• Title/Summary/Keyword: Identity Based

Search Result 2,342, Processing Time 0.041 seconds

A Case Study of Philosophical Counseling of a Woman with Hwabyung - With a Philosophical Counseling Method Based on Self-Identity - (철학상담을 적용한 여성화병환자 사례보고 - 자아정체성에 기반한 철학상담을 중심으로 -)

  • Bae, Eun-Joo;Suh, Hyo-Weon;Kim, Jong Woo
    • Journal of Oriental Neuropsychiatry
    • /
    • v.30 no.3
    • /
    • pp.129-140
    • /
    • 2019
  • Objectives: The purpose of this paper is to report the results of applying philosophical counseling to Hwabyung. Methods: At the time of the medical examination, 15 minutes or more of philosophical counselling method based on self-identity was conducted if possible. Additionally, We applied Hwabyung treatment guidelines (acupuncture, herbal medicine, etc.) to the patient If diagnosed as necessary. We evaluated visual Analogue Scale (VAS), Hwabyung scale, and Symptom Checklist 90-Revision (SCL 90-R) at baseline, and reassessed VAS and Hwabyung scale after about two weeks of treatments. Results: After about two weeks of treatment and philosophical counselling, VAS was between 10 to 1-2 and Hwabyung scale from 59 to 48. Also, the problem of fragmentation in the patient's life process was insighted, and the viewpoint was changed. Conclusions: It is useful to combine Korean traditional medical treatment with philosophical counselling method based on self identity for patients suffering from the Hwabyung. To Hwabyung patient, the view of philosophical counselling of feminism which understands women in political and cultural contexts is helpful.

Construction of Hyperledger Fabric based Decentralized ID System (하이퍼레저 패브릭 기반 탈중앙화 신원 인증 시스템 구축)

  • Kwang-Man Ko
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.1
    • /
    • pp.47-52
    • /
    • 2024
  • Through the coronavirus pandemic, research on the use and advancement of blockchain-based decentralized identity authentication (Decentralized ID) technology is being actively conducted in various fields, centered on the central government, local governments, and private businesses. In this paper, we introduce the results of development based on Hyperledger Fabric to change the existing central server-based identity authentication to a decentralized one. These development results can strengthen the security and transparency of identity authentication systems for commercial purposes and provide stable services for user ID issuance, inquiry, and disposal. In addition, the decentralized identity authentication system verified performance results of DID creation of 262,000 rps and DID inquiry of 1,850 rps, DID VP creation of 200 rps, and DID VP inquiry of 220 rps or less through public authentication.

An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network

  • Hsu, Chien-Lung;Lin, Han-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2928-2940
    • /
    • 2013
  • Key exposure is a major threat to secure cryptosystems. To mitigate the impact caused by key-compromise attacks, a key-insulated cryptographic mechanism is a better alternative. For securing the large message communication in peer-to-peer networks, in this paper, we propose the first novel identity-based key-insulated encryption (IB-KIE) scheme with message linkages. Our scheme has the properties of unbounded time periods and random-access key-updates. In the proposed scheme, each client can periodically update his private key while the corresponding public one remains unchanged. The essential security assumption of our proposed scheme is based on the well-known bilinear Diffie-Hellman problem (BDHP). To ensure the practical feasibility, we also formally prove that the proposed scheme achieves the security requirement of confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) in the random oracle model.

Efficient Identity-Based Generalized Ring Signcryption Scheme

  • Zhou, Caixue;Cui, Zongmin;Gao, Guangyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5553-5571
    • /
    • 2016
  • In this paper, we introduce a new concept called generalized ring signcryption (GRSC), which can achieve ring signature and ring signcryption functions with only one key pair and one algorithm. It is very useful for a system which has a large number of users, or has limited storage space, or whose function requirements may be changed later. We give a formal definition and a security model of GRSC and propose a concrete scheme based on bilinear pairings. In the random oracle model, the scheme's confidentiality can be proved under the GBDH assumption, and its unforgeability can be proved under GDH' assumption, and what is more, this scheme also allows unconditional anonymity. Compared with other identity-based ring signcryption schemes that use bilinear pairings as well, our scheme is a highly efficient one.

Identity-based Deniable Authenticated Encryption for E-voting Systems

  • Jin, Chunhua;Chen, Guanhua;Zhao, Jianyang;Gao, Shangbing;Yu, Changhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3299-3315
    • /
    • 2019
  • Deniable authentication (DA) is a protocol in which a receiver can generate an authenticator that is probabilistically indistinguishable from a sender. DA can be applied in many scenarios that require user privacy protection. To enhance the security of DA, in this paper, we construct a new deniable authenticated encryption (DAE) scheme that realizes deniable authentication and confidentiality in a logical single step. Compared with existing approaches, our approach provides proof of security and is efficient in terms of performance analysis. Our scheme is in an identity-based environment; thus, it avoids the public key certificate-based public key infrastructure (PKI). Moreover, we provide an example that shows that our protocol is applicable for e-voting systems.

Decentralized Identity Based Digital Certificate System for Prevention of Infectious Diseases (감염병 예방을 위한 분산ID 기반 디지털 증명서 시스템)

  • Park, Sung-chae;Lee, Ju hyun;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.49-66
    • /
    • 2022
  • The COVID-19 pandemic has led many countries around the world to introduce and employ a digital certificate system to prevent infectious diseases, however, there are difficulties in using the compatible digital certificate between countries in that the international standards of the system have not been developed. Accordingly, we propose an improved system, comparing two methods of presenting a certificate, existing QR code-based and a short-range wireless communication-based certificates. The proposed system is a digital certificate system against the spread of infectious disease by storing verification information of the certificate using decentralized identity-based technology on the blockchain. Blockchain-based trust anchor improves security by solving the problem of forgery and alteration of certificates and guaranteeing the identity of certificate issuers and presenters. This system is also expected to enhance usability providing concurrent verification of a number of certificates(vaccination certificates, recovery certificates, test results, identity certificates, etc.) in a single certificate presentation.

The Effects of Perception Toward Cyber Identity on Loyalty and Purchase Intention (사이버 공간의 자아에 대한 인지가 충성도와 구매의도에 미치는 영향)

  • Kim Su-Yeon;Hwang Hyun-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.4
    • /
    • pp.83-100
    • /
    • 2005
  • In this paper, we investigate the concept of cyber identity built in cyberspace and analyze the effects of general perception toward cyber identity on loyalty and purchase intent. Cyber identity is classified into two types: personal and social cyber identity, and has five components. Avatars and online gaming capability make up personal cyber identity while online communities and instant messenger count as social cyber identity. We regard blog personalities as having both personal and social characteristics. In our survey, we conclude that internet users want to purchase cyber items such as avatars, online game items, and wallpaper pictures to enhance their cyber identities. Based on the survey results , we derive five factors comprising personal cyber identity and social cyber identity using factor analysis and analyze overall effects of cyber identity on loyalty and purchase intention using Structural Equation Model.

  • PDF

Rural Residents' Leisure Satisfactions and Types by Social demographics in Korea (농촌주민의 여가소비유형과 만족도)

  • Cho, Young-Sook;Lee, Moon-Joo;Hwang, Dae-Yong
    • Journal of Agricultural Extension & Community Development
    • /
    • v.16 no.4
    • /
    • pp.1021-1048
    • /
    • 2009
  • Based on Rural living indicator -2005 survey data, in RDA this study attempted to investigate Rural Residents' real life satisfaction or identity model by the types of leisure consumption depending on each generation and explored the relationship between leisure consumption and the enhancement of self-identity/ interpersonal relationship, and that between leisure consumption satisfaction and real life satisfaction. Based on systematic random sampling with constructed questionnaires, 1,870 data were collected and analyzed. Overall, the results of this study showed that there are statistically significant differences between generation in leisure consumption. In detail, the findings of this study are as follows. The types of Rural Residents' leisure consumption can be divided into three styles including Semi-leisure type, Passive leisure type and Total leisure type consumption. The preferred types of leisure consumption of Rural Residents' were Semi-leisure type, Passive leisure type and Total leisure type in order. Except for times-pending leisure culture consumption, Semi-leisure type and Passive leisure type influenced on the enhancement of self-identity and interpersonal relationship, then the enhancement of self-identity and interpersonal relationship influenced on leisure consumption-satisfaction, and finally leisure consumption satisfaction influenced on real life satisfaction.

  • PDF

Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage

  • Zhang, Yinghui;Zhang, Tiantian;Guo, Rui;Xu, Shengmin;Zheng, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5653-5672
    • /
    • 2019
  • In cloud computing era, an increasing number of resource-constrained users outsource their data to cloud servers. Due to the untrustworthiness of cloud servers, it is important to ensure the integrity of outsourced data. However, most of existing solutions still have challenging issues needing to be addressed, such as the identity privacy protection of users, the traceability of users, the supporting of dynamic user operations, and the publicity of auditing. In order to tackle these issues simultaneously, in this paper, we propose a traceable dynamic public auditing scheme with identity privacy preserving for cloud storage. In the proposed scheme, a single user, including a group manager, is unable to know the signer's identity. Furthermore, our scheme realizes traceability based on a secret sharing mechanism and supports dynamic user operations. Based on the security and efficiency analysis, it is shown that our scheme is secure and efficient.