• Title/Summary/Keyword: Communication Cost

Search Result 3,196, Processing Time 0.027 seconds

A Method for Detecting the Exposure of an OCSP Responder's Session Private Key in D-OCSP-KIS (D-OCSP-KIS에서 OCSP Responder의 세션 개인키의 노출을 검출하는 방법)

  • Lee, Young-Gyo;Nam, Jung-Hyun;Kim, Jee-Yeon;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.83-92
    • /
    • 2005
  • D-OCSP-KIS proposed by Koga and Sakurai not only reduces the number or OCSP Responder's certificate but also criers the certificate status validation about OCSP Responder to the client. Therefore, D-OCSP-KIS is an effective method that can reduce the communication cost, computational time and storage consumption in client, but it has some problems. In case an attacker accidentally acquires an OCSP Responder's session private key in a time period (e.g., one day), she can disguise as the OCSP Responder in the time period unless the OCSP Responder recognizes. She can offer the wrong response to the client using the hash value intercepted. And the server and user on I-commerce can have a serious confusion and damage. And the computation and releasing of hash chain can be a load to CA. Thus, we propose a method detecting immediately the exposure of an OCSP Responder's session private key and the abuse of hash value in D-OCSP-KIS.

A New Efficient Private Key Reissuing Model for Identity-based Encryption Schemes Including Dynamic Information (동적 ID 정보가 포함된 신원기반 암호시스템에서 효율적인 키 재발급 모델)

  • Kim, Dong-Hyun;Kim, Sang-Jin;Koo, Bon-Seok;Ryu, Kwon-Ho;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.23-36
    • /
    • 2005
  • The main obstacle hindering the wide deployment of identity-based cryptosystem is that the entity responsible for creating the private key has too much power. As a result, private keys are no longer private. One obvious solution to this problem is to apply the threshold technique. However, this increases the authentication computation, and communication cost during the key issuing phase. In this paper, we propose a new effi ient model for issuing multiple private keys in identity-based encryption schemes based on the Weil pairing that also alleviates the key escrow problem. In our system, the private key of a user is divided into two components, KGK (Key Description Key) and KUD(Key Usage Desscriptor), which are issued separately by different parties. The KGK is issued in a threshold manner by KIC (Key Issuing Center), whereas the KW is issued by a single authority called KUM (Key Usage Manager). Changing KW results in a different private key. As a result, a user can efficiently obtain a new private key by interacting with KUM. We can also adapt Gentry's time-slot based private key revocation approach to our scheme more efficiently than others. We also show the security of the system and its efficiency by analyzing the existing systems.

Identity-Based Online/Offline Signcryption Without Random Oracles (ID기반 온라인/오프라인 사인크립션(Signcryption) 기법)

  • Park, Seung-Hwan;Kim, Ki-Tak;Koo, Woo-Kwon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.23-36
    • /
    • 2010
  • Signcryption is a cryptographic primitive which offers authentication and confidentiality simultaneously with a cost lower than signing and encrypting the message independently. We propose a new cryptographic notion called Identity-based online/offline signcryption. The notion of online/offline scheme can be divided into two phases, the first phase is performed offline prior to the arrival of a message to be signed or encrypted and the second phase is performed online phase after knowing the message and the public key of recipient. The Online phase does not require any heavy computations such as pairings or exponents. It is particularly suitable for power-constrained devices such as smart cards. In this paper, we propose ID-based signcryption scheme and ID-based online/offline signcryption scheme where the confidentiality and authenticity are simultaneously required to enable a secure and trustable communication environment. To our best knowledge, this is the first ID-based online/offline signcryption scheme that can be proven secure in the standard model.

IoT-Based Device Utilization Technology for Big Data Collection in Foundry (주물공장의 빅데이터 수집을 위한 IoT 기반 디바이스 활용 기술)

  • Kim, Moon-Jo;Kim, DongEung
    • Journal of Korea Foundry Society
    • /
    • v.41 no.6
    • /
    • pp.550-557
    • /
    • 2021
  • With the advent of the fourth industrial revolution, the interest in the internet of things (IoT) in manufacturing is growing, even at foundries. There are several types of process data that can be automatically collected at a foundry, but considerable amounts of process data are still managed based on handwriting for reasons such as the limited functions of outdated production facilities and process design based on operator know-how. In particular, despite recognizing the importance of converting process data into big data, many companies have difficulty adopting these steps willingly due to the burden of system construction costs. In this study, the field applicability of IoT-based devices was examined by manufacturing devices and applying them directly to the site of a centrifugal foundry. For the centrifugal casting process, the temperature and humidity of the working site, the molten metal temperature, and mold rotation speed were selected as process parameters to be collected. The sensors were selected in consideration of the detailed product specifications and cost required for each process parameter, and the circuit was configured using a NodeMCU board capable of wireless communication for IoT-based devices. After designing the circuit, PCB boards were prepared for each parameter, and each device was installed on site considering the working environment. After the on-site installation process, it was confirmed that the level of satisfaction with the safety of the workers and the efficiency of process management increased. Also, it is expected that it will be possible to link process data and quality data in the future, if process parameters are continuously collected. The IoT-based device designed in this study has adequate reliability at a low cast, meaning that the application of this technique can be considered as a cornerstone of data collecting at foundries.

Study on the ICT Device Safety System Application Examples in Mines (광산에서의 ICT 장비 활용 및 안전시스템 운용 사례 연구)

  • Kim, Seung-Jun;Ko, Young-Hun;Kim, Jung-Gyu;Seo, Man-Keun;Kim, Jong-Gwan
    • Tunnel and Underground Space
    • /
    • v.32 no.3
    • /
    • pp.194-202
    • /
    • 2022
  • An increased number of cases have occurred in applying ICT technology in the resource development field due to factors such as safety, eco-friendliness, and low cost since the 2000s. In Korea, the 2nd mining master plan specified the significance of converging the full cycle of mining and ICT, while the 3rd mining master plan highlighted ICT and smart mining such as supporting the supply of an ICT mining device and introducing demonstrational smart mining. This study introduces the application of an ICT device and safety system operation in the Jangseong underground mine of Korea Cement Co., Ltd. Currently, Jangseong mine combines two different kinds of 3D equipment including the handheld 3D scanner and multi-station that provides both the measurement and 3D scanning to perform a 3D measurement of the mine. Taken from the 3D measurement of the mine, it is now possible to identify any hazardous areas and abnormalities in different directions and analyze the safety of the crown pillar between two stopes in different level. Besides, the real-time location tracking and communications system have established highly efficient rescue and evacuation plans to effectively deal with any accidents in the mine.

Legal Issues for the Implementation of Non-Face-to-Face Treatment (비대면진료 실행을 위한 법적 쟁점)

  • Kwon, Ohtak
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.3
    • /
    • pp.47-87
    • /
    • 2022
  • Due to the COVID-19 pandemic, non-face-to-face treatment was temporarily permitted. A lot of consensus has been formed on the need to continuous non-face-to-face treatment. However, the current 「Medical Service Act」 only permits telemedicine between doctors and medical personnel. On the other hand, as a result of legal interpretation, there is an opinion that non-face-to-face treatment is allowed. But considering the overall legal system, non-face-to-face treatment is not allowed. Nevertheless, we have to consider the reality such as the development of science and technology and the outbreak of infectious diseases. Therefore, it is not advisable to allow face-to-face treatment only. Ultimately, it is necessary to find ways to ensure that non-foce-to-face treatment can be performed in a safe and effective manner. And it should be institutionalized. This is strategically necessary and important. Therefore, we must look over ahead legal issues to be discussed. First of all, the scope, the target disease and the subject of implement have to be clear. Also, structurally, the standards of facilities and equipment must be prepared for non-face-to-face treatment to be implemented. Functionally, communication and information exchange between doctors and patients should be well conducted. In addition, the information protection management system that occurs in the process of non-face-to-face treatment should be materialized. Lastly, the issue of responsibility and cost of non-face-to-face treatment should be decided in detail. When these problems materialize, it can be expected that a safe non-face-to-face treatment environment will be established.

Important Facility Guard System Using Edge Computing for LiDAR (LiDAR용 엣지 컴퓨팅을 활용한 중요시설 경계 시스템)

  • Jo, Eun-Kyung;Lee, Eun-Seok;Shin, Byeong-Seok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.10
    • /
    • pp.345-352
    • /
    • 2022
  • Recent LiDAR(Light Detection And Ranging) sensor is used for scanning object around in real-time. This sensor can detect movement of the object and how it has changed. As the production cost of the sensors has been decreased, LiDAR begins to be used for various industries such as facility guard, smart city and self-driving car. However, LiDAR has a large input data size due to its real-time scanning process. So another way for processing a large amount of data are needed in LiDAR system because it can cause a bottleneck. This paper proposes edge computing to compress massive point cloud for processing quickly. Since laser's reflection range of LiDAR sensor is limited, multiple LiDAR should be used to scan a large area. In this reason multiple LiDAR sensor's data should be processed at once to detect or recognize object in real-time. Edge computer compress point cloud efficiently to accelerate data processing and decompress every data in the main cloud in real-time. In this way user can control LiDAR sensor in the main system without any bottleneck. The system we suggest solves the bottleneck which was problem on the cloud based method by applying edge computing service.

A Multi-speaker Speech Synthesis System Using X-vector (x-vector를 이용한 다화자 음성합성 시스템)

  • Jo, Min Su;Kwon, Chul Hong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.675-681
    • /
    • 2021
  • With the recent growth of the AI speaker market, the demand for speech synthesis technology that enables natural conversation with users is increasing. Therefore, there is a need for a multi-speaker speech synthesis system that can generate voices of various tones. In order to synthesize natural speech, it is required to train with a large-capacity. high-quality speech DB. However, it is very difficult in terms of recording time and cost to collect a high-quality, large-capacity speech database uttered by many speakers. Therefore, it is necessary to train the speech synthesis system using the speech DB of a very large number of speakers with a small amount of training data for each speaker, and a technique for naturally expressing the tone and rhyme of multiple speakers is required. In this paper, we propose a technology for constructing a speaker encoder by applying the deep learning-based x-vector technique used in speaker recognition technology, and synthesizing a new speaker's tone with a small amount of data through the speaker encoder. In the multi-speaker speech synthesis system, the module for synthesizing mel-spectrogram from input text is composed of Tacotron2, and the vocoder generating synthesized speech consists of WaveNet with mixture of logistic distributions applied. The x-vector extracted from the trained speaker embedding neural networks is added to Tacotron2 as an input to express the desired speaker's tone.

Design and Implementation of Virtual Reality Prototype Crane Training System using Unity 3D (Unity 3D를 이용한 가상현실 프로토타입 크레인 훈련 시스템 설계 및 구현)

  • Heo, Seok-Yeol;Kim, Geon-Young;Choi, Jung-Bin;Park, Ji-Woo;Jeon, Min-Ji;Lee, Wan-Jik
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.569-575
    • /
    • 2022
  • It is most desirable to build a crane training program in the same evvironment as the actual port, but it has problem such as time constraint and cost. To overcome these limitations, next-generation training programs based on AR/VR are receiving a lot of attention. In this paper, a prototype of a harbor crane training system based on virtual reality was designed and implemented. The system implemented in this paper consists of two elements: an Arduino-based IoT terminal and an HMD equipped with a Unity application program. The IoT terminal consists of 2 controllers, 2 toggle switches, and 8 button switches to process data generated according to the user's operation. The HMD uses Oculus Quest2 and is connected to the IoT terminal through wireless communication to provide user convenience. The training system implemented in this paper is expected to provide trainees with a training environment independent of time and place through virtual reality and to save time and money.

Post-Quantum Security Strength Evaluation through Implementation of Quantum Circuit for SIMECK (SIMEC 경량암호에 대한 양자회로 구현 및 Post-Quantum 보안 강도 평가)

  • Song Gyeong Ju;Jang Kyung Bae;Sim Min Joo;Seo Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.181-188
    • /
    • 2023
  • Block cipher is not expected to be safe for quantum computer, as Grover's algorithm reduces the security strength by accelerating brute-force attacks on symmetric key ciphers. So it is necessary to check the post-quantum security strength by implementing quantum circuit for the target cipher. In this paper, we propose the optimal quantum circuit implementation result designed as a technique to minimize the use of quantum resources (qubits, quantum gates) for SIMECK lightweight cryptography, and explain the operation of each quantum circuit. The implemented SIMECK quantum circuit is used to check the estimation result of quantum resources and calculate the Grover attack cost. Finally, the post-quantum strength of SIMECK lightweight cryptography is evaluated. As a result of post-quantum security strength evaluation, all SIMECK family cipher failed to reach NIST security strength. Therefore, it is expected that the safety of SIMECK cipher is unclear when large-scale quantum computers appear. About this, it is judged that it would be appropriate to increase the block size, the number of rounds, and the key length to increase the security strength.