• Title/Summary/Keyword: Group Key

Search Result 2,566, Processing Time 0.027 seconds

A new discrete logarithm problem with public parameter key-size reduction (공개 파라메터 키 크기를 줄인 새로운 이산대수문제)

  • 박영호;오상호;주학수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.91-98
    • /
    • 2003
  • We introduce a new public key system based on the discrete logarithm Problem(DLP) in a quotient group of finite fields. This system achieves savings not only in communication overhead by reducing public key size and transfer data by half but also in computational costs by performing efficient exponentiation. In particular, this system takes about 50% speed-up, compared to DSA which has the same security.

Group Key Management Scheme for Access Control with Reactive Approach (접근 제어를 위한 반응적 방식의 그룹키 관리 기법)

  • Kim, Hee-Youl;Lee, Youn-Ho;Park, Yong-Su;Yoon, Hyun-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.11
    • /
    • pp.589-598
    • /
    • 2007
  • In the group communication which has multiple data streams and various access privileges, it is necessary to provide group access control. The group members having the same access privilege are classified into one class, and the classes form a hierarchy based on the access relations. Then each class is assigned to a secret key. In the previous schemes, a single logical key graph is constructed from the hierarchy and each member always holds all secret keys of the classes he can access in the proactive manner. Thus, higher-privileged members hold more keys then lower-privileged members. However, if the hierarchy is large, each member manages too many keys and the size of multicast message in rekeying increases in proportion to the size of the hierarchy. Moreover, most of the members access a small portion of multiple data streams simultaneously. Therefore, it is redundant to receive rekeying message and update the keys in which he is not currently interested. In this paper, we present a new key management scheme that takes a reactive approach in which each member obtains the key of a data stream only when he wants to access the stream. Each member holds and updates only the key of the class he belongs. If he wants to get the key of other class, he derives it from his key and the public parameter. Proposed scheme considerable reduces the costs for rekeying, especially in the group where access relations are very complex and the hierarchy is large. Moreover, the scheme has another advantage that it easily reflects the change of access relations.

A Novel Key Sharing Fuzzy Vault Scheme

  • You, Lin;Wang, Yuna;Chen, Yulei;Deng, Qi;Zhang, Huanhuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4585-4602
    • /
    • 2016
  • A novel key sharing fuzzy vault scheme is proposed based on the classic fuzzy vault and the Diffie-Hellman key exchange protocol. In this proposed scheme, two users cooperatively build their fuzzy vault for their shared key using their own biometrics. Either of the users can use their own biometrics to unlock the fuzzy vault with the help of the other to get their shared key without risk of disclosure of their biometrics. Thus, they can unlock the fuzzy vault cooperatively. The security of our scheme is based on the security of the classic fuzzy vault scheme, one-way hash function and the discrete logarithm problem in a given finite group.

Key motivating factors affecting skilled workers' productivity in Construction projects

  • Enshassi, Adnan;Mahdi, Mahdi
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.142-146
    • /
    • 2015
  • Human resources development is considered a critical issue for improving productivity of workers in construction industry. The aim of this study is to identify and rank the key motivating factors that impact skilled workers productivity according to their relative importance. A total of 27 factors were identified through a literature review, which were categorized into 2 group financial and un-financial motivators. A questionnaire instrument was adopted in this study. The study revealed that the most significant group which affected skilled workers' productivity in construction projects was financial group with the recognition of the un-financial group importance. The results emphasized that the financial group has an edge over the un-financial group which reflect the priority of need for the respondents. The results indicated that the un-financial group represents a backbone in its importance after the financial group which reflects that un-financial factors can improve productivity. The findings showed that the provision of companies to safety conditions factor such as protective safety clothing and protective equipment was ranked very low by the respondents. This is due to the dominant culture of the workers as well as the lack of their awareness regarding their own safety and lack of companies' interest in safety and health for workers. Construction companies are advised to take the key motivating factors obtained from the results of this study into serious consideration in order to improve the satisfaction of their workers and improve their productivity.

  • PDF

The Effect of Project Method on the Key Competencies on the unit of "Making Model by Architecture" in the Vocational High Schools (특성화 고등학교 '건축모형제작' 단원에서 프로젝트법을 적용한 수업이 직업기초능력 향상에 미치는 효과)

  • Hwang, Dong-Un;Choi, Ji-Yeon
    • 대한공업교육학회지
    • /
    • v.37 no.1
    • /
    • pp.125-143
    • /
    • 2012
  • This study aimed to identify the effect of the instruction applied with a project method for the 'Making Model by Architecture' unit in vocational High schools on the improvement of the Key competences. With this aim, the study selected as an experimental group, control group third graders in two classroom in G vocational High Schools in Goyang, Gyeonggi-do. Aiming at the selected students in the experimental group and the control group, the study conducted a pre-test of their Key competences; thus, the study confirmed that there was no statistically significant difference. Then, the study offered a class applied with a project method to the experimental group, while offering a traditional instruction to the control group. After offering the class, the study undertook a post-test, and verified the effect. In order to prove the test result, the study carried out a Hest using the SPSSWIN 12.0 statistical program, while the significance level being ${\alpha}$<.05. The conclusions obtained from this study include the following. All the six selected areas including 'problem-solving skills', 'communication skills', 'resource utilization competence', 'mathematical competence', 'interpersonal management competence' and 'self-management competence', which were supposed to be appropriate for this study among the sub-areas of Key competences, were found to show significant differences between the experimental group applied with a project method and the control group as a result of the post-test of the two groups. In summarizing the above research results, the class using a project method for the 'Making Model by Architecture' unit was discovered to be effective for improving Key competences. In particular, it may be more effective learning method for enhancing six areas greatly relevant to the project method among various sub-areas of Key competences.

Correlation analysis of muscle amino acid deposition and gut microbiota profile of broilers reared at different ambient temperatures

  • Yang, Yuting;Gao, Huan;Li, Xing;Cao, Zhenhui;Li, Meiquan;Liu, Jianping;Qiao, Yingying;Ma, Li;Zhao, Zhiyong;Pan, Hongbin
    • Animal Bioscience
    • /
    • v.34 no.1
    • /
    • pp.93-101
    • /
    • 2021
  • Objective: Temperature could influence protein and amino acid deposition as well as gut microbiota profile and composition. However, the specific effects of ambient temperature on amino acids deposition and gut microbiota composition remain insufficiently understood. Methods: A total of 300 one-day-old Avian broilers were randomly divided into three groups and reared at high, medium, and low temperature (HT, MT, and LT), respectively. Breast muscle and fecal samples were collected for amino acid composition analysis and 16S rRNA gene sequence analysis. Results: Our data showed that compared to the MT group, there was a decrease of muscle leucine and tyrosine (p<0.05), as well as an increase of methionine in the HT group (p<0.05) and a decrease of serine in the LT group. Examination of microbiota shift revealed that at genus level, the relative abundance of Turicibacter and Parabacteroides was increased in the HT group (p<0.05) and that the relative abundances of Pandoraea, Achromobacter, Prevotella, Brevundimonas, and Stenotrophomonas in the LT group were higher than those in the MT group (p<0.05). In addition, there were substantial correlations between microbes and amino acids. In the HT group. Turicibacter was negatively correlated with aspartic acid and tyrosine, whereas Parabacteroides was positively correlated with methionine (p<0.05). In the LT group, there were multiple positive correlations between Achromobacter and arginine, isoleucine or tyrosine; between Prevotella and cysteine or phenylalanine; between Brevundimonas and cysteine; and between Stenotrophomonas and cysteine as well as a negative correlation between Stenotrophomonas and serine. Conclusion: Our findings demonstrated that amino acid content of breast muscle and intestinal microbiota profile was affected by different ambient temperatures. Under heat exposure, augmented abundance of Parabacteroides was correlated with elevated methionine. Low temperature treatment may affect muscle tyrosine content through the regulation of Achromobacter.

Key Establishment Scheme for Multicast CoAP Security (멀티캐스트 CoAP 보안을 위한 키 설정 기법)

  • Cho, Jung mo;Han, Sang woo;Park, Chang seop
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.77-85
    • /
    • 2017
  • In this paper, we propose a key establishment scheme for multicast CoAP security. For multicast CoAP applications, a CoAP Request message from a CoAP client is sent to a group of CoAP servers while each CoAP server responds with a unicast CoAP Response message. In this case, the CoAP Request message should be secured with a group key common to both the CoAP client and servers, while a pairwise key(unicast key) should be employed to secure each CoAP Response message. In the proposed protocol, the CoAP client and the CoAP server establish the group key and the pairwise key using the ECDH in the initial CoAP message exchange process. The proposed protocol, which is highly efficient and scalable, can replace DTLS Handshake and it can support end-to-end security by setting pairwise keys.

An Efficient Variant of Self-Healing Group Key Distribution Scheme with Revocation Capability (자가 치료 기능과 취소 능력을 가진 효율적인 그룹키 분배 기법)

  • Kang Ju-Sung;Hong Dowon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.941-948
    • /
    • 2005
  • In the self-healing group key distribution scheme, users are capable of recovering lost group keys on their own without requesting additional transmission from the group manager, where there is no reliable network infrastructure. In this paper, we propose a new self-healing group key distribution scheme with revocation capability, which is optimal in terms of user memory storage and more efficient in terms of communication complexity than the previous results. We obtain a slightly improved result from (13) and (14) by using the new broadcasting method. In addition, we prove that our scheme has the properties of t-wise forward secrecy and t-wise backward secrecy, and extend this self-healing approach to the session key recovery scheme from a single broadcast message.

Performance Evaluation of Group Key Management Scheme Blocking Collusion Attack (공모공격의 차단기능을 갖는 그룹 키 관리기법의 성능평가)

  • Chung, Jong-In
    • The Journal of Korean Association of Computer Education
    • /
    • v.9 no.2
    • /
    • pp.111-124
    • /
    • 2006
  • Multicast services are provided on the Internet in fast increasing. Therefore it is important to keep security for multicast communication. If a member of the group is removed, new group key has to be generated and distributed to all remaining members of group. Minimizing number of messages and operation cost for generation of the composite keys to be used to encrypting group key are important evaluating criteria of multicast key management scheme since generation and distribution of new keys for rekeying require expensive operation. Periodic batch rekeying can reduce these important parameters rather than rekeying sequentially in fashion one after another. In this paper, Hamming distance is calculated between every members to be removed. In batch rekeying the members with Hamming distance less than threshold are selected for rekeying procedure. With running the round assignment algorithm in the case of removing several members simultaneously, our scheme has advantages of reducing messages and operation cost for generation of the composite keys and eliminating possibility of collusion attack for rekeying. We evaluate performance of round assignment algorithm through simulation and show that our scheme is excellent after performance comparison of existent schemes and our scheme.

  • PDF

Folic acid supplementation regulates key immunity-associated genes and pathways during the periparturient period in dairy cows

  • Khan, Muhammad Zahoor;Zhang, Zhichao;Liu, Lei;Wang, Di;Mi, Siyuan;Liu, Xueqin;Liu, Gang;Guo, Gang;Li, Xizhi;Wang, Yachun;Yu, Ying
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.33 no.9
    • /
    • pp.1507-1519
    • /
    • 2020
  • Objective: The current research was aimed to profile the transcriptomic picture of the peripheral blood lymphocytes (PBLs) associated with immunity in Chinese Holsteins supplemented orally with coated folic acid during the periparturient period. Methods: The total of 123 perinatal cows were selected for this study and divided into three groups; group A (n = 41, 240 mg/500 kg cow/d), group B (n = 40, 120 mg/500 kg cow/d) and group C (n = 42, 0 mg/cow/d) based on the quantity of folic acid fed. Three samples of PBLs were selected from each folic acid treated group (high, low, and control) and RNA sequencing method was carried out for transcriptomic analysis. Results: The analysis revealed that a higher number of genes and pathways were regulated in response to high and low folic acid supplementation compared to the controls. We reported the novel pathways tumor necrosis factor (TNF) signaling, antigen processing and presentation, Staphylococcus aureus infection and nuclear factor (NF)-kappa B signaling pathways) and the key genes (e.g. C-X-C motif chemokine ligand 10, TNF receptor superfamily member 1A, cluster difference 4, major histocompatibility complex, class II, DQ beta, NF-kappa-B inhibitor alpha, and TNF superfamily 13) having great importance in immunity and anti-inflammation in the periparturient cows in response to coated folic acid treatment. Conclusion: Collectively, our study profiled first-time transcriptomic analysis of bovine lymphocytes and compared the involved cytokines, genes, and pathways between high vs control and low vs control. Our data suggest that the low folic acid supplementation (120 mg/500 kg) could be a good choice to boost appropriate immunity and anti-inflammation as well as might being applied to the health improvement of perinatal dairy cows.