• Title/Summary/Keyword: Key Assignment

Search Result 82, Processing Time 0.024 seconds

A Study on Securities of Cryptosystems for Hierarchic Groups (위계집단에서 효율적인 암호계의 안전성에 관한 소고)

  • Kim, Yong-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.4
    • /
    • pp.605-610
    • /
    • 2013
  • A cryptography for enforcing hierarchic groups in a system where hierarchy is represented by a partially ordered set was introduced by Akl et al. But the key generation algorithm of Akl et al. is infeasible when there is a large number of users. To overcome this shortage, in 1985, MacKinnon et al. proposed a paper containing a condition which prevents cooperative attacks and optimizes the assignment. In 2005, Kim et al. proposed the key management systems for using one-way hash function, RSA algorithm, poset dimension and Clifford semigroup in the context of modern cryptography, the key management system using Clifford semigroup of imaginary quadratic non-maximal orders. We, in this paper, show that Kim et al. cryptosystem is insecure in some reasons and propose a revised cryptosystem.

Construction of UOWHF: New Parallel Domain Extender with Optimal Key Size (UOWHF 구생방법 : 최적의 키 길이를 가자는 새로운 병렬 도메인 확장기)

  • Wonil Lee;Donghoon Chang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.57-68
    • /
    • 2004
  • We present a new parallel algorithm for extending the domain of a UOWHF. Our algorithm is based on non-complete l-ary tree and has the same optimal key length expansion as Shoup's which has the most efficient key length expansion known so far. Using the recent result [8], we can also prove that the key length expansion of this algorithm and Shoup's sequential algorithm are the minimum possible for any algorithms in a large class of "natural" domain extending algorithms. But its prallelizability performance is less efficient than complete tree based constructions. However if l is getting larger then the parallelizability of the construction is also getting near to that of complete tree based constructions.tructions.

Access Control to XML Documents Based on Hierarchical Key Assignment Scheme (계층적 키 할당 기법을 기반으로 하는 XML 문서의 접근제어)

  • Ban, Yong-Ho;Kim, Jong-Hun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1520-1530
    • /
    • 2005
  • As XML is recognized as a prevalent standard for document representation and exchange in the Internet, the need for security of XML becomes very important issue. Until now researches on XML security have been focused on confidentiality or integrity like encryption and digital signature technology. But, as XML data becomes more massive and complicated, it requires managerial security that decided access permit or deny by the authority oi user who is using the XML data. Thus it requires models and mechanisms enabling the specification and enforcement of access control policies for XML documents. In this paper, we suggest the new access control model and mechanism that separate XML documents by access level, assign roles to each user by applying Role Based Access Control (RBAC) and perform access control to specific documents by encrypting each section with roles. The method, we suggested, has an advantage that it does not need to update the whole keys used in encryption process by updating only the relations between appropriate secure layers.

  • PDF

Crowdsourcing Software Development: Task Assignment Using PDDL Artificial Intelligence Planning

  • Tunio, Muhammad Zahid;Luo, Haiyong;Wang, Cong;Zhao, Fang;Shao, Wenhua;Pathan, Zulfiqar Hussain
    • Journal of Information Processing Systems
    • /
    • v.14 no.1
    • /
    • pp.129-139
    • /
    • 2018
  • The crowdsourcing software development (CSD) is growing rapidly in the open call format in a competitive environment. In CSD, tasks are posted on a web-based CSD platform for CSD workers to compete for the task and win rewards. Task searching and assigning are very important aspects of the CSD environment because tasks posted on different platforms are in hundreds. To search and evaluate a thousand submissions on the platform are very difficult and time-consuming process for both the developer and platform. However, there are many other problems that are affecting CSD quality and reliability of CSD workers to assign the task which include the required knowledge, large participation, time complexity and incentive motivations. In order to attract the right person for the right task, the execution of action plans will help the CSD platform as well the CSD worker for the best matching with their tasks. This study formalized the task assignment method by utilizing different situations in a CSD competition-based environment in artificial intelligence (AI) planning. The results from this study suggested that assigning the task has many challenges whenever there are undefined conditions, especially in a competitive environment. Our main focus is to evaluate the AI automated planning to provide the best possible solution to matching the CSD worker with their personality type.

A Design Method Reducing the Effect of Zeros of a Cascaded Three-Parameters Controller: The Characteristic Ratio Assignment Approach (종속형제어기의 영점의 영향을 고려한 저차제어기의 설계: 특성비지정 접근법)

  • Hua, Jin Li;Lee, Kwan-Ho;Kim, Young-Chol
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.158-160
    • /
    • 2005
  • This paper presents a new approach to the problem of designing a cascaded three-parameters controller for a given linear time invariant (LTD plant in unity feedback system. We consider a proportional-integral-derivative (PID) and a first-order controller with specified overshoot and settling time. This problem is difficult to solve because there may be no analytical solution due to the use of low-order controller and furthermore. the zeros of controller just appear in the zeros of feedback system. The key idea of our method is to impose a constraint on the controller parameters so that the zeros of resulting controller are distant from the dominant pole of closed-loop system to the left as far as the given interval. Two methods realizing the idea are suggested. We have employed the characteristic ratio assignment (CRA) in order to deal with the time response specifications. It is noted that the proposed methods are accomplished only in parameter space. Several illustrative examples are given.

  • PDF

A Network-Based Model for Estimating the Market Share of a High-Speed Rail System in the Korean NW-SE Corridor (네트워크 기반모델을 이용한 서울-부산간 고속철도 개통 후의 교통수단별 시장점유율 예측)

  • Gang-Len Chang
    • Proceedings of the KOR-KST Conference
    • /
    • 2003.02a
    • /
    • pp.127-150
    • /
    • 2003
  • This research presents a novel application of static traffic assignment methods, but with a variable time value, for estimating the market share of a high-speed rail (HSR) in the NW-SE corridor of Korea which is currently served by the airline (AR), conventional rail (CR), and highway (HWY) modes. The proposed model employs the time-space network structure to capture the interrelations among all competing transportation modes, and to reflect their supply- and demand-sides constraints as well as interactions through properly formulated link-node structures. The embedded cost function for each network link offers the flexibility for incorporating all associated factors, such as travel time and fare, in the model computation, and enables the use of a distribution rather than a constant to represent the time-value variation among all transportation mode users. To realistically capture the tripmakers' value-of-time (VOT) along the target area, a novel method for VOT calibration has been developed with aggregate demand information and key system performance data from the target area. Under the assumption that intercity tripmakers often have nearly "perfect" travel information, one can solve the market share of each mode after operations of HSR for each O-D pair under the time-dependent demand with state-of-the-art traffic assignment. Aside from estimating new market share, this paper also investigated the impacts of HSR on other existing transportation modes.

  • PDF

Task Reallocation in Multi-agent Systems Based on Vickrey Auctioning (Vickrey 경매에 기초한 다중 에이전트 시스템에서의 작업 재할당)

  • Kim, In-Cheol
    • The KIPS Transactions:PartB
    • /
    • v.8B no.6
    • /
    • pp.601-608
    • /
    • 2001
  • The automated assignment of multiple tasks to executing agents is a key problem in the area of multi-agent systems. In many domains, significant savings can be achieved by reallocating tasks among agents with different costs for handling tasks. The automation of task reallocation among self-interested agents requires that the individual agents use a common negotiation protocol that prescribes how they have to interact in order to come to an agreement on "who does what". In this paper, we introduce the multi-agent Traveling Salesman Problem(TSP) as an example of task reallocation problem, and suggest the Vickery auction as an interagent negotiation protocol for solving this problem. In general, auction-based protocols show several advantageous features: they are easily implementable, they enforce an efficient assignment process, and they guarantce an agreement even in scenarios in which the agents possess only very little domain-specific Knowledge. Furthermore Vickrey auctions have the additional advantage that each interested agent bids only once and that the dominant strategy is to bid one′s true valuation. In order to apply this market-based protocol into task reallocation among self-interested agents, we define the profit of each agent, the goal of negotiation, tasks to be traded out through auctions, the bidding strategy, and the sequence of auctions. Through several experiments with sample multi-agent TSPs, we show that the task allocation can improve monotonically at each step and then finally an optimal task allocation can be found with this protocol.

  • PDF

A Design Method Reducing the Effect of Zeros of a Cascaded Three-Parameters Controller: The Characteristic Ratio Assignment Approach (종속형제어기의 영점의 영향을 고려한 3-파라미터 제어기의 설계: 특성비지정 접근법)

  • Jin Li-Hua;Lee Kwan-Ho;Kim Young-Chol
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.1
    • /
    • pp.20-23
    • /
    • 2006
  • This paper presents a new approach to the problem of designing a cascaded three-parameters controller for a given linear time invariant (LTI) plant in unity feedback system. We consider a proportional-integral-derivative (PID) and a first-order controller with the specified overshoot and settling time. This problem is difficult to solve because there may be no analytical solution due to the use of low-order controller. Furthermore, the zeros of controller just appear in the zeros of feedback system. The key idea of our method is to impose a constraint on the controller parameters so that the zeros of resulting controller are distant from the dominant pole of closed-loop system to the left as far as the given interval. Two methods realizing the idea are suggested. We have employed the characteristic ratio assignment (CRA) in order to deal with the time response specifications. It is noted that the proposed methods are accomplished only in parameter space. Several illustrative examples are given.

QoE-driven Joint Resource Allocation and User-paring in Virtual MIMO SC-FDMA Systems

  • Hu, YaHui;Ci, Song
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.3831-3851
    • /
    • 2015
  • This paper is concerned with the problem of joint resource allocation and user-pairing in virtual MIMO SC-FDMA systems to improve service quality of experience (QoE). No-reference logarithmic model is introduced to quantify service experience for each user and the objective is to maximize sum of all user's mean of score (MOS). We firstly formulate the optimal problem into an S-dimensional (S-D) assignment problem. Then, to solve this problem, the modified Lagrangian relaxation algorithm is deduced to obtain the suboptimal result of joint user-paring and subchannel allocation. The merits of this solution are as follows. First, the gap between its results and the global optimal one can be quantified and controlled by balancing the complexity and accuracy, which merit the other suboptimal algorithms do not have. Secondly, it has the polynomial computational complexity and the worst case complexity is O(3LN3), where L is the maximum iteration time and N is the number of subchannels. Simulations also prove that our proposed algorithm can effectively improve quality of experience and the gap between our proposed and the optimal algorithms can be controlled below 8%.

Energy-efficient semi-supervised learning framework for subchannel allocation in non-orthogonal multiple access systems

  • S. Devipriya;J. Martin Leo Manickam;B. Victoria Jancee
    • ETRI Journal
    • /
    • v.45 no.6
    • /
    • pp.963-973
    • /
    • 2023
  • Non-orthogonal multiple access (NOMA) is considered a key candidate technology for next-generation wireless communication systems due to its high spectral efficiency and massive connectivity. Incorporating the concepts of multiple-input-multiple-output (MIMO) into NOMA can further improve the system efficiency, but the hardware complexity increases. This study develops an energy-efficient (EE) subchannel assignment framework for MIMO-NOMA systems under the quality-of-service and interference constraints. This framework handles an energy-efficient co-training-based semi-supervised learning (EE-CSL) algorithm, which utilizes a small portion of existing labeled data generated by numerical iterative algorithms for training. To improve the learning performance of the proposed EE-CSL, initial assignment is performed by a many-to-one matching (MOM) algorithm. The MOM algorithm helps achieve a low complex solution. Simulation results illustrate that a lower computational complexity of the EE-CSL algorithm helps significantly minimize the energy consumption in a network. Furthermore, the sum rate of NOMA outperforms conventional orthogonal multiple access.