The Integrated Identification Number Checking and Key Management Protocol with Certificates


KIPS Transactions on Computer and Communication Systems, Vol. 12, No. 3, pp. 317-322, Jun. 2005
10.3745/KIPSTC.2005.12.3.317,   PDF Download:

Abstract

The existing certificate based authentication or identification just verifies whether the owner of private key corresponding to public key of certificate is the DN user set in the user field in the certificate or not, then we cannot find out who is the actual private key owner in a real world. To make up for this weak points, the method to insert the identification number like the resident registration number into the certificate extension field is applied as a technical standard to current domestic PKI system. In this paper, we propose the ECC based integrated identification, identification number checking and key management protocol providing user validation during the login.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
S. D. Kim, J. D. Jung and D. H. Won, "The Integrated Identification Number Checking and Key Management Protocol with Certificates," KIPS Journal C (2001 ~ 2012) , vol. 12, no. 3, pp. 317-322, 2005. DOI: 10.3745/KIPSTC.2005.12.3.317.

[ACM Style]
Sung Duk Kim, Jae Dong Jung, and Dong Ho Won. 2005. The Integrated Identification Number Checking and Key Management Protocol with Certificates. KIPS Journal C (2001 ~ 2012) , 12, 3, (2005), 317-322. DOI: 10.3745/KIPSTC.2005.12.3.317.