摘要:
A security system using an RSA algorithm that includes a key input section for receiving a secret key and a public key used in one of encryption and decryption of a message, a random coefficient generating section for generating a random coefficient r having a bit of a predetermined size, a first calculation section for dividing the secret key into a first secret key and a second secret key by using the value of r, and performing an exponentiation of RSA algorithm by using the respective secret keys and the public key, and a second calculation section for performing one of the encryption and the decryption by combining results of exponentiation calculated respectively by using the first and the second secret keys.
摘要:
An improved security device for digital contents and a method for using the security device are provided. The improved security device and method include a transmission and reception unit for transmitting and receiving data necessary for authentication with a mobile device, and for transmitting and receiving contents of the mobile device and a controller for performing authentication with the mobile device, and for decrypting re-encrypted contents from the mobile device when the authentication is successful. The improved method and device provide enhance mobility for users.
摘要:
A security system using an RSA algorithm that includes a key input section for receiving a secret key and a public key used in one of encryption and decryption of a message, a random coefficient generating section for generating a random coefficient r having a bit of a predetermined size, a first calculation section for dividing the secret key into a first secret key and a second secret key by using the value of r, and performing an exponentiation of RSA algorithm by using the respective secret keys and the public key, and a second calculation section for performing one of the encryption and the decryption by combining results of exponentiation calculated respectively by using the first and the second secret keys.
摘要:
A device authentication method using broadcast encryption is provided, in which, a hash value corresponding to a group key version is generated, the generated hash value is encrypted with a group key, group key information comprising the encrypted hash value is generated, and the generated group key information including a signature of an authentication server for the group key information is transmitted. Accordingly, mutual authentication is accomplished by using the group key version including in the group key information.
摘要:
A user key allocation method for broadcast encryption is provided. The user key allocation method includes generating a plurality of subsets by dividing one group including a plurality of nodes to sub-groups and allocating key sets with respect to the subsets, respectively. The nodes included in the subset may be odd nodes and even nodes of the nodes of the group. The nodes are arranged so that privileged nodes are consecutive or there is only one privileged node. Accordingly, it is possible to reduce the data size transmitted from the server to the nodes by constituting one or more subsets from the nodes consecutively arranged and providing key sets with respect to the subsets.
摘要:
A user key allocation method for broadcast encryption is provided. The user key allocation method includes generating a plurality of subsets by dividing one group including a plurality of nodes to sub-groups and allocating key sets with respect to the subsets, respectively. The nodes included in the subset may be odd nodes and even nodes of the nodes of the group. The nodes are arranged so that privileged nodes are consecutive or there is only one privileged node. Accordingly, it is possible to reduce the data size transmitted from the server to the nodes by constituting one or more subsets from the nodes consecutively arranged and providing key sets with respect to the subsets.
摘要:
A method of notifying an operation state change of a device, the method involving forming a network of devices used by a user and that perform network communication; when an operation state change of a first device in the network occurs, searching for at least one device currently being used by the user in the network of devices; and transmitting information regarding the operation state change of the first device to the at least one device, wherein the information regarding the operation state change of the first device is displayed on a display unit of the at least one device.
摘要:
An ownership sharing method and apparatus using a secret key in a home network remote controller are provided. A user who owns a home device generates an ownership authentication key using the secret key shared with the home device through the user's terminal device, and transmits the ownership authentication key to a terminal device of a particular user who wishes to share the ownership. The particular user can use the home device using the shared ownership authentication key, allowing for ownership of a device in home network environments based on a secret key that can be easily shared, obviating complicated calculation procedures that are no needed to share the ownership between an owner of a device and his family or customers, and achieving high security that is guaranteed based on the secret key.
摘要:
A method is provided for generating a group key, including sharing a plurality of secret keys with a plurality of nodes adjacent to a first node of the plurality of nodes, obtaining a plurality of function values using the plurality of secret keys and a result value using the plurality of function values, broadcasting the result value, receiving a plurality of result values generated using a method by which the result value has been obtained, from nodes of the plurality of nodes except for a corresponding node, and obtaining a group key using a plurality of function values extracted from the plurality of function values and the plurality of result values.
摘要:
An ownership sharing method and apparatus using a secret key in a home network remote controller are provided. A user who owns a home device generates an ownership authentication key using the secret key shared with the home device through the user's terminal device, and transmits the ownership authentication key to a terminal device of a particular user who wishes to share the ownership. The particular user can use the home device using the shared ownership authentication key, allowing for ownership of a device in home network environments based on a secret key that can be easily shared, obviating complicated calculation procedures that are no needed to share the ownership between an owner of a device and his family or customers, and achieving high security that is guaranteed based on the secret key.