• Title/Summary/Keyword: Anonymous

Search Result 434, Processing Time 0.027 seconds

A Study on Anonymous Protocol for Privacy in Consortium Block Chain (컨소시엄 블록체인에서의 Privacy를 위한 익명프로토콜에 관한 기법 및 연구)

  • Ra, Gyeong-Jin;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.194-196
    • /
    • 2019
  • 컨소시엄 블록체인은 허가된 멤버로 구성된 여러그룹이 하나의 원장을 공유한다. 이때 하위멤버의 트랜잭션 및 멤버 인증은 블록생성에 참여하는 신뢰된 노드로부터 유효성을 검증받는다. 따라서 컨소시엄 블록체인의 그룹 간 멤버의 트랜잭션 공유는 Privacy문제를 야기한다. 본 논문에서 컨소시엄 블록체인에서의 privacy를 위해 익명신용장기반의 익명프로토콜을 제안한다. 본 제안 방식은 다중블룸필터를 이용하여 긍정오류율을 높이고 효율적으로 검색하도록 한다. 또한 Blind Signature를 통해 컨소시엄 멤버간 메시지에 대한 익명성을 보존하면서 인증에 대한 서명은 유지하도록 한다. 결과적으로 컨소시엄 멤버 간 Privacy를 보존하면서 인증 트랜잭션을 블룸필터의 다중패턴으로 검증하여 컨소시엄 블록체인에서의 익명프로토콜(Anonymous protocol)을 제안한다. 이로써 컨소시엄 블록체인에서의 신뢰기반의 서버 시스템의 확장과 privacy 향상을 제공한다.

Exploring the Applicability of SMART Recovery for the Recovery of Addiction (중독 회복을 위한 SMART Recovery의 적용 가능성에 관한 연구)

  • Huh, Eun Jung;Kim, Nami;Kim, Bee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2019.05a
    • /
    • pp.467-468
    • /
    • 2019
  • Alcoholics Anonymous(AA)/Narcotic Anonymous(NA)의 12 단계 중독 회복 프로그램과 선배 회복자의 지지는 중독 치료 모델에서 성공적인 회복에 기여하는 주요한 역할을 한다. 12단계 중독회복 프로그램의 특징은 특정 종교를 기반으로 하지 않지만 자신의 무력감과 영적 존재에 대한 인정을 바탕으로 한다. 어떤 이들에게는 성공의 요인으로 작용하는 이 특징이 일부 참여자에게 거부하게 하는 요인으로 작용한다. 또한 AA/NA의 오프라인 모임에서 발생하는 다양한 부작용으로 인해 사회적 지지가 필요하지만 사회적 지지를 포기하는 이탈이 발생하여 참석자의 회복에 지장을 주기도 한다. 이에 서구 여러 나라에서 AA/NA와 유사하지만 오프라인뿐만 아니라 온라인 모임이 가능하고, 외부의 존재에 대한 의존이 아닌 중독자 스스로가 중독을 극복하게 도와주며 다양한 형태의 중독의 문제를 다루도록 돕는 SMART(Self Management and Recovery Training) Recovery가 대안으로 부상하였다. 따라서 본 연구에서는 중독회복에 상호자조집단의 도움이 필요하지만 12단계 프로그램이나 오프라인 모임 외에 다른 대안이 없는 국내 상황에 대한 새로운 대안으로 SMART Recovery에 대한 정보와 접근방법들을 심도 있게 탐색하고자 한다.

  • PDF

An Efficient Anonymous Mobile P2P Protocol Reducing Garbage Files (가비지 파일의 수신을 줄여줄 수 있는 효율적인 익명 모바일 P2P 프로토콜)

  • Cui, Yun-Feng;Oh, Hee-Kuk;Kim, Sang-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.706-709
    • /
    • 2008
  • With the increasing popularity of P2P file sharing and advancement of mobile technologies, mobile P2P has revealed its attraction. Anonymity has become an increasing requirement in mobile networks. To reduce receiving garbage files, file validation and filtering are other requirements in the mobile P2P environment. If there are effective file filtering and validation mechanism, nodes' battery duration will be saved. In this paper, we do an analysis of security and anonymity in P2P file sharing and exchange system in mobile ad hoc environment, and propose a new efficient anonymous protocol, which can provide anonymity by broadcasting with a probabilistic algorithm and hiding real hop count information, the file validation by the file's special hash value and file filtering mechanism through the collaboration of middle nodes.

A Probabilistic Approach for Robust Anonymous Authentication Protocol in VANETs (차량 네트워크에서 강한 익명성이 지원되는 인증 프로토콜을 위한 확률론적 접근방식)

  • Kim, Tae-Yeon;An, Do-Sik;Cho, Gi-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2309-2315
    • /
    • 2013
  • VANET(Vehicular Ad-hoc Network) is getting attention as an application to improve driver safety through inter-vehicle communication. For activation of VANET, privacy-preserving mutual authentication has to be guaranteed. In previous works, authors proposed various group-based authentication protocols. However, risks on ID exposure due to repeated use of group key and RSU(Road Side Unit) DoS attack were not considered. In this paper, we propose a probabilistic approach for robust anonymous authentication protocol. We evaluated our proposed method in a sets of criteria in VANET and verified it is an efficient solution for enhancing privacy.

Anonymity Certification Technique of a Smart Card base for Personal Information Protection (개인정보보호를 위한 스마트카드 기반의 익명 인증 기법)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.6071-6080
    • /
    • 2012
  • Regarding the official authentication method which is a strong encrypt method for financial transactions, there has recently been a concern for the problem of storage. As a solution for such problems, this study provides the anonymous authentication method based on the smart card used for such a purpose by utilizing the pseudo ID replacing the user's personal data. Such an anonymous authentication method makes it possible to prevent any inside leakage, intermediary attack, limited re-transmission attack, service-denying attack, directional safety attack and secret inspector attack in regard to the user's personal data. As a result, there would be no concern for the leakage of any personal data. In comparative analysis, after executing the comparison and analysis process through the experiment for the authentication process by using the previously-used smart card, the new one has shown about 10% a high level of efficiency for the encrypt and decrypt process together with excellent features in terms of flexibility in regard to the user's anonymity and tracking ability.

Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol (익명 Buyer-Seller 워터마킹 프로토콜 기반 모바일 3D 콘텐츠의 기하학적 다중 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.2
    • /
    • pp.244-256
    • /
    • 2009
  • This paper presents multiple watermarking method for the copyright protection and the prevention of illegal copying of mobile 3D contents. The proposed method embeds an unique watermark and a WCA watermark into the spatial and encryption domains of mobile 3D content based on anonymous Buyer-Seller watermarking protocol. The seller generates an unique watermark and embeds it into the distribution of vertex data of 3D content object. After receiving the encrypted watermark from WCA, the seller embeds it into the encrypted vertex data by using operator that satisfies the privacy homo morphic property. The proposed method was implemented using a mobile content tool, Power VR MBX and experimental results verified that the proposed method was capable of copyright protection and preventing illegal copying, as the watermarks were also accurately extracted in the case of geometrical attacks, such as noise addition, data accuracy variation, and data up/down scaling.

  • PDF

A Study on Anonymous Electronic Prescription based on RSA Cryptosystem (RSA 기반의 익명 전자처방전에 관한 연구)

  • Chung, Chan-Joo;Yun, Jung-Mee;Won, Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.51-62
    • /
    • 2010
  • This paper proposes RSA cryptosystem based anonymous electronic prescription which is issued from university and local hospitals by authorized medical professionals. Electronic prescription is now being used in domestic hospitals where sharing medical records and images are prevailing, facilitated by digitalizing medical information and building network infrastructure between the institutes. Proposed RSA based anonymous electronic prescription makes use of PKI protects the identity exposure of doctors and privacy of patients. While traditional prescription fails to protect identities to mandates party or to health insurance, the proposed RSA based prescription opens the contents of the prescription to health insurance authority only after its prescribing function is finished. The proposed approach along with soon to be deployed electronic ID card will help national health insurance corporation to increase the transparency of national prescription system.

Factors Influencing Quality of Life of Alcoholics Anonymous Members in Korea (익명의 알코올중독자(AA) 모임 참여자의 삶의 질에 영향을 미치는 요인)

  • Yoo, Jae-Soon;Lee, Jongeun;Park, Woo-Young
    • Journal of Korean Academy of Nursing
    • /
    • v.46 no.2
    • /
    • pp.305-314
    • /
    • 2016
  • Purpose: The purpose of this study was to determine quality of life (QOL) related factors in Alcoholics Anonymous (AA) members based on PRECEDE Model. Methods: A cross sectional survey was conducted with participants (N=203) from AA meeting in 11 alcohol counsel centers all over South Korea. Data were collected using a specially designed questionnaire based on the PRECEDE model and including QOL, epidemiological factors (including depression and perceived health status), behavioral factors (continuous abstinence and physical health status and practice), predisposing factors (abstinence self-efficacy and self-esteem), reinforcing factors (social capital and family functioning), and enabling factors. Data were analyzed using t-test, one way ANOVA, Tukey HSD test and hierarchical multiple regression analysis with SPSS (ver. 21.0). Results: Of the educational diagnostic variables, self-esteem (${\beta}=.23$), family functioning (${\beta}=.12$), abstinence self-efficacy (${\beta}=.12$) and social capital (${\beta}=.11$) were strong influential factors in AA members' QOL. In addition, epidemiological diagnostic variables such as depression (${\beta}=-.44$) and perceived health status (${\beta}=.35$) were the main factors in QOL. Also, physical health status and practice (${\beta}=.106$), one of behavioral diagnostic variables was a beneficial factor in QOL. Hierarchical multiple regression analysis showed the determinant variables accounted for 44.0% of the variation in QOL (F=25.76, p<.001). Conclusion: The finding of the study can be used as a framework for planning interventions in order to promote the quality of life of AA members. It is necessary to develop nursing intervention strategies for strengthening educational and epidemiological diagnostic variables in order to improve AA members' QOL.

Pseudonym-based Anonymous PKI with Short Group Signature (Short Group Signature를 이용한 가명 기반 PKI)

  • Lee, Sok-Joon;Han, Seung-Wan;Lee, Yun-Kyung;Chung, Byung-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.703-707
    • /
    • 2008
  • Nowadays, Internet becomes an essential element in our life. We can make use of numerous on-line services through Internet such as information search, on-line shopping, e-mail service, etc. But, while getting the benefits of Internet service, invasion of our privacy frequently occurs because on-line service providers tend to request excessive or unnecessary personal information. So, there have been some researches on anonymous authentication, which means that user can authenticate herself, not revealing her identity or personal information. But, most of the researches are not somewhat applicable to current authentication infrastructure. In this paper, we propose a pseudonym-based anonymous PKI with short group signature. Using our proposed scheme, we can provide anonymity with conditional traceability to current PKI.

  • PDF

Anonymity of Medical Brain Images (의료 두뇌영상의 익명성)

  • Lee, Hyo-Jong;Du, Ruoyu
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.49 no.1
    • /
    • pp.81-87
    • /
    • 2012
  • The current defacing method for keeping an anonymity of brain images damages the integrity of a precise brain analysis due to over removal, although it maintains the patients' privacy. A novel method has been developed to create an anonymous face model while keeping the voxel values of an image exactly the same as that of the original one. The method contains two steps: construction of a mockup brain template from ten normalized brain images and a substitution of the mockup brain to the brain image. A level set segmentation algorithm is applied to segment a scalp-skull apart from the whole brain volume. The segmented mockup brain is coregistered and normalized to the subject brain image to create an anonymous face model. The validity of this modification is tested through comparing the intensity of voxels inside a brain area from the mockup brain with the original brain image. The result shows that the intensity of voxels inside from the mockup brain is same as ones from an original brain image, while its anonymity is guaranteed.