• Title/Summary/Keyword: ABE

Search Result 343, Processing Time 0.02 seconds

The Daily Us (vs. Them) from Online to Offline: Japan's Media Manipulation and Cultural Transcoding of Collective Memories

  • Ogasawara, Midori
    • Journal of Contemporary Eastern Asia
    • /
    • v.18 no.2
    • /
    • pp.49-67
    • /
    • 2019
  • Since returning to power in 2012, the second Abe administration has pressured Japanese mainstream media in various ways, from creating the Secrecy Act to forming close relationships with media executives and promoting anti-journalism voices on social media. This article focuses on the growth of a jingoist group called the 'Net-rightists' ('Neto-uyo' in the Japanese abbreviation) on the Internet, which has been supporting the right-wing government and amplifying its historical revisionist views of Japanese colonialism. These heavy Internet users deny Japan's war crimes against neighboring Asian countries and disseminate fake news about the past, which justifies Prime Minister Shinzo Abe's hostile diplomatic policies against South Korea and China. Over the past years, the rightist online discourses have become powerful to such an extent that the editorials of major newspapers and TV reports shifted to more nationalist tones. Who are the Neto-uyo? Why have they emerged from the online world and proliferated to the offline world? Two significant characteristics of new media are discussed to analyze their successful media manipulation: cultural transcoding and perpetual rewriting of collective memories. These characteristics have resulted in constructing and reinforcing the data loops of the 'Daily Us' versus Them, technologically raising current diplomatic tensions in East Asia.

Two Attribute-based Broadcast Encryption Algorithms based on the Binary Tree (이진트리 기반의 속성기반 암호전송 알고리즘)

  • Lee, Moon Sik;Kim, HongTae;Hong, Jeoung Dae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.3
    • /
    • pp.358-363
    • /
    • 2014
  • In this paper, we present two constructions of the attribute-based broadcast encryption(ABBE) algorithm. Attribute-based encryption(ABE) algorithm enables an access control mechanism over encrypted data by specifying access policies among private keys and ciphertexts. ABBE algorithm can be used to construct ABE algorithm with revocation mechanism. Revocation has a useful property that revocation can be done without affecting any non-revoked uers. The main difference between our algorithm and the classical ones derived from the complete subtree paradigm which is apt for military hierarchy. Our algorithm improve the efficiency from the previously best ABBE algorithm, in particular, our algorithm allows one to select or revoke users by sending ciphertext of constant size with respect to the number of attributes and by storing logarithm secret key size of the number of users. Therefore, our algorithm can be an option to applications where computation cost is a top priority and can be applied to military technologies in the near future.

A Decentralized Copyright Management Model using Mydata Concept (마이데이터 개념을 활용한 탈중앙화 저작권 관리 모델)

  • Kim, Hyebin;Shin, Weon;Shin, Sang Uk
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.2
    • /
    • pp.262-273
    • /
    • 2020
  • This paper analyzes the existing copyright management and copyright sharing model and discusses the limitations. It then proposes a consortium Blockchain-based copyright management model in which the service platform participates as a node, and discusses how to combine the My Data concept with Blockchain and smart contracts. Also, Blockchain-based CP-ABE is introduced and applied to the proposed model as a way for users to define access policies and store copyright data in encrypted form on the storage of the online service providers (OSP). Compared with the existing copyright management model, the proposed model allows the copyright holder to focus on copyright registration, license content design, and sharing, as the data subject. And it is expected to be able to transparently manage the usage records and the basis for the settlement of the copyrighted data that are shared and used on each platform.

Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing

  • Li, Jiguo;Wang, Haiping;Zhang, Yichen;Shen, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3339-3352
    • /
    • 2016
  • In ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user's secret key is associated with a set of attributes, and the ciphertext is associated with an access policy. The user can decrypt the ciphertext if and only if the attribute set of his secret key satisfies the access policy specified in the ciphertext. In the present schemes, access policy is sent to the decryptor along with the ciphertext, which means that the privacy of the encryptor is revealed. In order to solve such problem, we propose a CP-ABE scheme with hidden access policy, which is able to preserve the privacy of the encryptor and decryptor. And what's more in the present schemes, the users need to do excessive calculation for decryption to check whether their attributes match the access policy specified in the ciphertext or not, which makes the users do useless computation if the attributes don't match the hidden access policy. In order to solve efficiency issue, our scheme adds a testing phase to avoid the unnecessary operation above before decryption. The computation cost for the testing phase is much less than the decryption computation so that the efficiency in our scheme is improved. Meanwhile, our new scheme is proved to be selectively secure against chosen-plaintext attack under DDH assumption.

Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 프록시 재암호화 기반의 데이터 관리 방식)

  • Song, You-Jin;Do, Jeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.288-299
    • /
    • 2012
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server and prevent modification attack for proxy re-encryption key using d Secret Sharing, We construct protocol model in medical environment.

The Impact of Japan's Pursuit of Constitutional Amendment on Marine Security and Countermeasures (일본의 개헌(改憲) 추진이 우리 해양안보에 미치는 영향과 대응방안)

  • Heo, Song
    • Strategy21
    • /
    • s.44
    • /
    • pp.54-78
    • /
    • 2018
  • The core of the current constitutional amendment pursued by the Abe administration depends on the status of the Japanese Self-Defense Forces, which include the right to engage in war, in the legal and regular military positions. This is an important turning point for the Abe administration, which aims to become a normal country for Japan, and it is a series of steps that followed in the revision of the U.S. and Japan guidelines in 2015 and the overhaul of the security law in 2016. In this paper, we propose building "A navy Attractive to Alliances" as a way to secure Korea's maritime security under the current security environment. The term "attraction" refers to the alliance "first priority" especially in the United States. The way to do this is to transform the paradigm of the ROK-U.S. alliance into a naval hub in the vast seas, which will allow us to strengthen our national defense and even deter threats from neighboring countries. To this end, our navy needs to have a more active approach to U.S. East Asian strategy. If we can convince the United States to be a nation that contributes more to its East Asian strategy, it will only lead to a strengthening of the status of its alliance and expansion of its unilateral support and military capability against Japan, thus minimizing Japan's influence.

Crystal Structure and Molecular Mechanism of Phosphotransbutyrylase from Clostridium acetobutylicum

  • Kim, Sangwoo;Kim, Kyung-Jin
    • Journal of Microbiology and Biotechnology
    • /
    • v.31 no.10
    • /
    • pp.1393-1400
    • /
    • 2021
  • Acetone-butanol-ethanol (ABE) fermentation by the anaerobic bacterium Clostridium acetobutylicum has been considered a promising process of industrial biofuel production. Phosphotransbutyrylase (phosphate butyryltransferase, PTB) plays a crucial role in butyrate metabolism by catalyzing the reversible conversion of butyryl-CoA into butyryl phosphate. Here, we report the crystal structure of PTB from the Clostridial host for ABE fermentation, C. acetobutylicum, (CaPTB) at a 2.9 Å resolution. The overall structure of the CaPTB monomer is quite similar to those of other acyltransferases, with some regional structural differences. The monomeric structure of CaPTB consists of two distinct domains, the N- and C-terminal domains. The active site cleft was formed at the interface between the two domains. Interestingly, the crystal structure of CaPTB contained eight molecules per asymmetric unit, forming an octamer, and the size-exclusion chromatography experiment also suggested that the enzyme exists as an octamer in solution. The structural analysis of CaPTB identifies the substrate binding mode of the enzyme and comparisons with other acyltransferase structures lead us to speculate that the enzyme undergoes a conformational change upon binding of its substrate.

A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment

  • Reetu, Gupta;Priyesh, Kanungo;Nirmal, Dagdee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.145-164
    • /
    • 2023
  • Cloud computing offers a platform that is both adaptable and scalable, making it ideal for outsourcing data for sharing. Various organizations outsource their data on cloud storage servers for availing management and sharing services. When the organizations outsource the data, they lose direct control on the data. This raises the privacy and security concerns. Cryptographic encryption methods can secure the data from the intruders as well as cloud service providers. Data owners may also specify access control policies such that only the users, who satisfy the policies, can access the data. Attribute based access control techniques are more suitable for the cloud environment as they cover large number of users coming from various domains. Multi-authority attribute-based encryption (MA-ABE) technique is one of the propitious attribute based access control technique, which allows data owner to enforce access policies on encrypted data. The main aim of this paper is to comprehensively survey various state-of-the-art MA-ABE schemes to explore different features such as attribute and key management techniques, access policy structure and its expressiveness, revocation of access rights, policy updating techniques, privacy preservation techniques, fast decryption and computation outsourcing, proxy re-encryption etc. Moreover, the paper presents feature-wise comparison of all the pertinent schemes in the field. Finally, some research challenges and directions are summarized that need to be addressed in near future.

A new record of high temperature tolerance species, Pyropia kitoi com. nov.(Bangiaceae, Rhodophyta), from Korea

  • Dong Jin Kim;Paola Romero-Orozco;Gwan Woung Kim;Seong Hyeon Baek;Tae Oh Cho;Boo Yeon Won
    • Korean Journal of Environmental Biology
    • /
    • v.41 no.3
    • /
    • pp.223-228
    • /
    • 2023
  • Neoporphyra kitoi Ma. Abe, N. Kikuchi, Tamaki, Tom. Sato, Murase, Fujiyoshi & Mas. Kobayashi has been known as an endemic species in Japan. Its high temperature tolerance suggests that it could be advantageous for cultivation. In this study, we collected it from the Ulleungdo island, Korea and transferred it into Pyropia for a new combination, identified as Pyropia kitoi(Ma. Abe, N. Kikuchi, Tamaki, Tom. Sato, Murase, Fujiyoshi & Mas. Kobayashi) D.J. Kim, T.O. Cho & B.Y. Won comb. nov. based on morphological and molecular analyses. Pyropia kitoi is also reported as a new record species in the list of Korean macroalgal flora. Although we didn't observe the emergence of new blades from the rhizoidal cells, which is a key character for this species, our molecular analysis of rbcL revealed that our samples from Korea were congruent with "Neoporphyra kitoi" from Japan and were nested within the clade of Pyropia. The gene sequence divergence between the Korean and Japanese samples was 0-0.2%.

Korean Media's News Coverage of Japan's position on Her Past History Problems Under Abe Shinzo's Cabinet Dynamic Process of News Framing (아베 내각의 일본 과거사 인식 문제에 대한 한국 언론의 시각 보수신문과 진보신문에 나타난 보도 프레임의 역동적 과정)

  • Lee, Wan Soo;Bae, Jae Young;Park, Kyung Woo
    • Korean journal of communication and information
    • /
    • v.79
    • /
    • pp.104-139
    • /
    • 2016
  • This study investigated how Korean media covered Japan's position on her past history issues proposed by Abe' Shinzo's cabinet. The researchers adopted Entman's analytical tools for frame analysis and the concept of "frame changing" proposed by Chi and McCombs. The analysis rendered several propositions. First of all, the Korean media's coverage on Japan's past history issues focused heavily on the current conflict among two nations rather than constructing a futuristic viewpoint based on a thorough discussion on the historical background of the topic. In addition, it emphasized that the conflict should be resolved by political negotiations between the two governments. Secondly, the news coverages depicted "comfort women" issues as the prime element of the conflict, describing Abe's cabinet as the major inducer of the conflict. Ideological and political divisions among Korean media did not significantly influence on how they frame Japan's past history issues. In general, Korean media took the stance of ethnocentric "patriotic journalism," advocating Korean government's position and covering the emotional reactions from Korean public instead of providing through and through objective news coverage on Japan's past history issues.

  • PDF