• Title/Summary/Keyword: 분산 합의 알고리즘

Search Result 56, Processing Time 0.026 seconds

Electronic voting system using block chain (블록체인을 이용한 전자투표 시스템)

  • Roh, Chang-Hyun;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.159-160
    • /
    • 2018
  • 블록체인은 분산 원장 기술 중 하나로 여러 개의 노드들이 참여하며, 이 노드들 간의 합의 알고리즘을 통하여 데이터의 위 변조를 막고, 이미 기록된 데이터를 바꿀 수 없는 구조를 장점으로 가진다. 이러한 특성 때문에 블록체인은 신뢰성이 중요시되는 플랫폼에 많이 적용이 되며 많은 플랫폼 중 전자투표의 중요한 기술로서 인식되고 있다. 전자투표는 선거의 모든 과정을 전자화 하여 선거를 관리하는 사람이나 투표자 모두에게 편리함을 제공하는 시스템으로 기술적인 보안성이나 시스템의 안정성이 완벽하게 보장되지 않아 유권자들에게 신뢰를 주지 못해 현실에서 쉽게 적용하지 못하고 있다. 이러한 문제를 해결하기 위해 본 논문에서는 블록체인을 적용하여 투표의 변조를 막고 유권자들의 신뢰와 시스템의 안정성을 제공하는 전자투표 시스템을 제안한다.

A Study on electing and dismissing delegate node of blockchain network (블록체인 네트워크의 대표노드 선출 및 해임에 관한 연구)

  • Jung, Pilsu;Chun, Woojik;Oh, Hyeongseok;Yune, Daeil;Kang, Sungwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.641-644
    • /
    • 2019
  • 블록체인은 탈중앙화된 신뢰 기반 분산 데이터베이스로 높은 신뢰성과 보안성을 제공하지만 기존의 블록체인들은 확장성이 떨어진다는 문제를 지닌다. 이 문제를 해결하기 위해 기존의 방법들은 소수의 대표노드들을 선출하여 합의 과정을 간소화 하려 하였다. 그러나 이러한 시도는 대표 노드를 선출하기 위해 지분 기반 투표 방식을 사용하기 때문에 많은 지분을 가진 노드들에게 권한이 집중될 수 있다는 한계를 갖는다. 본 연구는 이러한 한계점을 해결한 대표노드 선출/해임 모델을 소개한다. 제안 방법은 Raft 의 투표 알고리즘을 확장하여 대표노드의 공정한 선출과 대표노드의 부적절한 행위를 예방한다. 제안 방법은 모델 검증을 통해 도달 가능성, 안전성, 활동성이 확인되었다.

Event Routing Algorithms Using the Reverse Paths of Event Subscription Spanning Trees (이벤트 등록 스패닝트리의 역경로 정보를 이용한 이벤트 라우팅 알고리즘)

  • Ryu, Ki-Yeol;Lee, Jung-Tae
    • The KIPS Transactions:PartA
    • /
    • v.9A no.1
    • /
    • pp.19-28
    • /
    • 2002
  • A new class of applications based on event interactions are emerging for the wide-area network such as Internet, which is characterized as loose coupling, heterogeneity. and asynchrony. Content-barred publish/subscribe systems are widely being studied to implement the extent notification service for wide-area networks. In this paper, we analyze some problems of the content-based routing algorithm in SIENA, a recently developed as a representative event notification service architecture, and develop an enhanced routing algorithm.

Viola-Jones Object Detection Algorithm Using Rectangular Feature (사각 특징을 추가한 Viola-Jones 물체 검출 알고리즘)

  • Seo, Ji-Won;Lee, Ji-Eun;Kwak, No-Jun
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.49 no.3
    • /
    • pp.18-29
    • /
    • 2012
  • Viola-Jones algorithm, a very effective real-time object detection method, uses Haar-like features to constitute weak classifiers. A Haar-like feature is made up of at least two rectangles each of which corresponds to either positive or negative areas and the feature value is computed by subtracting the sum of pixel values in the negative area from that of pixel values in the positive area. Compared to the conventional Haar-like feature which is made up of more than one rectangle, in this paper, we present a couple of new rectangular features whose feature values are computed either by the sum or by the variance of pixel values in a rectangle. By the use of these rectangular features in combination with the conventional Haar-like features, we can select additional features which have been excluded in the conventional Viola-Jones algorithm where every features are the combination of contiguous bright and dark areas of an object. In doing so, we can enhance the performance of object detection without any computational overhead.

Robust Speech Enhancement By Multi $H_\infty$ Filter (다중 $H_\infty$ 필터에 의한 강인한 음성향상)

  • Kim Jun Il;Lee Ki Yong
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • spring
    • /
    • pp.85-88
    • /
    • 2004
  • 칼만/위너 필터 같은 기존의 음성향상 알고리즘은 잡음의 선험적 지식을 요구하고, 음성신호와 추정신호의 오차분산을 최소화하는데 중점을 두었다. 따라서, 잡음에 대한 통계적 추정에 오류가 있을 경우 결과에 악영향을 미칠 수 있다. 그러나 $H_\infty$ 필터는 잡음에 대한 어떠한 가정이나 선험적 지식을 요구하지 않는다. $H_\infty$ 필터는 최소상계(Upper Bound Least)를 적용하여 추정된 모든 신호들로부터 최소 에러 신호를 갖는 최상의 추정신호를 찾아내므로 칼만/위너 필터보다 잡음의 변화에 강인하다. 본 논문에서는 학습 신호로부터 은닉 마코프 모델의 파리미터를 추정한 후, 오염된 신호를 고정된 개수의 $H_\infty$ 필터를 통과시켜 각 출력에 가중된 합으로 향상된 음성 신호를 구한다. 음성의 통계적 특성을 이용하여 모델 파라미터를 추정하는 은닉 마코프 모델과 잡음의 변화에 강인한 $H_\infty$ 알고리즘을 사용해서, 다중 $H_\infty$필터에 의한 강인한 음성향상 방법을 제안하였다.

  • PDF

A Study on the Blockchain-based System Authentication Method (블록체인 기반 시스템 인증 방법에 대한 연구)

  • Kim, Sunghwan;Kim, Younggon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.211-218
    • /
    • 2020
  • Recently, with the advent of blockchain technology, attempts to apply this technology to existing systems are increasing. By using the blockchain technology consensus ledger and smart contract, it is necessary to distribute certificates to various fields that require documents, attestation, authentication, verification, etc. We are studying methods using hash operation, blockchain, etc., but it is difficult to spread the technology as it has not yet reached the stage of commercialization. In this paper, user device registration authentication algorithm, blockchain-based question and answer authentication algorithm, certificate issuance, verification process and encryption algorithm, and server-side authentication for easy application in blockchain based business platform environment We proposed a blockchain-based system authentication method using four algorithms.

Consensus-based Autonomous Search Algorithm Applied for Swarm of UAVs (군집 무인기 활용을 위한 합의 기반 자율 탐색 알고리즘)

  • Park, Kuk-Kwon;Kwon, Ho-Jun;Choi, Eunju;Ryoo, Chang-Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.5
    • /
    • pp.443-449
    • /
    • 2017
  • Swarm of low-cost UAVs for search mission has benefit in the sense of rapid search compared to use of single high-end UAV. As the number of UAVs forming swarm increases, not only the time for the mission planning increases, but also the system to operate UAVs has excessive burden. This paper addresses a decentralized area search algorithm adequate for multiple UAVs which takes advantages of flexibility, robustness, and simplicity. To down the cost, it is assumed that each UAV has limited ability: close-communication, basic calculation, and limited memory. In close-communication, heath conditions and search information are shared. And collision avoidance and consensus of next search direction are then done. To increase weight on un-searched area and to provide overlapped search, the score function is introduced. Performance and operational characteristics of the proposed search algorithm and mission planning logic are verified via numerical simulations.

A Study on Authentication Model using Blockchain (블록체인 기술을 활용한 진본인증 모형 연구)

  • Lee, Kyung-nam
    • The Korean Journal of Archival Studies
    • /
    • no.59
    • /
    • pp.47-78
    • /
    • 2019
  • With the rapid changes in the digital technology, it is necessary to shift to a new paradigm corresponding to the changing environment was recognized. This study actively explores the possibility of applying new technologies for recordkeeping. This study aimed to investigate the applicability of blockchain to recordkeeping and to develop a new model for recordkeeping based on it. Through a conceptual analysis of blockchain and consideration of the recordkeeping process, a blockchain model that is suitable for the authentication of records was proposed. For this the network structure, the structure of blockchain blocks, a consensus algorithm, and recordkeeping blockchain model were designed. It also predicted potential changes in digital records management when applying blockchain. It predicted change in governance aspects to implement a horizontal cooperation system among the archives.

Protection Technologies against Large-scale Computing Attacks in Blockchain (블록체인에서 대용량 컴퓨팅 공격 보호 기술)

  • Lee, Hakjun;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.11-19
    • /
    • 2019
  • The blockchain is a technique for managing transaction data in distributed computing manner without the involvement of central trust authority. The blockchain has been used in various area such as manufacturing, culture, and public as well as finance because of its advantage of the security, efficiency and applicability. In the blockchain, it was considered safe against 51% attack because the adversary could not have more than 50% hash power. However, there have been cases caused by large-scale computing attacks such as 51% and selfish mining attack, and the frequency of these attacks is increasing. In addition, since the development of quantum computers can hold exponentially more information than their classical computer, it faces a new type of threat using quantum algorithms. In this paper, we perform the security analysis of blockchain attacks composing the large computing capabilities including quantum computing attacks. Finally, we suggest the technologies and future direction of the blockchain development in order to be safe against large-scale computing attacks.

HyperCerts : Privacy-Enhanced OTP-Based Educational Certificate Blockchian System (HyperCerts : 개인정보를 고려한 OTP 기반 디지털 졸업장 블록체인 시스템)

  • Jung, Seung Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.987-997
    • /
    • 2018
  • Blockchain has tamper-free, so many applications are developing to leverage tamper-free features of blockchain. MIT Media Labs proposed BlockCerts, educational certificate blockchain System, to solve problems of legacy certificate verifications. Existing educational certificate blockchain Systems are based on public blockchain such as bitcoin, Ethereum, so any entity can participate educational institute in principal. Moreover, the exisitng educational certricate blockchain system utilizes the integrity of blockchain, but the confidentiality of the educational certificate is not provided. This paper propose a digital certificate system based on private blockchain, name HyperCerts. Therefore, only trusted entity can participate in the private blockchain network, Hyperledger, as the issuer of digital certificate. Furthermore, the practical byzantine fault tolerance is used as consensus algorithm, HyperCerts reduce dramatically the latency of issuing digital certificate and required computing power. HyperCerts stores the hash value of digital certificate into the ledger, so breach of personal information by malicious entity in the private blockchain is protected.