• Title/Summary/Keyword: Anonymous

Search Result 434, Processing Time 0.025 seconds

A Practical Approach Defeating Blackmailing XTR-version Identification protocol (XTR 버전의 개인식별 프로토콜을 이용해 블랙메일링을 막는 실질적인 방법)

  • 한동국;박혜영;박영호;김창한;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.1
    • /
    • pp.55-66
    • /
    • 2002
  • Electronic cash system based on anonymous coins have been invented by David Chaum. However, von Solms and Naccache discovered that such anonymous coins also very well suited to support criminals in Blacoailing. In this paper, we suggest a method that a client informs a bank of the information about blackmailing attack by using Schnorr identification protocol of XTR version at the stage of identification, whenever he is blackmailed. In general, blackmailing is the most serious among the various drawbacks of electronic cash system. Especially, blackmiling to be done when the client is kidnapped brings a fatal result to electronic cash system. But if the Schnorr identification protocol of XTR version is used, we can efficiently defeat blackmailing without assumption required in the existing method to defeat blackmailing.

An Anonymous Rights Trading System using group signature schemes (그룹서명을 이용하여 익명성이 보장되는 디지털 권한 전달 시스템)

  • 주학수;김대엽;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.3-13
    • /
    • 2004
  • E-Commerce is suddenly spreading in a daily life. A rights trading system is a system that circulates digital-tickets such as plane tickets, software license, coupon. There are two main approaches so far account-based and smart-card based systems. The NTT Proposed FlexToken, a new smart card based copy prevention scheme for digital rights. They Proposed using pseudonymous self certified keys of Petersen and Horster in order to ensure anonymity of users. However. Petersen and Holster's scheme should register a pseudonymous key pair at TTP (One-time) every time so that users create the signature which is satisfied with unlinkability property In this paper, we propose a new anonymous rights trading system using group signature. This paper has a meaning having applied to digital rights trading system an efficient smart card based group signature.

Self Generable Conditionally Anonymous Authentication System for VANET (VANET를 위한 차량자체생성 조건부익명 인증시스템)

  • Kim, Sang-Jin;Lim, Ji-Hwan;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.105-114
    • /
    • 2009
  • Messages exchanged among vehicles must be authenticated in order to provide collision avoidance and cooperative driving services in VANET. However, digitally signing the messages can violate the privacy of users. Therefore, we require authentication systems that can provide conditional anonymity. Recently, Zhang et al. proposed conditionally anonymous authentication system for VANET using tamper-resistant hardware. In their system, vehicles can generate identity-based public keys by themselves and use them to sign messages. Moreover, they use batch verification to effectively verify signed messages. In this paper, we provide amelioration to Zhang et al.'s system in the following respects. First, we use a more efficient probabilistic signature scheme. Second, unlike Zhang et al., we use a security proven batch verification scheme. We also provide effective solutions for key revocation and anonymity revocation problems.

Influencing Factors on Intention to Vaccinate Against COVID-19 in College Students

  • Lee, Se Hyun;Park, Seo Rin;Kim, Hye Min;Ko, Da Yeon;Kang, Min Seong;Choi, Eun Chae;Shin, Da Som;Kim, Se Yeon;Seo, Eun Ji
    • Journal of Korean Biological Nursing Science
    • /
    • v.23 no.4
    • /
    • pp.330-338
    • /
    • 2021
  • Purpose: This cross-sectional study aimed to identify factors affecting coronavirus disease 2019 (COVID-19) vaccination intention. Methods: For an anonymous online survey, recruitment notices were posted on an anonymous community by each university, and an online survey was conducted through online form from June to July 2021. COVID-19 knowledge and health-protective behavior were measured using a questionnaire based on previous literature and reflecting the Korea Centers for Disease Control and Prevention's COVID-19 Response Guidelines. The psychological antecedents of vaccination were measured by 5C scale. Results: Two-hundred and ninety-four college students (women 67.3%) answered the survey; 179 (60.9%) reported that they would accept a COVID-19 vaccine. The mean scores for COVID-19 knowledge and health-protective behavior were 22.97±5.33 (out of 35) and 9.92±2.22 (out of 12), respectively. For the psychological antecedents of vaccination, the mean scores for confidence, collective responsibility, calculation, complacency, and constraints were 4.45 (± 1.24), 5.61 (± 1.09), 5.09 (± 1.18), 2.42 (± 1.11), and 2.37 (± 1.19) out of 5 points, respectively. The confidence, calculation, and collective responsibility were associated with vaccination intention. Additionally, the top reason for those who were less prone to accept vaccination against COVID-19 was concern about vaccine safety. Conclusion: The higher the confidence in the vaccine and the higher the collective responsibility, the higher the vaccination intention. As it is a factor related to an individual's perception of COVID-19 information, it is necessary to increase confidence in the vaccines through obtaining accurate information on the safety, effectiveness, and side effects of the COVID-19 vaccines and vaccination.

Biasing Factors in Self-Report Assessment of Bullying/Victimization: Examining Variability in Involvement Rates by Testing Conditions (자기보고식 괴롭힘 경험률 평가의 편향요인 탐색: 평가조건 변인을 중심으로)

  • Lee, Donghyung
    • Korean Journal of School Psychology
    • /
    • v.15 no.3
    • /
    • pp.459-488
    • /
    • 2018
  • The self-report assessment has been most commonly used to estimate bullying/victimization (B/V) rates in most domestic and international prevalence studies. However, the presence of many potential biasing factors in such an assessment method, including specific operationalization/measurement strategies and testing conditions, has become an issue due to a considerable variability in reported involvement rates across studies. This study analyzed self-reported B/V involvement rates on Olweus Bullying Questionnaire (OBQ) among 690 Korean middle school students by gender and two different cut-offs (generous vs. strict cut-offs) and examined if the involvement rates were significantly varied by testing conditions such as presentation vs. omission of a precise definition of B/V, anonymous vs. non-anonymous/confidential administration, and the use of global vs. specific questions. Chi-square analyses revealed that boys displayed higher involvement rates on global measures of B/V and on items related to direct forms of B/V, with no significant gender differences on specific measures of relational B/V rates. It was also found that a global rate of bullying and specific rates of verbal B/V were 111% to 157% higher when no definition was provided. However, anonymous vs. non-anonymous administration had no significant impacts on rates of involvement, except for one item; there were also no significant differences in reported degrees of frankness and perceived confidentiality of their responses across two adminstration conditions. Finally, when involvement rates were assessed by using specific vs. global items, they were 68% to 148% higher with binominal correlations in low to moderate ranges. Findings also indicated that global items had a high specificity but a relatively low sensitivity. Implications of these findings were fully discussed for researchers and practitioners in the field of B/V assessment.

Design of Micropayment System Using anonymous OTP for M-commerce (M-Commerce에서 OTP를 이용하여 사용자 익명성을 보장하는 소액 결제 시스템)

  • Shin Dong-Gyu;Jung Ki-Won;Choun Jun-ho;Jun Moon-Seog
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.31-33
    • /
    • 2005
  • 인터넷을 통한 전자상거래의 급격한 발전으로 현재는 사용자가 이동하는 상황에서도 전자상거래가 이루어지고 있다. 즉 M-Commerce의 발전방향은 기존의 고가의 물품에 대해서가 아니라 문서, 음악 파일, 동영상과 같은 소액에 대한 상거래가 급격히 발전할 것이다. 이로 인해 현재 소액결제시스템이 발전하고 보급되어있는 상태이다. 하지만 기존의 소액결제 시스템의 문제점인 사용자 익명성에 관한 부분에 대하여 본 논문에서는 OTP형식의 소액결제시스템에서의 새로운 프로토콜을 제안하였다. 거래가 이루어지기전에 이미 서로의 인증이 되는 고객과 이동통신업체에 중점을 두어 고객이 직접 인터넷 콘텐츠 공급업체에 개인정보를 입력하지 않아도 인증을 할 수 있도록 설계하였다.

  • PDF

Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.504-523
    • /
    • 2014
  • This paper presents a multiple-watermarking scheme for copyright protection and the prevention of illegal copying of mobile 3D contents with low resolution. The proposed scheme embeds a unique watermark and a watermark certification authority (WCA) watermark into the spatial and encryption domains of a mobile 3D content based on the buyer-seller watermarking protocol. The seller generates a unique watermark and embeds it into the local maximum curvedness of a 3D object. After receiving the encrypted watermark from the WCA, the seller embeds it into the encrypted vertex data using an operator that satisfies the privacy homomorphic property. The proposed method was implemented using a mobile content tool, and the experimental results verify its capability in terms of copyright protection and the prevention of illegal copying.

The Technology and Trend of Anonymous Authentication (익명 인증 기술과 동향)

  • Lee, Yun-Gyeong;Han, Seung-Wan;Lee, Seok-Jun;Jeong, Byeong-Ho;Yang, Dae-Heon;Gwon, Tae-Gyeong
    • Electronics and Telecommunications Trends
    • /
    • v.23 no.4
    • /
    • pp.19-29
    • /
    • 2008
  • 인터넷 이용이 활성화 되면서 각종 웹 서버에서의 개인정보 과다 수집 및 노출이 큰 이슈가 되고 있다. 인터넷이 우리 생활에 주는 편리함을 그대로 누리면서 개인정보를 보호할 수 있는 방안으로 익명 인증 기술이 있을 수 있다. 익명 인증은 익명성을 제공하는 디지털 서명을 이용한 인증 방법이다. 익명성을 제공하는 디지털 서명 방법은 전자화폐와 전자투표 시스템 등의 응용을 위해서 주로 연구되어 왔으나, 최근에는 인터넷 환경에서 개인정보 보호를 위한 익명 인증 방법의 하나로써 연구되고 있다. 본 고에서는 익명성을 제공하는 전자서명 방법에 관하여 소개하고, 이들 전자서명 방법 중 익명 인증을 위해서 가장 많은 연구가 되고 있는 그룹 서명 방법의 최근 연구동향에 관하여 기술하고자 한다.

A Study of Regulating Internet Escrow Services in Electronic Commerce (전자상거래상의 인터넷 에스크로 서비스의 규제에 관한 연구)

  • 김정곤
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.215-226
    • /
    • 2004
  • As with the fast spread of internet uses in recent years, electronic commerce has evolved. The proliferation of electronic commerce has increased diverse forms of fraud cases since internet helps intended criminals remain anonymous. In absence of effective tools to warrant the reliability of parties offering products or services through electronic commerce, consumers have to absorb damages unfairly. Internet escrow service has been considered to be an option to establish reliability between buyers and sellers and to protect consumers from possible fraud cases. However, like other industries, fraudulent escrow services have appeared in internet. This study has been intended to analyze fraudulent internet escrow services and to propose an effective regulatory system of internet escrow services. To do that, this study benchmarked the regulation of the State of California, primarily focusing on the formation of escrow company, regulation of escrow business, and remedies for wrongdoing, so Korea can consider the adoption of similar systems.

  • PDF

The Types of Nurses Perception of Whistle-Blowing;Q-Methodology (간호사의 내부고발 인식유형에 관한 연구)

  • Kwak, Myung-Soon;Kim, In-Soon
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.10 no.2
    • /
    • pp.265-276
    • /
    • 2004
  • Purpose: This study was to define structural subjectivity pattern of whistle-blowing of hospital nurses. Method: This study was conducted using Q-methodology in order to classify the types of perception to an whistle-blowing from the inside of the incumbent hospital nurses. Nineteen members, including hospital nurses, professors and students majoring in the nursing department made 47 statements about the insider's accusation after an in-depth interview about the statements. Forty incumbent hospital nurses were the participants for the Q-Methodology. The statement data was analyzed with QUANL PC Program and five different types were classified according to how the nurse had replied to the statements. Result: The first one is a Propeller type. The second one is a Denial type. The third type is a Patient Advocate type. The fourth one is a Anonymous type. The fifth is a Netizen type. Conclusion: this study as a momentum, a reasonable and constitutional legislation in the nurses organization should be established as soon as possible.

  • PDF