• Title/Summary/Keyword: Key Distribution Center

Search Result 261, Processing Time 0.034 seconds

Inter-Domain Verifiable Self-certified public keys (상이한 도메인에서 검증 가능한 자체 인증 공개키)

  • 정영석;한종수;오수현;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.71-84
    • /
    • 2003
  • Self-certified public keys need not be accompanied with a separate certificate to be authenticated by other users because the public keys are computed by both the authority and the user. At this point, verifiable self-certified public keys are proposed that can determine which is wrong signatures or public keys if public keys are used in signature scheme and then verification of signatures does not succeed. To verify these public keys, key generation center's public key trusted by users is required. If all users trust same key generation center, public keys can be verified simply. But among users in different domains, rusty relationship between two key generation centers must be accomplished. In this paper we propose inter-domain verifiable self-certified public keys that can be verified without certificate between users under key generation centers whose trusty relationship is accomplished. Also we present the execution of signature and key distribution between users under key generation centers use different public key parameters.

Joint distribution of wind speed and direction in the context of field measurement

  • Wang, Hao;Tao, Tianyou;Wu, Teng;Mao, Jianxiao;Li, Aiqun
    • Wind and Structures
    • /
    • v.20 no.5
    • /
    • pp.701-718
    • /
    • 2015
  • The joint distribution of wind speed and wind direction at a bridge site is vital to the estimation of the basic wind speed, and hence to the wind-induced vibration analysis of long-span bridges. Instead of the conventional way relying on the weather stations, this study proposed an alternate approach to obtain the original records of wind speed and the corresponding directions based on field measurement supported by the Structural Health Monitoring System (SHMS). Specifically, SHMS of Sutong Cable-stayed Bridge (SCB) is utilized to study the basic wind speed with directional information. Four anemometers are installed in the SHMS of SCB: upstream and downstream of the main deck center, top of the north and south tower respectively. Using the recorded wind data from SHMS, the joint distribution of wind speed and direction is investigated based on statistical methods, and then the basic wind speeds in 10-year and 100-year recurrence intervals at these four key positions are calculated. Analytical results verify the reliability of the recorded wind data from SHMS, and indicate that the joint probability model for the extreme wind speed at SCB site fits well with the Weibull model. It is shown that the calculated basic wind speed is reduced by considering the influence of wind direction. Compared to the design basic wind speed in the Specification of China, basic wind speed considering the influence of direction or not is much smaller, indicating a high safety coefficient in the design of SCB. The results obtained in this study can provide not only references for further wind-resistance research of SCB, but also improve the understanding of the safety coefficient for wind-resistance design of other engineering structures in the similar area.

Structural evaluation of a foldable cable-strut structure for kinematic roofs

  • Cai, Jianguo;Zhang, Qian;Zhang, Yiqun;Lee, Daniel Sang-hoon;Feng, Jian
    • Steel and Composite Structures
    • /
    • v.29 no.5
    • /
    • pp.669-680
    • /
    • 2018
  • The rapidly decreasing natural resources and the global variation of the climate push us to find intelligent and efficient structural systems to provide more people with fewer resources. This paper proposed a kinematic cable-strut system to realize sustainable structures in responding to changing environmental conditions. At first, the concept of the kinematic system based on crystal-cell pyramid (CP) cable-strut unit was given. Then the deployment of the structure was studied experimentally. After that, the static behaviors in the fully deployed state under the symmetric and asymmetric load cases were investigated. Moreover, the effects of thermal loading and the initial prestress distribution were also discussed. Comparative studies between the proposed structure and other deployable cable-strut system under three times of design load cases were carried out. Finally, the robustness of the system was studied by removal of one passive cable at one time.

Key Management for Secure Internet of Things(IoT) Data in Cloud Computing (클라우드 컴퓨팅에서 안전한 사물인터넷 데이터를 위한 키 관리)

  • Sung, Soon-hwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.353-360
    • /
    • 2017
  • The Internet of Things(IoT) security has more need than a technical problem as it needs series of regulations and faultless security system for common purposes. So, this study proposes an efficient key management in order that can be trusted IoT data in cloud computing. In contrast with a key distribution center of existing sensor networks, the proposed a federation key management of cloud proxy key server is not central point of administration and enables an active key recovery and update. The proposed key management is not a method of predetermined secret keys but sharing key information of a cloud proxy key server in autonomous cloud, which can reduce key generation and space complexity. In addition, In contrast with previous IoT key researches, a federation key of cloud proxy key server provides an extraction ability from meaningful information while moving data.

The Information Distribution Role of Facebook in Universities

  • NGUYEN, Thi Nguyet Dung;NGUYEN, Thi Thu Huong;NGUYEN, Thi Phuong Anh;NGUYEN, Thi Thu Huong;VU, Thi Phuong Thao
    • Journal of Distribution Science
    • /
    • v.20 no.5
    • /
    • pp.75-84
    • /
    • 2022
  • Purpose: The paper employs the theory of planned behaviour, social identity theory, social presence theory, and social exchange theory to propose a model for using the social media platform Facebook in distributing information in universities. Research design, data and methodology: Data were obtained from 618 students at Hanoi University of Industry (HaUI) in Vietnam. The study used structural equation modeling in SPSS and the statistical analysis software AMOS version 24 to explore the information distribution role of Facebook. Results: Findings reveal that subjective norms and social presence play a key role in driving students to use Facebook for studying. In addition, university administrators can boost student satisfaction and academic achievement through Facebook. Interestingly, students who strongly identify with the brand name of the university have a strong connection with the university are more likely to engage in behaviors supportive toward the university. Conclusions: These findings show that Facebook had played a key information distribution role in universities. Thus, the study provides the executive board of the university and teachers can gain new understanding of why students employ Facebook for studying as well as capitalize on the platform to improve several operational metrics such as brand identification, student satisfaction, and academic achievement.

In Situ-DRIFTS Study of Rh Promoted CuCo/Al2O3 for Ethanol Synthesis via CO Hydrogenation

  • Li, Fang;Ma, Hongfang;Zhang, Haitao;Ying, Weiyong;Fang, Dingye
    • Bulletin of the Korean Chemical Society
    • /
    • v.35 no.9
    • /
    • pp.2726-2732
    • /
    • 2014
  • The promoting effect of rhodium on the structure and activity of the supported Cu-Co based catalysts for CO hydrogenation was investigated in detail. The samples were characterized by DRIFTS, $N_2$-adsorption, XRD, $H_2$-TPR, $H_2$-TPD and XPS. The results indicated that the introduction of rhodium to Cu-Co catalysts resulted in modification of metal dispersion, reducibility and crystal structure. DRIFTS results of CO hydrogenation at reaction condition (P=2 MPa, $T=260^{\circ}C$) indicated the addition of 1 wt % rhodium improved hydrogenation ability of Cu-Co catalysts. The ethanol selectivity and CO conversion were both improved by 1 wt % Rh promoted Cu-Co based catalysts. The alcohol distribution over un-promoted and rhodium promoted Cu-Co based catalysts obeys A-S-F rule and higher chain growth probability was got on rhodium promoted catalyst.

Improving The Security Of Quantum Key Distribution And Quantum Authentication By Using CHSH Inequality (CHSH 부등식을 이용하여 양자 키 분배와 양자 인증의 안전성을 개선한 프로토콜)

  • Heo, Jin-O;Hong, Chang-Ho;Lim, Jong-In;Yang, Hyoung-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.69-78
    • /
    • 2008
  • We propose to analyze a weakness of quantum key distribution and quantum authentication which use entangled state were proposed by Bao-sen Shi(2001) and to improve the security of the protocol. The existing protocol had a weakness against an impersonation attack of an eavesdropper, because of a only process which authenticated a third party(Center) by users. In this paper, we propose improving the security of the protocol that authenticates users by a third party using check mode which applies CHSH inequality.

Applying PKI for Internet Voting System

  • Kim, Jinho;Kim, Kwangjo;Lee, Byoungcheon
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.318-321
    • /
    • 2001
  • We have designed an Internet voting system applicable for worldwide voting which is based on Ohkubo et. al,'s scheme[9] combined with Public Key Infrastructure (PKI). To the best of our knowledge, this is the first trial to serve secure Internet voting system to the world. In our system, voter's privacy is guaranteed by using blind signature and mix-net, and robustness is provided through the threshold encryption scheme. By employing Java technology, we propose a way of typical implementation for internet voting system. Furthermore, PKI permits worldwide key distribution and achieve “one certificate/one vote” policy. Therefore, anyone can participate in the voting if he gets a certificate from Certificate Authority (CA). By the joint work between Korean and Japanese teams, the implementation aims to select MVPs in 2002 FIFA World Cup Korea-Japan$\^$TM/ in easy and friendly manner for any Internet user to participate and enjoy Internet voting.

  • PDF

An Effective Environmental Assessment for the Simple Statement of the Sea Area Utilization Consultation System (간이해역이용협의 유형분석 및 효율적 환경평가방안)

  • Lee, Dae-In;Eom, Ki-Hyuk;Kim, Gui-Young
    • Journal of Environmental Impact Assessment
    • /
    • v.22 no.3
    • /
    • pp.255-264
    • /
    • 2013
  • This paper diagnosed the assessment problems and development types of the simple statement of the Sea Area Utilization Consultation System. and suggested the key assessment items for system improvement. The major types of Public Water occupation and use, and distribution characteristic of regional and coastal were analyzed by evaluate 529 review items during 2010-2012. The artificial structure installation including harbor and fishing port facilities in the South and West coast, and seawater supply and drainage for land-based aquaculture and power plant were dominated. The checklists considering each types of occupation and use in Public Water were suggested. In addition, policy proposals for system improvement were suggested.

Bandwidth Efficient Key Management for Secure Multicast in Clustered Wireless Networks (클러스터화된 무선 네트워크에서 전송량을 고려한 효율적인 멀티캐스트 키 관리 기법)

  • Shin, Seung-Jae;Hur, Jun-Beom;Lee, Han-Jin;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.437-455
    • /
    • 2009
  • In the near future, various multicast based services will be provided over clustered wireless networks. To provide multicast services in secure manner, multicast messages are encrypted by using group key which is shared by group members. Therefore, various group key management schemes have been introduced until now. Among them, tree based approach is one of the most representative paradigms in group key management. Traditional tree based approaches effectively reduce rekeying message transmissions of the key distribution center. However, they do not consider the network bandwidth used for transmitting the rekeying messages. In this paper, we firstly present formulas that describe bandwidth consumption of tree based group key management scheme. Based on our formulations, we propose a bandwidth efficient key tree management scheme for clustered wireless networks where membership changes occur frequently. Simulation results show that our scheme effectively reduces the bandwidth consumption used for rekeying compared to existing key tree schemes.