Browse > Article

Design of the homomorphic encryption system for secure data management in the future battlefield environment  

Cha, HyunJong (광운대학교 방위사업학과)
Kim, JinMook (선문대학교 IT교육학부)
Ryou, HwangBin (광운대학교 컴퓨터과학과)
Publication Information
Abstract
Be expressed in network-centric warfare, mainly battlefield environment of the future. The purpose of the system for the war of the future, is to recognize the enemy before the enemy, and rapid decision-making, to hit accurately. For this reason, it is during the construction of the integrated system of C4ISR+PGM. In such an integrated system, it is necessary to further enhance the security aspects of the information. In particular, strengthening of security leads to a decrease of efficiency. Therefore, security and efficiency should be considered together. In this study, we provide a homomorphic encryption system that can be safely managed information environment on the battlefield of the future. The proposed method uses encryption technology of homomorphic that can be the arithmetic operations on encrypted state. It has changed from the state of the encryption. Therefore, the attacker can not know a decent information.
Keywords
Future battlefile; Homomorphism; Data management;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Biff Sturk, Rick Painter ,'C2 Constellation & ConstellationNet', Air Force C2 & ISR Center, 2003.
2 David S. Albert, John J. Garstka, Frederick P. Stein ,'Net Centric Warfare', DoD CCRP, 2000.
3 DoD CIO, 'Net-Centric Data Strategy', U.S. DoD, 2003.
4 안유성, "사이버공격에 대비한 국방체계 발전방안연구", 정보보호학회지, 제23권, 제2호, pp.48-54, 2013.
5 최중섭, 이경구, 김홍근, "침입감내기술 연구 동향", 정보보호학회지, 제13권, 제1호, pp.56-63, 2003.
6 안무정, 손수민, 이대영, "NCW 실현을 위한 전략과 이행방안", 정보과학회지, 제26권, 제11호, pp.40-46, 2008.
7 N. S. Jho, K. Y. Jang, "Trend and Issue on Homomorphic Encryption", Weekly IT Brief(2011), Vol. 1522, pp. 15-25, 2011.
8 Rivest, Adleman, Dertouzos, "On data bank and privacy homomorphisms", Proceedings of the 19th Annual Symposium on Foundations of Secure Computation-FSC 1978, pp169-180, 1978.
9 J.Domingo-Ferrer, "A New privacy homo -morphism and applications", Information Processing letters, vol.60, no.5, pp.277-282, 1996.   DOI
10 Craig Gentry, "Fully homomorphic encryption using ideal lattices", in Proceedings of the 41st ACM Symposium on Theory of Computing - STOC 2009, pp.169-178, 2009.