• Title/Summary/Keyword: Key

Search Result 33,596, Processing Time 0.058 seconds

A New Efficient Private Key Reissuing Model for Identity-based Encryption Schemes Including Dynamic Information (동적 ID 정보가 포함된 신원기반 암호시스템에서 효율적인 키 재발급 모델)

  • Kim, Dong-Hyun;Kim, Sang-Jin;Koo, Bon-Seok;Ryu, Kwon-Ho;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.23-36
    • /
    • 2005
  • The main obstacle hindering the wide deployment of identity-based cryptosystem is that the entity responsible for creating the private key has too much power. As a result, private keys are no longer private. One obvious solution to this problem is to apply the threshold technique. However, this increases the authentication computation, and communication cost during the key issuing phase. In this paper, we propose a new effi ient model for issuing multiple private keys in identity-based encryption schemes based on the Weil pairing that also alleviates the key escrow problem. In our system, the private key of a user is divided into two components, KGK (Key Description Key) and KUD(Key Usage Desscriptor), which are issued separately by different parties. The KGK is issued in a threshold manner by KIC (Key Issuing Center), whereas the KW is issued by a single authority called KUM (Key Usage Manager). Changing KW results in a different private key. As a result, a user can efficiently obtain a new private key by interacting with KUM. We can also adapt Gentry's time-slot based private key revocation approach to our scheme more efficiently than others. We also show the security of the system and its efficiency by analyzing the existing systems.

Biosynthesis of rare 20(R)-protopanaxadiol/protopanaxatriol type ginsenosides through Escherichia coli engineered with uridine diphosphate glycosyltransferase genes

  • Yu, Lu;Chen, Yuan;Shi, Jie;Wang, Rufeng;Yang, Yingbo;Yang, Li;Zhao, Shujuan;Wang, Zhengtao
    • Journal of Ginseng Research
    • /
    • v.43 no.1
    • /
    • pp.116-124
    • /
    • 2019
  • Background: Ginsenosides are known as the principal pharmacological active constituents in Panax medicinal plants such as Asian ginseng, American ginseng, and Notoginseng. Some ginsenosides, especially the 20(R) isomers, are found in trace amounts in natural sources and are difficult to chemically synthesize. The present study provides an approach to produce such trace ginsenosides applying biotransformation through Escherichia coli modified with relevant genes. Methods: Seven uridine diphosphate glycosyltransferase (UGT) genes originating from Panax notoginseng, Medicago sativa, and Bacillus subtilis were synthesized or cloned and constructed into pETM6, an ePathBrick vector, which were then introduced into E. coli BL21star (DE3) separately. 20(R)-Protopanaxadiol (PPD), 20(R)-protopanaxatriol (PPT), and 20(R)-type ginsenosides were used as substrates for biotransformation with recombinant E. coli modified with those UGT genes. Results: E. coli engineered with $GT95^{syn}$ selectively transfers a glucose moiety to the C20 hydroxyl of 20(R)-PPD and 20(R)-PPT to produce 20(R)-CK and 20(R)-F1, respectively. GTK1- and GTC1-modified E. coli glycosylated the C3-OH of 20(R)-PPD to form 20(R)-Rh2. Moreover, E. coli containing $p2GT95^{syn}K1$, a recreated two-step glycosylation pathway via the ePathBrich, implemented the successive glycosylation at C20-OH and C3-OH of 20(R)-PPD and yielded 20(R)-F2 in the biotransformation broth. Conclusion: This study demonstrates that rare 20(R)-ginsenosides can be produced through E. coli engineered with UTG genes.

Thermal-hydraulic research on rod bundle in the LBE fast reactor with grid spacer

  • Liu, Jie;Song, Ping;Zhang, Dalin;Wang, Shibao;Lin, Chao;Liu, Yapeng;Zhou, Lei;Wang, Chenglong;Tian, Wenxi;Qiu, Suizheng;Su, G.H.
    • Nuclear Engineering and Technology
    • /
    • v.54 no.7
    • /
    • pp.2728-2735
    • /
    • 2022
  • The research on the flow and heat transfer characteristics of lead bismuth(LBE) is significant for the thermal-hydraulic calculation, safety analysis and practical application of lead-based fast reactors(LFR). In this paper, a new CFD model is proposed to solve the thermal-hydraulic analysis of LBE. The model includes two parts: turbulent model and turbulent Prandtl, which are the important factors for LBE. In order to find the best model, the experiment data and design of 19-pin hexagonal rod bundle with spacer grid, undertaken at the Karlsruhe Liquid Metal Laboratory (KALLA) are used for CFD calculation. Furthermore, the turbulent model includes SST k - 𝜔 and k - 𝜀; the turbulent Prandtl includes Cheng-Tak and constant (Prt =1.5,2.0,2.5,3.0). Among them, the combination between SST k - 𝜔 and Cheng-Tak is more suitable for the experiment. But in the low Pe region, the deviation between the experiment data and CFD result is too much. The reason may be the inlet-effect and when Pe is in a low level, the number of molecular thermal diffusion occupies an absolute advantage, and the buoyancy will enhance. In order to test and verify versatility of the model, the NCCL performed by the Nuclear Thermal-hydraulic Laboratory (Nuthel) of Xi'an Jiao tong University is used for CFD to calculate. This paper provides two verification examples for the new universal model.

Memory-Efficient Hypercube Key Establishment Scheme for Micro-Sensor Networks

  • Lhee, Kyung-Suk
    • ETRI Journal
    • /
    • v.30 no.3
    • /
    • pp.483-485
    • /
    • 2008
  • A micro-sensor network is comprised of a large number of small sensors with limited memory capacity. Current key-establishment schemes for symmetric encryption require too much memory for micro-sensor networks on a large scale. In this paper, we propose a memory-efficient hypercube key establishment scheme that only requires logarithmic memory overhead.

  • PDF

Isolation and Cloning of Porcine SLC27A2 Gene and Detection of Its Polymorphism Associated with Growth and Carcass Traits

  • Wang, Tao;Liu, Chang;Xiong, Yuan-Zhu;Deng, Chang-Yan;Zuo, Bo;Xie, Hong-Tao;Xu, De-Quan
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.20 no.8
    • /
    • pp.1169-1173
    • /
    • 2007
  • The protein encoded by SLC27A2 gene is an isozyme of long-chain fatty-acid-coenzyme A ligase family, and it converts free long-chain fatty acids into fatty acyl-CoA esters, and thereby plays a key role in lipid biosynthesis and fatty acid degradation. In the present study, SLC27A2 located on human chromosome 15 was selected as candidate gene and we isolated and cloned partial fragments of mRNA sequence and genomic fragments of porcine SLC27A2 gene. The coding region of the gene as determined by alignments shared 90% and 82% identity with human and mouse cDNAs, respectively. Detection in LargeWhite and Meishan breeds showed that a single nucleotide polymorphism (SNP) ($A{\rightarrow}G$) existed in exon 7, which caused corresponding amino acid changed for encoding. In LargeWhite pigs it encoded for Val while in Meishan pigs it encoded for Ile, so we developed the PCR-RFLP genotype method for detection of this polymorphism. Association study in 135 $F_2$ reference family indicated that significant correlation existed between the polymorphism and growth and carcass traits.

An Authentication and Key Management Protocol for Secure Data Exchange in EPON MAC Layer (EPON MAC 계층의 안전한 데이터 전송을 위한 인증 및 키관리 프로토콜)

  • Kang, In-kon;Lee, Do-Hoon;Lee, Bong-Ju;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1B
    • /
    • pp.1-10
    • /
    • 2003
  • An EPON which is going on standardization in IEEE 802.3ah, is tree topology consists of a OLT and multiple ONU using passive optical components, so this network is susceptible to variable security threats - eavesdropping, masquerading, denial of service and so on. In this paper, we design a security protocol supporting authentication and confidentiality services in MAC layer in order to prevent these security threats and to guarantee secure data exchange The designed security protocol introduce public-key based authentication and key management protocols for efficient key management, and choose Rijndael algorithm, which is recent standard of AES, to provide the confidentiality of EPON Proposed authentication and key management protocols perform authentication and public-key exchange at a time, and are secure protocols using derived common cipher key by exchanging public random number To implement the designed security protocol, we propose the procedures of authentication and public-key exchange, session key update, key recovery. This proposed protocol is verified using unknown session key, forward secrecy, unknown key-share, key-compromise impersonation.

Development of a Key Recovery System for Recovery of Encrypted Data (암호화된 정보의 복구를 위한 키복구 시스템 개발)

  • Kang, Sang-Seung;Lim, Shin-Young;Ko, Jeong-Ho;Jun, Eun-Ah;Lee, Gang-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.4
    • /
    • pp.324-335
    • /
    • 2001
  • Information systems, which support information security functions such as CALS and EC systems, should have cryptographic functions for information in order to storage and communicate securely. Additionally, including recovery of lost keys, lots of cryptographic keys should be securely managed. In this paper, we present some results of development of a key recovery system for recovery of encrypted data. The proposed system, in a type of key encapsulation approach, confirms to NIST's RKRP(Requirements for Key Recovery Products) that is a defecto international key recovery standard, as well as CC 2.0 that is a international security evaluation criteria. A message sender secretly choices two or more key recovery agents from a pool of key recovery agents. The key recovery information is generated by using the recovering key, random keys and public keys of the chosen agents. A message receiver can not know which key recovery agents are involved in his key recovery service. We have developed two versions of prototype of key recovery system such as C/Unix and Java/NT versions. Our systems can be used for recovery of communicating informations as well as storing informations, and as a new security service solution for electronic commerce service infrastructures.

  • PDF

Secret-key-sharing Cryptosystem Using Optical Phase-shifting Digital Holography

  • Jeon, Seok Hee;Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • v.3 no.2
    • /
    • pp.119-127
    • /
    • 2019
  • A new secret-key-sharing cryptosystem using optical phase-shifting digital holography is proposed. The proposed secret-key-sharing algorithm is based on the Diffie-Hellman key-exchange protocol, which is modified to an optical cipher system implemented by a two-step quadrature phase-shifting digital holographic encryption method using orthogonal polarization. Two unknown users' private keys are encrypted by two-step phase-shifting digital holography and are changed into three digital-hologram ciphers, which are stored by computer and are opened to a public communication network for secret-key-sharing. Two-step phase-shifting digital holograms are acquired by applying a phase step of 0 or ${\pi}/2$ in the reference beam's path. The encrypted digital hologram in the optical setup is a Fourier-transform hologram, and is recorded on CCDs with 256 quantized gray-level intensities. The digital hologram shows an analog-type noise-like randomized cipher with a two-dimensional array, which has a stronger security level than conventional electronic cryptography, due to the complexity of optical encryption, and protects against the possibility of a replay attack. Decryption with three encrypted digital holograms generates the same shared secret key for each user. Schematically, the proposed optical configuration has the advantage of producing a kind of double-key encryption, which can enhance security strength compared to the conventional Diffie-Hellman key-exchange protocol. Another advantage of the proposed secret-key-sharing cryptosystem is that it is free to change each user's private key in generating the public keys at any time. The proposed method is very effective cryptography when applied to a secret-key-exchange cryptosystem with high security strength.

Boosting WiscKey Key-Value Store Using NVDIMM-N (NVDIMM-N을 활용한 WiscKey 키-밸류 스토어 성능 향상)

  • Il Han Song;Bo hyun Lee;Sang Won Lee
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.3
    • /
    • pp.111-116
    • /
    • 2023
  • The WiscKey database, which optimizes overhead by compaction of the LSM tree-based Key-Value database, stores the value in a separate file, and stores only the key and value addresses in the database. Each time an fsync system call function is used to ensure data integrity in the process of storing values. In previously conducted studies, workload performance was reduced by up to 5.8 times as a result of performing the workload without calling the fsync system call function. However, it is difficult to ensure the data integrity of the database without using the fsync system call function. In this paper, to reduce the overhead of the fsync system call function while performing workloads on the WiscKey database, we use NVDIMM caching techniques to ensure data integrity while improving the performance of the WiscKey database.

Numerical simulation of natural convection around the dome in the passive containment air-cooling system

  • Chunhui Dong;Shikang Chen;Ronghua Chen;Wenxi Tian;Suizheng Qiu;G.H. Su
    • Nuclear Engineering and Technology
    • /
    • v.55 no.8
    • /
    • pp.2997-3009
    • /
    • 2023
  • The Passive containment Air-cooling System (PAS) can effectively remove the decay heat of the modular small nuclear reactor after an accident. The details of natural convection around the dome, which is a key part of PAS, were investigated numerically in the present study. The thermal dynamics around the dome were studied through the temperature, pressure and velocity contours and the streamlines. Additionally, the formation of the buoyant plume at the top of the dome was investigated. The results show that with the increase of Ra, the lift-off point moves toward the bottom of the dome, and the eddy under the buoyant plume grows larger gradually, which enhances the heat transfer. And the heat transfer along the dome surface with different truncation angles was investigated. As the angle increases, the heat transfer coefficient becomes stronger as well. Consequently, a newly developed heat transfer correlation considering the influence of truncation angle for the dome is proposed based on the simulated results. This study could provide a better understanding of natural convection around the dome of PAS and the proposed correlation could also offer more predictive value in the improvement of nuclear safety.