ‘symmetric key’) system and a public key (referred to as ‘asymmetric key’) system. The secret key system, namely, the symmetric key system, uses the same key for encryption and decryption. In the secret key system, it is necessary to keep the secrecy of a key in such a manner that only rightful persons know and possess a common secret key.
In general, a public key based encryption scheme is widely used to perform an electronic signature. Such an encryption scheme uses a pair of keys where one is public so that anyone may use it, whereas a private person keeps the other secretly. The former is referred to as ‘public key’, whereas the latter is referred to as ‘secret key’.
The secret key is a key that a private person should sign to have it through a storage medium having a secret security function. In contrast to this, the public key is a key used when a verifier verifies a signature.
Here, there is a problem in judging whether or not a verified public key is valid. To solve the problem, a certificate authority (CA) issues a public key certificate verifying the validity.
The public key certificate contains a public key, a valid period and a signature of the CA. The CA authenticates a validity of the public key during a descried valid period.
However, there may occur a case that even a certificate normally issued by the CA is revoked. In order to check the occurrence of the above-mentioned case, a signature verifier should always confirm whether or not a corresponding certificate has been revoked. There are problems in that the signature verifier should verify such a certificate revocation list (CRL) every time. For example, with regard to mobile communication, because the signature verifier uses a bandwidth to transmit data, transmission of the CRL requires great expense.
During a valid period, although a public key certificate is revoked at any time, since the time when the public key certificate is registered on the CRL coincides with an update time of a system, a deviation of a revocation time occurs.
A mediated Rivest, Shamir, and Adelman (mRSA) digital signature scheme was suggested to solve such an economical problem and a confirmation problem of a certificate revocation.
In the mRSA scheme, the authority party 10 generates a secret key d and a public key e. The secret key d is divided into a user key du to be used in the user terminal device 20 and a computation key ds to be used in the semi-trusted party 30. That is, the d, du, and ds have a relation satisfying the condition of d=du+ds. Only when two secret key pieces are present, a secret key to be used in an original signature is effected. When a user terminal device 20 wants to sign a signature, the user terminal 20 calculates and transmits a message hash value h to the SEM 30. Assuming that H is an appropriate hash function, h=H (m).
Next, the SEM 30 confirms whether or not a certificate used in the user terminal device 20 has been revoked. Only when the certificate has not been revoked, the SEM 30 performs a calculation operation. The SEM 30 signs m at a transmitted hash value h using ds to calculate and transmit a signature value PSx≡hd, mod n of the SEM 30 side to the user terminal device 20.
The user terminal device 20 generates a signature and confirms a validity of the generated signature based on a signature value PSu≡hd mod n of a user side calculated using du and PSs from the SEM 30.
That is, the user terminal device 20 calculates h′≡PSe≡(PSs*PSu)e mod n. When h′ is identical with h, the user terminal device 20 regards and uses PS (=PSs*PSu mod n) as a valid signature.
On the other hand, besides the aforementioned mRSA scheme, a forward security becomes an issue in a general electronic signature generating and verifying scheme. For example, in a case where a certificate was revoked in 2000, when a user wants to forge a document written in 1999, it is recognized as a valid public key certificate prior to a point of the revocation. Accordingly, a verifier cannot judge the validity of the document. A forward security can prevent such a problem.
In the aforementioned mRSA scheme, there are no ways to prevent all used secret keys ds and du from being exposed. So as to solve such a problem, a weak forward secure mRSA scheme has been suggested. Here, the ‘weak’ means that a forward security problem may be solved when only one of ds and du composed of a secret key is exposed.
However, the SEM is not perfectly reliable, the ds is a key having a possibility to be exposed. In a case that an attacker of a system acquires ds during a period i, when the person conspires with a malicious user, they may easily acquire a necessary signature.
As a result, once ds is exposed, since a necessary signature is able to be acquired through a conspiracy of the attacker and the user, the system is exposed in a defenseless state that causes the forward security not to be effective.
Accordingly, it is an aspect of the present invention to provide a security method using an electronic signature, which improves a performance of an electronic signature authentication by generating and verifying an electronic signature using a mediator, and acquires a forward security in an electronic signature generation and verification by adding a forward secure signature of an SEM to a partial signature value generated based on a secret key piece of the SEM.
The above aspect of the present invention is substantially realized by providing a security method using an electronic signature, including the steps of: (a) generating a public key and an optional secret key composed of two kinds of pieces by a certificate authority in response to a request from a user terminal device; (b) issuing the secret key pieces to the user terminal device and a semi-trusted party not to be overlapped with each other; and (c) transmitting a first signature piece generated from the issued pieces of the private key to the user terminal device from the semi-trusted party when a certificate of the user terminal device is still valid.
Preferably, but not necessarily, the method may further include: (d) calculating the first signature piece and a second signature piece by the user terminal device to generate a signature value, the second signature is generated by a combination of an issued secret key piece and a predetermined value; and (e) confirming whether the signature value is valid.
In the step (a), the public key (e, wi) may be an optimal number satisfying a condition given by 1<e, wi<Φ(n) under a condition of {e, wi|1≦i≦T}⊂Z*Φ(n), by calculating an equation n=p*q (where, it is assumed that i is an optimal even number, p and q each is a predetermined prime number having
bit, i represents an optional period when a time axis is divided by a predetermined time unit, and T represents a maximum value of an interval time to update an electronic signature generating and verifying system.
Also, in the step (a), the secret key generated by the certificate authority may be (d, vi), which is given by equations d≡e−1 mod Φ(n) and vi≡wi−1 mod Φ(n). Here, the method may further include the step of calculating a user's secret key piece value du and a mediator's secret key piece value ds, which is given by an equation ds=d−du mod Φ(n), where, it is satisfied that d=du+ds, and du is an optimal number satisfying a condition of duεZn−{0}.
In the step (b), the certificate authority calculates and issues a user's secret key value d0,u during a first period, which is given by d0,u≡du×e−T mod Φ(n) and a mediator's secret key value d0,s during the first period, which is given by d0,s≡ds×e−T mod Φ(n), to the user terminal device and the semi-trusted party.
Most preferably, the user terminal device may calculate a user's secret key value di, u during i period using the issued d0,u by an equation di,u=d0,u×ei, and the semi-trusted party calculates a mediator's secret key value di, s during i period using the issued d0,s by an equation di,s=d0,s×ei. The first signature piece value may be PTi,s (m) and PSi,s (m), which is given by PTi,s(m)=hv
A signature value PSi may be calculated by an equation PSi(m)=PSi,u(m)×PSi,s(m)modn using the first signature piece value (PTi,s(m), PSi,s(m)) and the second signature piece value PSi,u(m). The step (e) may confirm whether the signature value is valid when h given by an equation h=H(m, i) by the semi-trusted party, where, H is a hash function, coincides with h′ given by an equation h′=PSi(m)(e
The above aspects of the present invention will be more apparent by describing certain exemplary embodiments of the present invention with reference to the accompanying drawings, in which:
An exemplary embodiment of the present invention will be described with reference to the accompanying drawings in detail. In other instances, well known features have not been described in detail so as not to obscure the present invention.
Referring to
When a user requests the certificate authority 100 to register an electronic signature using the user terminal device 200, the authority party 100 generates a public key composed of e and wi, and a secret key composed of d and vi. The d is a secret key piece, which is divided into a user key du computed by the user terminal device 200 and a computation key ds computed by the semi-trusted party 100. That is, the condition of d=du+ds is satisfied.
Since the semi-trusted party 300 has information related to a secret key piece ds of the user terminal device 200, it is referred to as a “semi-trusted server”.
The certificate authority 100 issues the computed do,u and do,s to the user terminal device 200 and the semi-trusted party 300, respectively. The user terminal device 200 computes a user's secret key du,i to be used in each period i using the issued do,u. The semi-trusted party 300 computes a mediator's secret key ds,i to be used in each period i using the issued do,x.
It is assumed that i is a sufficiently large even number. The certificate authority 100 generates encryption keys by various computations. The certificate authority 100 selectively generates two prime numbers p and q each having a size of
bit. The certificate authority 100 calculates an equation n=p*q.
The certificate authority 100 selects different numbers e and wi that satisfy a condition given by 1<e, wi<Φ(n) under a condition of {e, wi|1≦i≦T}⊂ZΦ(n)*, where i represents an optional period when a time axis is divided by a predetermined time unit, and T represents a maximum value of an interval time to update an electronic signature generating and verifying system.
The certificate authority 100 calculates an equation 1 and an equation 2 to obtain d and vi, respectively. A=B mod C means that a residue is A when B is divided by C. Φ(n) is an Euler's Phi function defined by a positive integer n, which is a function indicating the number of prime factors of n among positive integer number from 1 to n. For example, among 1, 2, 3, 4, 5, 6, prime factors of 6 are 2 and 3. In this case, Φ(6)=2.
d≡e−1 mod Φ(n) (1)
vi≡wi−1 mod Φ(n) (2)
In a case that a time is divided in predetermined units, when a time before one unit of i period is i−1, there no rules between vi and vi−1. Accordingly, although one is found, a possibility to find the other is low.
Further, the certificate authority 100 selects an optimal number duεZn−{0}, and calculates an equation 3.
ds=d−du mod Φ(n) (3)
where d is a secret key piece, which is divided into a user key du computed by the user terminal device 200 and a computation key ds computed by the semi-trusted party 300. That is, the condition of d=du+ds is satisfied.
It is assumed that a user's secret key and a mediator's secret key of a real i period are di,u and di,s, respectively. The certificate authority 100 should calculate d0,u and d0,s, ahead of computations of the di,u and di,s. The certificate authority 100 calculates d0,u and d0,s by equations 4, respectively.
d0,u≡du×e−T mod Φ(n)
d0,s≡ds×e−T mod Φ(n) (4)
The certificate authority 100 transmits the aforementioned calculated d0,u to the user terminal device 200, and transmits d0,s and vi satisfying d0,s, vi|0≦i≦T to the semi-trusted party 300.
When i is set as a period in a case that a time axis is divided by a predetermined time, the user terminal device 200 and the semi-trusted party 300 calculate a user's secret key value di,u and a mediator's secret key value di,s during an i period by using equations (5), respectively.
di,u=d0,u×ei
di,s=d0,s×ei (5)
It is assumed that i is set as a period in a case that a time axis is divided by a predetermined time. When a condition of 0≦i≦T is satisfied, and m represents that a user will sign, the user terminal device 200 calculates h=H(m, i), and transmits the calculated h to the semi-trusted party 300.
On the other hand, the semi-trusted party 300 first confirms whether or not a user's certificate was already revoked. When the user's certificate was already revoked, an issue of a token requested from the user stops. Prior to issuing the token, the semi-trusted party 300 confirms whether or not the user's certificate was revoked using a CRL, thereby saving a user's trouble.
The semi-trusted party 300 calculates a mediator's secret key value di,s during an i period, and calculates a signature key for the semi-trusted party 300 during the i period as indicated by an equation 6.
ki,s=di,s*vi (6)
Then, the semi-trusted party 300 calculates a token by using equations 7.
PSi,s(m)=hk
PTi,s(m)=hv
The semi-trusted party 300 transmits the calculated (PTi,s(m), PSi,s(m),) to the user terminal device 200. The calculated (PTi,s(m), PSi,s(m)) are referred to as a ‘signed token’, namely, a ‘first signature piece value’.
Further, the user terminal device 200 calculates a user's secret key value di,u.
On the other hand, the user terminal device 200 calculates a second signature piece value PSi,u(m) using an equation 8, and calculates an equation 9 to complete a signature value.
PSi,u(m)≡PTi,s(m)d
PSi(m)=PSi,u(m)×PSi,s(m)mod n (9)
To authenticate a generated signature, the user terminal device 200 calculates an equation 10 to obtain h′.
h′=PSi(m)(e
Next, the user terminal device 200 compares h′ with h. When the h and h′ are different from each other, the user terminal device 200 stops an issue of a document. On the contrary, when h and h′ are identical with each other, the user terminal device 200 authorizes validating that PSi (m) satisfies equations 11 as a signature related to a message m during the i period.
It is clear that equations 13 are satisfied when a valid signature is generated in accordance with an equation 12.
PSi(m)(e
It is assumed that a user's secret key value di,u during the i period, a mediator's secret key value di,s during the i period, and a time key value vi for the semi-trusted party 300 during the i period are exposed to an attacker.
The attacker needs three keys di−1, u, di−1, s, and vi−1 in order to compare a signature. However, as noted previously, since each of vi and vi−1 is an optimal number, they are not associated with each other. It is extremely difficult for the attacker to analogize the vi−1.
Even if the attacker calculates hd
ds=di,s×eT−i
du=dj,u×eT−j (13)
h=H(m,i−1)d (14)
A user selectively stores wi by using the user terminal device 200. However, a size of wi is relatively smaller than that of a secret key. Accordingly, an operation of the user terminal device 200 will be easy.
Referring to
In response to the request for the key generation, the certificate authority 100 generates a public key composed of e and wi, and an optimal secret key composed of d and vi (step S420). Here, d is divided into secret key pieces du and ds.
Furthermore, the certificate authority 100 issues secret key pieces calculated based on the du and ds to the user terminal device 200 and the semi-trusted party 300, respectively (step S430).
On the other hand, the semi-trusted party 300 confirms whether or not a user's certificate has been revoked (step S440). When the user's certificate has been revoked, the semi-trusted party 300 stops the issuance of a key that a user requested.
When the user's certificate has not been revoked, the semi-trusted party 300 calculates a secret key piece to be used during a corresponding period using a secret key piece issued by the certificate authority 300, and then calculates and transmits a first signature piece value (step S450). Here, the first signature piece value includes signed tokens (PTi,s(m), PSi,s(m)) obtained by calculating the equation 7.
The user terminal device 200 calculates the equation 8 to obtain a second signature piece, and calculates the equation 9 to complete a signature value (step S460).
In order to authenticate a generated signature value, the user terminal device 200 calculates the equation 10 to obtain h′. Moreover, the user terminal device 200 confirms a validity of a signature according to whether or not h′ coincides with a calculated h (step S470). When h′ is identical to the calculated h, a verifier verifying the signature using the user terminal device 200, accepts PSi(m) as a valid signature value.
Through the aforementioned procedure, in a state that an attacker and a user conspire with each other, or many users conspire with each other, by including an optionally selected secret key piece in a secret key, a security subject with a forward security may be effectuated.
The foregoing embodiments are merely exemplary and are not to be construed as limiting the present invention. The present teaching can be readily applied to other types of apparatuses. Also, the description of the exemplary embodiments of the present invention is intended to be illustrative, and not to limit the scope of the claims, and many alternatives, modifications, and variations will be apparent to those skilled in the art.
As mentioned above, the security method using an electronic signature according to exemplary embodiments of the present invention efficiently manages and authenticates using a mediator. In addition, the security method of the present invention guarantees a forward security to prevent documents from being forged by including a selected key in a secret key piece constituting a secret key as an optional number, with the result that information may be effectively protected.
Number | Date | Country | Kind |
---|---|---|---|
10-2005-0035214 | Apr 2005 | KR | national |
Number | Name | Date | Kind |
---|---|---|---|
7529928 | Micali | May 2009 | B2 |
20030081785 | Boneh et al. | May 2003 | A1 |
20040010700 | Mont | Jan 2004 | A1 |
20040019779 | Harrison et al. | Jan 2004 | A1 |
20040073790 | Ateniese et al. | Apr 2004 | A1 |
20040252830 | Chen et al. | Dec 2004 | A1 |
Number | Date | Country | |
---|---|---|---|
20060248339 A1 | Nov 2006 | US |