영문목차
Title page=0,1,4
Contents=iii,5,2
List of Figures=v,7,1
List of Tables=vi,8,1
Abstract=vii,9,2
I. Introduction=1,11,1
1.1 Background=1,11,1
1.1.1 Terminology=1,11,2
1.1.2 Review of Cryptosysterns=2,12,2
1.1.3 Motivation and Goal=3,13,3
1.2 Contribution=5,15,4
1.3 Organization=8,18,1
ll. Related Work=9,19,1
2.1 Public Key Cryptosystems=9,19,1
2.1.1 Background=9,19,2
2.1.2 RSA Cryptosystems=10,20,3
2.1.3 EIGamal Cryptosystems=12,22,3
2.1.4 Elliptic Curve Cryptosystems=14,24,4
2.2 ID-Based Cryptogsystems=17,27,1
2.2.1 Background=17,27,2
2.2.2 Bilinear Map=19,29,3
2.2.3 Boneh and Franklin's ID-Based Encryption=22,32,2
2.2.4 Gentry's Certificate-Based Encryption=23,33,3
III. A Pseudonym-Based Encryption(PBE) Scheme=26,36,1
3.1 Overview=26,36,2
3.2 Model and Definition=28,38,3
3.3 Security=30,40,4
3.4 Implementation of PBE-I=34,44,3
3.5 Implementation of PBE-lI=36,46,6
3.6 Analysis=41,51,2
3.7 PBE with Decryption Key Updates=43,53,2
3.8 Proofs of Lemmas=44,54,10
IV. A Pseudonym-Based Anonymous Signature(PBAS) Scheme=54,64,1
4.1 Overview=54,64,2
4.2 Model and Definition=56,66,2
4.3 Security=57,67,6
4.4 Implementation of a Basic PBAS Scheme=62,72,1
4.4.1 Implementation of PBAS-I=62,72,3
4.4.2 Security Analysis=64,74,4
4.5 Implementation of a PBAS Scheme with the Adjudicator=67,77,2
4.5.1 Implementation of PBAS-ll=68,78,3
4.5.2 Security Analysis=70,80,4
4.6 Proof of Lemma=73,83,9
4.7 Performance Analysis=82,92,2
V. An Application:A Case Study for Privacy Preserving Location-Based Services(LBS)=84,94,1
5.1 Background=84,94,2
5.2 Overview=85,95,2
5.3 System Model=86,96,4
5.4 Implementation of Anonym-LBS=89,99,4
5.5 Analysis=92,102,2
VI. Conclusion and Future Work=94,104,3
Reference=97,107,8
[summary in korean]=105,115,2
[acknowledgement]=107,117,2
Fig1.1:A Paeudonym-Based Cryptosystem=6,16,1
Fig2.1:Elliptic Curves:Addition=16,26,1
Fig3.1:Pseudonym-Based Encryption=26,36,1
Fig3.2:PBE:System Model=30,40,1
Fig4.1:Pseudonym-Based Anonymous Signature=55,65,1
Fig4.2:PBAS:System Model=57,67,1
Fig5.1:Anonym-LBS:System Illustration=87,97,1
Table2.1:RSA Encryption=11,21,1
Table2.2:ElGamal Signatures=14,24,1
Table2.3:ElGamal Encryption=15,25,1
Table2.4:Elliptic Curves vs. ElGamal=17,27,1
Table4.1:Comparison of Computational Complexity=82,92,1