• 제목/요약/키워드: Cyber identity

검색결과 98건 처리시간 0.021초

래티스에서 ID 기반의 이행성 서명 기법 (Identity-Based Transitive Signature Scheme from Lattices)

  • 노건태;천지영
    • 정보보호학회논문지
    • /
    • 제31권3호
    • /
    • pp.509-516
    • /
    • 2021
  • 이행성 서명 기법은 이행적으로 닫혀있는 그래프에서 간선들을 인증하는 경우 매우 유용하게 사용될 수 있는 기법이다. 다시 말하면, 간선 (i, j)에 대한 인증 값이 있고, 간선 (j, k)에 대한 인증 값이 있을 때, 해당 인증 값을 이행성 서명을 통해 생성하게 되면 간선 (i, k)에 대한 인증 값도 별도의 인증 절차 없이 바로 계산할 수 있게 된다. 본 논문에서 우리는 공개키가 난수 형태가 아닌, ID 구조를 가지는 이행성 서명 기법을 처음으로 설계한다. 우리가 설계한 기법은 래티스의 어려운 문제에 기반을 두고 설계되었다.

사이버 시대의 디자인 지형 (A Topography of Design in Cyber Age)

  • 오창섭
    • 디자인학연구
    • /
    • 제12권1호
    • /
    • pp.39-48
    • /
    • 1999
  • 전통적 의미의 산업디자인은 산업혁명으로부터 시작된 기계적 생산양식에 그 바탕을 두고 있다. 그런데 최근 컴퓨터와 관련 기술들의 발달에 따른 새로운 매체들의 등장으로 전통적 의미의 디자인은 정체성의 혼란을 경험하고 있다. '사이버'라고 불리는 새로운 흐름은 산업혁명의 기계적 생산양식이 수공예적 생산양식의 여러 가정들을 파괴한 것처럼 기계적 생산양식의 가정들에 대해 의문을 제기하고 있는 것이다. 본 논문은 어떻게 컴퓨터, 그리고 가상실제와 같은 새로운 매체들의 등장이 삶의 환경과 생활 주체들의 감수성을 변화시키고, 또한 디자인의 모습을 변화시키는지에 대한 연구이다. 논문은 사이버공간과 문화, 이미지와 텍스트, 가상과 실재, 정체성 등의 논의를 통해 기계적 생산양식에 바탕을 둔 소재 중심적 경계 구분을 통해 기계적 생산양식에 바탕을 둔 소재 중심적 경계 구분을 해체하고 변화하는 시대의 디자인 지형과 정체성을 구체적으로 찾아 나서고 있다.

  • PDF

패션에 표현된 가상성 (Virtuality in Fashion)

  • 이민선
    • 한국의류학회지
    • /
    • 제25권5호
    • /
    • pp.981-990
    • /
    • 2001
  • The purpose of this study is to review the concept of virtuality and analyze in which way virtuality is expressed in fashion. As for the research methodology, literary research was undertaken to study psychoanalytical and socioeconomic contexts in which virtuality has been formed. In addition, demonstrative studies on styles were undertaken through the analysis of photos in modern fashion magazine. With the explosive diffusion of the Internet since the 1990s, people have created a new identity in cyber space. Indeed, computers have made it possible for human beings to make virtual bodies in any way they want. Through the experiment of creating the figures that they dreamed of in their childhood buy could not embody in their actual life, people are making up for their narcissistic ego of their childhood. With the advent of the cyber society, dreams have been realized in cyber space, which in turn has influenced reality and finally had an effect on fashion. In cyber space, People try to break away from their bodies by combining elements of a different nature from them. They are dying hair and skin, and using holographic fabric for fashion, metallic color and geometric pattern for cosmetics. In pursuit of omnipotent beings, people have depicted models as flying in a weightless state and floating in the water within dress of undefined silhouette, so that they can be shown as transcending the law of nature. Furthermore, a variety of cultures newly appearing as dominant in cyber space have constantly interacted with actual life and formed an collage of heterogeneous cultures in fashion.

  • PDF

A Study on the Quantified Point System for Designation of Personal Identity Proofing Service Provider based on Resident Registration Number

  • Kim, JongBae
    • International journal of advanced smart convergence
    • /
    • 제11권4호
    • /
    • pp.20-27
    • /
    • 2022
  • In this paper, we propose to improve the designation examination criteria of agencies that provide personal identity proofing based on the resident registration number (RRN), a 13-digit number uniquely assigned by the government to identify Korean citizens. In online commerce, etc., the personal identity proofing agency (PIPA) is a place where online users can prove their personal identity by presenting an alternative means instead of their RRN. The designation examination criteria for PIPAs established in 2012 is a revision of the relevant current laws, and there is a problem in applying the designation examination for alternative means of RRN as the current examination standard. Therefore, in this paper, we propose a method to make the current examination criteria applicable to the newly designated examination of the personal identity proofing service provider based on the current RRN alternative method. According to the current designation examination criteria, only those who satisfy all the examination criteria are designated as the PIPA. However, in reality, it is not in line with the purpose of regulatory reform to require that all examination criteria be satisfied. In the proposed method, it is proposed to apply the standard score system for designation of PIPAs, to make the law current, to secure legal compliance, and to establish a new examination standard to provide a new alternative means of personal identity proofing service. By applying the proposed method to the PIPA designation examination, various alternative means of RRN can be utilized in the online commerce service market.

미국의 '백인성'(whiteness)의 확장성 및 배타성 고찰 (A Study on Expandability and Exclusiveness of American 'Whiteness of America')

  • 이수영
    • 미국학
    • /
    • 제42권2호
    • /
    • pp.1-29
    • /
    • 2019
  • The recent census project that non-Hispanic White will be minority in thirty years has been accepted by the conservative media and politicians as the factor that threatens the authentic American national identity. The concerns about the majority-minority population chance influenced the election of Donald Trump who explicitly claimed the restriction of immigration, promising strong controls over the entry of undocumented immigrants. In the process, 'white-nationalism' based on the connection of racial whites and authentic American identity has been central issues in American society. In this sense, this paper examines who has been included/excluded from 'racial Whites' throughout the American history relating to the American identity politics and how these processes have shown the covert strategies of the whites for maintaining their privileges.

청소년의 자아존중감과 웹 사이버문화 - 온라인 게임의 아바타 사용자 중심으로 - (Self-esteem of Adolescents and Web Cyber Culture Style - the Users' Avatars of Online Game -)

  • 이향재;한지숙
    • 한국콘텐츠학회논문지
    • /
    • 제9권1호
    • /
    • pp.197-204
    • /
    • 2009
  • 본 연구는 청소년의 현실적 자아존중감과 아바타에 대한 그들의 의식을 연구하였다. 청소년들의 웹 가상문화에 대한 독특한 삶의 방식을 근본적인 측면에서 이해하려는 의도이다. 청소년기는 자아존중감 형성에 중요한 시점으로 웹 문화가 청소년의 심리적 작용에 영향을 미치는 중요한 요인으로 작용하고 있기 때문이다. 연구방법은 유저의 자존감과 아바타에 대한 호감도 그리고 타인의 아바타에 대한 의식을 분석하여 그들의 심리 사회적 성숙도를 알아보았다. 연구결과는 청소년의 현실적 자아존중감이 높을수록 웹사이버문화의 아바타에 대한 호감도가 높게 상승하고 타인의 아바타를 인식하는 태도도 상승하는 것으로 나왔다. 이러한 결과는 청소년들은 자기소유의 아바타에도 자기에 못지않은 자존감을 형성하고 있는 것으로 볼 수 있다. 따라서 청소년의 자존감 형성과 수준 여하에 따라 건전한 웹 사이버문화가 형성될 수 있는 심리적 성숙면의 자아정체감(self identity)의 중요성이 인식된다.

An Escrow-Free Two-party Identity-based Key Agreement Protocol without Using Pairings for Distinct PKGs

  • Vallent, Thokozani Felix;Yoon, Eun-Jun;Kim, Hyunsung
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제2권3호
    • /
    • pp.168-175
    • /
    • 2013
  • Key escrow is a default property that is inherent in identity-based cryptography, where a curious private key generator (PKG) can derive a secret value shared by communicating entities in its domain. Therefore, a dishonest PKG can encrypt and decrypt ciphers or can carry out any attack on the communicating parties. Of course, the escrow property is not completely unwanted but is acceptable in other particular applications. On the other hand, in more civil applications, this key escrow property is undesirable and needs to be removed to provide maximum communication privacy. Therefore, this paper presents an escrow-free identity-based key agreement protocol that is also applicable even in a distinct PKG condition that does not use pairings. The proposed protocol has comparable computational and communicational performance to many other protocols with similar security attributes, of which their security is based on costly bilinear pairings. The protocol's notion was inspired by McCullagh et al. and Chen-Kudla, in regard to escrow-free and multi-PKG key agreement ideas. In particular, the scheme captures perfect forward secrecy and key compromise impersonation resilience, which were lacking in McCullagh et al.'s study, as well as all other desirable security attributes, such as known key secrecy, unknown key-share resilience and no-key control. The merit in the proposed protocol is the achievement of all required security requirements with a relatively lower computational overhead than many other protocols because it precludes pairings.

  • PDF

Study on the Civil Legal Remedies against Cyber Defamation

  • Park, Jong-Ryeol
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권3호
    • /
    • pp.93-100
    • /
    • 2018
  • Cyber defamation is the act of damaging the reputation of the other person on the Internet, and the act of attacking by the commenting the article through a word or blog. The reason why punishment is stronger than general contempt is that the nature of crime about defamation is worse than contempt. Also, punishment intensity is higher than defamation because the nature of cyber information spreads widely. Honor is not only a question of self-esteem or identity, but also a function that economically reduces the cost of seeking information or socially trustworthy. Through these two functions, it has been developed as a legal system to protect the honor as well as asking the legal sanction for defamation. However, although honor is used in various meanings in everyday life, the honor of legal level is understood in a more limited sense. It is because the law cannot actively lead and protect all honor feelings for one's feelings or mood occurred by hurt. However, if the social evaluation of a group or individual is undermined through a certain distortion of the truth, the law will actively intervene. However, due to the ambiguity of the legal sanctions standards and the identification of the parties involved in the defamation of cyberspace, it was difficult to solve the problems related to defamation in fact. Therefore, this paper will try to find out the problems of civil legal remedy due to the cyber defamation, and seek a solution for civil legal remedy.

사이버영재교육을 위한 교수-학습 모형의 개발 및 검증 (Development and Validation of Teaching-Learning Model for Cyber Education of Giftedness)

  • 이재호;홍창의
    • 영재교육연구
    • /
    • 제19권1호
    • /
    • pp.119-140
    • /
    • 2009
  • 영재교육진흥법에 의거 영재교육의 양적 확대라는 취지에서 사이버영재교육이 본격적으로 시행되고 있지만 그 중요성에 비해 사이버영재교육에 대한 운영 및 교육방법 등과 같은 이슈들에 대한 연구가 미비한 상황이다. 이에 본 논문에서는 현재 운영 중인 영재교육기관과 관련 교육법 등을 비교 분석하여 사이버영재교육원에 대한 개념을 새롭게 정의하고, 사이버공간에서 효율적으로 적용 가능한 사이버영재교육용 교수-학습 모형과 투입전략을 개발하였다. 개발된 사이버영재교육 교수-학습 모형과 투입전략에 대한 검증을 위하여 2008년 경기도 사이버영재교육지원 센터 초등정보반학생들을 대상으로 각 모형과 전략별로 만족도와 참여도를 조사 분석하였다.

An Improvement of Certification-based One-Round Tripartite Key Agreement Protocols

  • Mtong, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제2권5호
    • /
    • pp.297-301
    • /
    • 2013
  • Key agreement protocols allow multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. Since Joux first published the pairing-based one round tripartite key agreement protocol, many authenticated protocols have been proposed. Unfortunately, many of them have been broken while others have been shown to be deficient in some desirable security attributes. In 2004, Cheng et al. presented two protocols aimed at strengthening Shim's certificate-based and Zhang et al.'s tripartite identity-based protocols. This paper reports that 1) In Cheng et al.'s identity-based protocol, an adversary can extract long-term private keys of all the parties involved; and 2) Cheng et al.'s certification-based protocol is weak against key integrity attacks. This paper suggests possible remedies for the security flaws in both protocols and then presents a modified Cheng et al.'s identity-based, one-round tripartite protocol that is more secure than the original protocol.

  • PDF