• 제목/요약/키워드: Asymmetric Key

검색결과 171건 처리시간 0.04초

Asymmetric Synthesis of 12-epi-$PGF_{2α}$ by a Palladium-Mediated, Three-Component Coupling Reaction

  • 이남호;Richard C. Larock
    • Bulletin of the Korean Chemical Society
    • /
    • 제16권9호
    • /
    • pp.859-863
    • /
    • 1995
  • The prostaglandin analogue 12-epi-PGF2α (2) has been synthesized from optically active cis-4-t-butyldimethylsilyloxy-2-cyclopenten-1-ol (4b) in 4 steps in an overall yield of 21%. An extremely efficient Pd(Ⅱ)-mediated, three-component coupling reaction is employed to obtain the key intermediate 9.

Public key broadcast encryption scheme using new converting method

  • Jho, Nam-Su;Yoo, Eun-Sun;Rhee, Man-Young
    • 정보보호학회논문지
    • /
    • 제18권6B호
    • /
    • pp.199-206
    • /
    • 2008
  • Broadcast encryption is a cryptographical primitive which is designed for a content provider to distribute contents to only privileged qualifying users through an insecure channel. Anyone who knows public keys can distribute contents by means of public key broadcast encryption whose technique can also be applicable to many other applications. In order to design public key broadcast encryption scheme, it should devise some methods that convert a broadcast encryption scheme based on symmetric key cryptosystem to a public key broadcast encryption. Up to this point, broadcast encryption scheme on trial for converting from symmetric key setting to asymmetric public key setting has been attempted by employing the Hierarchical Identity Based Encryption (HIBE) technique. However, this converting method is not optimal because some of the properties of HIBE are not quite fitting for public key broadcast schemes. In this paper, we proposed new converting method and an efficient public key broadcast encryption scheme Pub-PI which is obtained by adapting the new converting method to the PI scheme [10]. The transmission overhead of the Pub-PI is approximately 3r, where r is the number of revoked users. The storage size of Pub-PI is O($c^2$), where c is a system parameter of PI and the computation cost is 2 pairing computations.

Restoring Turbulent Images Based on an Adaptive Feature-fusion Multi-input-Multi-output Dense U-shaped Network

  • Haiqiang Qian;Leihong Zhang;Dawei Zhang;Kaimin Wang
    • Current Optics and Photonics
    • /
    • 제8권3호
    • /
    • pp.215-224
    • /
    • 2024
  • In medium- and long-range optical imaging systems, atmospheric turbulence causes blurring and distortion of images, resulting in loss of image information. An image-restoration method based on an adaptive feature-fusion multi-input-multi-output (MIMO) dense U-shaped network (Unet) is proposed, to restore a single image degraded by atmospheric turbulence. The network's model is based on the MIMO-Unet framework and incorporates patch-embedding shallow-convolution modules. These modules help in extracting shallow features of images and facilitate the processing of the multi-input dense encoding modules that follow. The combination of these modules improves the model's ability to analyze and extract features effectively. An asymmetric feature-fusion module is utilized to combine encoded features at varying scales, facilitating the feature reconstruction of the subsequent multi-output decoding modules for restoration of turbulence-degraded images. Based on experimental results, the adaptive feature-fusion MIMO dense U-shaped network outperforms traditional restoration methods, CMFNet network models, and standard MIMO-Unet network models, in terms of image-quality restoration. It effectively minimizes geometric deformation and blurring of images.

Performance Optimization of Two-Way AF Relaying in Asymmetric Fading Channels

  • Qi, Yanyan;Wang, Xiaoxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권12호
    • /
    • pp.4432-4450
    • /
    • 2014
  • It is widely observed that in practical wireless cooperative communication systems, different links may experience different fading characteristics. In this paper, we investigate into the outage probability and channel capacity of two-way amplify-and-forward (TWAF) relaying systems operating over a mixed asymmetric Rician and Rayleigh fading scenario, with different amplification policies (AP) adopted at the relay, respectively. As TWAF relay network carries concurrent traffics towards two opposite directions, both end-to-end and overall performance metrics were considered. In detail, both uniform exact expressions and simplified asymptotic expressions for the end-to-end outage probability (OP) were presented, based on which the system overall OP was studied under the condition of the two source nodes having non-identical traffic requirements. Furthermore, exact expressions for tight lower bounds as well as high SNR approximations of channel capacity of the considered scenario were presented. For both OP and channel capacity, with different APs, effective power allocation (PA) schemes under different constraints were given to optimize the system performance. Extensive simulations were carried out to verify the analytical results and to demonstrate the impact of channel asymmetry on the system performance.

익명성을 보장하는 비대칭 공개키 공모자 추적 기법 (An Anonymous asymmetric public key traitor tracing scheme)

  • 최은영;이동훈;홍도원
    • 정보보호학회논문지
    • /
    • 제14권3호
    • /
    • pp.49-61
    • /
    • 2004
  • 브로드캐스트 암호화 스킴에서, 추적 가능성은 권한을 부여받은 사용자들 중에 불법 디코더를 생성하는데 공모한 사용자들을 추적하기 위한 프로토콜에 유익하게 이용되는 성질이다. 유감스럽게도, 이 성질은 대개의 경우 프라이버시를 희생하여 성취된다. 현재까지 대부분의 공모자 추적 기법은 사용자의 익명성을 고려하지 않은 상태에서 연구가 진행되어 왔다. 이것은 현실 세계 시장에서와 유사한 프라이버시를 전자 상거래에서 제공하기 위한 중요한 요구사항이다 하지만 멀티미디어 컨텐츠를 구매하기 위해 사용자의 신원이 노출된다면 사용자에게는 불만족스러운 일이다. 본 논문에서는 멀티미디어 컨텐츠를 구매하는 과정에서 사용자의 취미, 생활 정보, 신원 정보 등에 대한 정보를 누출시키지 않으면서 사용자가 익명으로 멀티미디어 컨텐츠를 구매할 수 있고, 동시에 데이터 제공자가 공모자를 추적하고자 할 경우에는 사용자의 신원을 알아낼 수 있는 익명성을 보장하는 암호화 기법을 제안한다.

멀티미디어 콘텐츠 보호를 위한 SOAP을 이용한 키 전송 시스템 설계 (Design of a Key Transfer System Using SOAP for Multimedia Contents Protection)

  • 이근왕;김정재
    • 한국산학기술학회논문지
    • /
    • 제9권1호
    • /
    • pp.108-113
    • /
    • 2008
  • 본 논문에서는 멀티미디어 콘텐츠를 여러개의 블록으로 나누어 끊김이 없는 2중 버퍼 알고리즘을 통해 복호화가 가능하도록 설계하여, 하나의 키가 유출되어도 동영상 전체를 복호화 하지 못하도록 하여 기존의 시스템보다 보안성이 높은 암호화 방법을 제안한다. 또한 시스템간의 상호 인증을 수행할 수 있도록 전자서명과 공개키 알고리즘을 사용하여 콘텐츠 암호화에 사용된 암호화키를 암호화하여 SOAP 메시지를 통해 전송해주는 시스템을 제안한다.

Efficient key generation leveraging wireless channel reciprocity and discrete cosine transform

  • Zhan, Furui;Yao, Nianmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권5호
    • /
    • pp.2701-2722
    • /
    • 2017
  • Key generation is essential for protecting wireless networks. Based on wireless channel reciprocity, transceivers can generate shared secret keys by measuring their communicating channels. However, due to non-simultaneous measurements, asymmetric noises and other interferences, channel measurements collected by different transceivers are highly correlated but not identical and thus might have some discrepancies. Further, these discrepancies might lead to mismatches of bit sequences after quantization. The referred mismatches significantly affect the efficiency of key generation. In this paper, an efficient key generation scheme leveraging wireless channel reciprocity is proposed. To reduce the bit mismatch rate and enhance the efficiency of key generation, the involved transceivers separately apply discrete cosine transform (DCT) and inverse discrete cosine transform (IDCT) to pre-process their measurements. Then, the outputs of IDCT are quantified and encoded to establish the bit sequence. With the implementations of information reconciliation and privacy amplification, the shared secret key can be generated. Several experiments in real environments are conducted to evaluate the proposed scheme. During each experiment, the shared key is established from the received signal strength (RSS) of heterogeneous devices. The results of experiments demonstrate that the proposed scheme can efficiently generate shared secret keys between transceivers.

Dynamic Kinetic Resolutions and Asymmetric Transformations by Enzyme-Metal Combo Catalysis

  • Kim, Mahn-Joo;Ahn, Yang-Soo;Park, Jai-Wook
    • Bulletin of the Korean Chemical Society
    • /
    • 제26권4호
    • /
    • pp.515-522
    • /
    • 2005
  • Enzyme-metal combo catalysis is described as a useful methodology for the synthesis of optically active compounds. The key point of the method is the use of enzyme and metal in combination as the catalysts for the complete transformation of racemic substrates to single enantiomeric products through dynamic kinetic resolution (DKR). In this approach, enzyme acts as an enantioselective resolving catalyst and metal does as a racemizing catalyst for the efficient DKR. Three kinds of enzyme-metal combinations - lipase-ruthenium, subtilisin-ruthenium, and lipase-palladium –have been developed as the catalysts for the DKRs of racemic alcohols, esters, and amines. The scope of the combination catalysts can be extended to the asymmetric transformations of ketones, enol acetates, and ketoximes via the DKRs. In most cases studied, enzyme-metal combo catalysis provided enantiomerically-enriched products in high yields.