Cryptographic Algorithms for the Military Secret Data Management

군사분야 비밀자료 관리를 위한 암호 알고리즘

  • 김홍태 (공군사관학교/기초과학과) ;
  • 이문식 (공군사관학교/기초과학과) ;
  • 강순부 (공군사관학교/기초과학과)
  • Received : 2014.10.07
  • Accepted : 2014.10.29
  • Published : 2014.10.30

Abstract

There exists vast amount of information in the military, both at the personal level and at the national security level. Cryptographic algorithms can present a solution to managing this information safely. We suggest searchable encryption algorithms for efficiently managing military data, which should be treated securely in an online environment. Furthermore, we investigate algorithms that are effective for managing military data under various conditions.

군사분야에는 개인의 신상정보 수준에서부터 국가의 존망에 영향을 미치는 수준의 정보까지 다양한 정보들이 존재한다. 암호 알고리즘은 이러한 정보들을 안전하게 관리하는데 해결책을 제시해 줄 수 있다. 우리는 온라인 상에서 비밀스럽게 처리되어야 하는 군사분야 자료를 효과적으로 관리할 수 있는 검색 가능 암호 알고리즘을 제안한다. 추가적으로, 상황에 따라 군사분야 자료 관리에 효과적인 알고리즘을 모색한다.

Keywords

References

  1. D. Song, D. Wagner and A. Perrig, "Practical Techniques for Searching on Encrypted Data", IEEE Symposium on Security and Privacy, 2000.
  2. E.J. Goh, "Secure Indexes", Technical Report 2003/216, IACR ePrint Cryptography Archive, 2003.
  3. Y.C. Chang and M. Mitzenmacher, "Privacy Preserving Keyword Searches on Remote Encrypted Data", Proceedings of the Third International Conference on Applied Cryptography and Network Security, 2005.
  4. R. Curtmola, J. Garay, S. Kamara and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions", Proceedings of the ACMCCS, 2006.
  5. E. Shen, E. Shi and B. Waters, "Predicate Privacy in Encryption Systems", Proceedings of the Sixth Theory of Cryptography Conference, 2009.
  6. M. Yoshino, K. Naganuma and H. Satoh, "Symmetric Searchable Encryption for Database Applications", International Conference on Network-Based Information Systems, 2011.
  7. B. Waters, D. Balfanz, G. Durfee and D. Smetters, "Building an Encrypted and Searchable Auditlog", Proceedings of the Network and Distributed System Security Symposium, 2004.
  8. D. Boneh and B. Waters, "Conjunctive, Subset and Range Queries on Encrypted Data", Proceedings of the Fourth Theory of Cryptography Conference, 2007.
  9. D. Boneh, G. Crescenzo, R. Ostrovsky and G. Persiano, "Public Key Encryption with Keyword Search", Proceedings of the Eurocrypt, 2004.
  10. F. Bao, R.H. Deng, X. Ding and Y. Yang, "Private query on encrypted data in multi-user setting", Proceedings of the ISPEC, 2008.
  11. M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Pailier and H. Shi, "Searchable Encryption Re visited: Consistency Properties, Relation to Anon ymous IBE and Extensions", Proceedings of the Crypto, 2005.
  12. P. Golle, J. Staddon and B. Waters, "Secure Conjunctive Keyword Search over Encrypted Data", Proceedings of the Second International Conference on Applied Cryptography and Network Security, 2004.
  13. R. Ostrovsky and W. Skeith, "Private Searching on Streaming Data", Proceedings of the Crypto, 2005.
  14. Y. H. Hwang and P. J. Lee, "Public Key encryption with Conjunctive Keyword Search and its Extension to a Multi-User System", Proceedings of the Pairing, 2007.