• Title/Summary/Keyword: Key Issue

검색결과 1,218건 처리시간 0.024초

Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption

  • Du, Jiajie;HelIl, Nurmamat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권9호
    • /
    • pp.3274-3297
    • /
    • 2021
  • Permission delegation is an important research issue in access control. It allows a user to delegate some of his permissions to others to reduce his workload, or enables others to complete some tasks on his behalf when he is unavailable to do so. As an ideal solution for controlling read access on outsourced data objects on the cloud, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has attracted much attention. Some existing CP-ABE schemes handle the read permission delegation through the delegation of the user's private key to others. Still, these schemes lack the further consideration of granularity and traceability of the permission delegation. To this end, this article proposes a flexible and fine-grained CP-ABE key delegation approach that supports white-box traceability. In this approach, the key delegator first examines the relations between the data objects, read permission thereof that he intends to delegate, and the attributes associated with the access policies of these data objects. Then he chooses a minimal attribute set from his attributes according to the principle of least privilege. He constructs the delegation key with the minimal attribute set. Thus, we can achieve the shortest delegation key and minimize the time of key delegation under the premise of guaranteeing the delegator's access control requirement. The Key Generation Center (KGC) then embeds the delegatee's identity into the key to trace the route of the delegation key. Our approach prevents the delegatee from combining his existing key with the new delegation key to access unauthorized data objects. Theoretical analysis and test results show that our approach helps the KGC transfer some of its burdensome key generation tasks to regular users (delegators) to accommodate more users.

안전한 DRM 키 관리를 위한 비밀 분산 관리 시스템 설계 (Design of CEK Distributed Management System for Secure DRM Key Management.)

  • 성경
    • 한국정보통신학회논문지
    • /
    • 제9권2호
    • /
    • pp.390-396
    • /
    • 2005
  • 컴퓨터 보급의 증가와 인터넷의 발전으로 다양한 종류와 다량의 디지털 데이터들이 제작, 유포되고 있다. 디지털 컨텐츠는 기존의 아날로그 컨텐츠와 비교할 때 생성, 가공, 유통, 분배 등의 측면에서 많은 장점을 갖는 반면, 원본과 동일한 복사본을 쉽게 생성할 수 있는 특징 때문에 디지털 창작물에 대한 저작권 보호가 중요한 문제로 대두된다. 최근 디지털 컨텐츠 보호의 기술로 DRM(Digital Rights Management)이 사용되고 있으나 컨텐츠 유통 시 키 관리에서 취약성을 띄고 있다. 따라서 본 논문은 디지털 컨텐츠 보호 기술인 DRM을 분석하고 컨텐츠 유통의 키 관리 문제에 대한 개선책으로 $\ast$CDMS(CEK Distributed Management System)를 설계하여 이를 이용한 보다 안전한 키 관리 체계를 연구한다.

A Highly Secure Identity-Based Authenticated Key-Exchange Protocol for Satellite Communication

  • Yantao, Zhong;Jianfeng, Ma
    • Journal of Communications and Networks
    • /
    • 제12권6호
    • /
    • pp.592-599
    • /
    • 2010
  • In recent years, significant improvements have been made to the techniques used for analyzing satellite communication and attacking satellite systems. In 2003, a research team at Los Alamos National Laboratory, USA, demonstrated the ease with which civilian global positioning system (GPS) spoofing attacks can be implemented. They fed fake signals to the GPS receiver so that it operates as though it were located at a position different from its actual location. Moreover, Galileo in-orbit validation element A and Compass-M1 civilian codes in all available frequency bands were decoded in 2007 and 2009. These events indicate that cryptography should be used in addition to the coding technique for secure and authenticated satellite communication. In this study, we address this issue by using an authenticated key-exchange protocol to build a secure and authenticated communication channel for satellite communication. Our protocol uses identity-based cryptography. We also prove the security of our protocol in the extended Canetti-Krawczyk model, which is the strongest security model for authenticated key-exchange protocols, under the random oracle assumption and computational Diffie-Hellman assumption. In addition, our protocol helps achieve high efficiency in both communication and computation and thus improve security in satellite communication.

안전한 블록체인 기반 서비스를 위한 개인키 관리 가이드라인 (A Private Key Management Guideline For Secure Blockchain-Based Services)

  • 노시완;이경현
    • 정보보호학회논문지
    • /
    • 제32권5호
    • /
    • pp.899-914
    • /
    • 2022
  • 블록체인 기반 탈중앙 서비스는 참여자들의 합의에 기반하여 시스템을 운영함으로써 중앙화된 서버 없이도 신뢰 할 수 있는 서비스를 사용자에게 제공할 수 있다. 참여자들은 디지털서명 메커니즘을 사용하여 블록체인과 상호작용 할 수 있지만 개인키 관리와 관련된 이슈는 여전히 해결되지 않는 문제로 남아있다. NIST SP800-57 암호키 관리 권고안 등에서는 사용자의 개인키 관리에 관한 내용을 기술하고 있지만, 이는 탈중앙 서비스 환경을 고려하지 않았기에 블록체인 환경에 적용하기에는 적절하지 않다. 본 논문에서는 개인키 관리와 관련된 지갑 애플리케이션의 기능을 정의하고 NIST SP800-57을 반영한 블록체인 개인키 관리 방안과 이를 만족하기 위한 관련 기술을 제시한다. 마지막으로 논문에서 정의한 내용을 바탕으로 퍼블릭 블록체인에서 일반 사용자를 대상으로 하는 개인키 관리 가이드라인을 제안한다.

적외선 조명 및 단일카메라를 이용한 입체거리 센서의 개발 (3D Range Measurement using Infrared Light and a Camera)

  • 김인철;이수용
    • 제어로봇시스템학회논문지
    • /
    • 제14권10호
    • /
    • pp.1005-1013
    • /
    • 2008
  • This paper describes a new sensor system for 3D range measurement using the structured infrared light. Environment and obstacle sensing is the key issue for mobile robot localization and navigation. Laser scanners and infrared scanners cover $180^{\circ}$ and are accurate but too expensive. Those sensors use rotating light beams so that the range measurements are constrained on a plane. 3D measurements are much more useful in many ways for obstacle detection, map building and localization. Stereo vision is very common way of getting the depth information of 3D environment. However, it requires that the correspondence should be clearly identified and it also heavily depends on the light condition of the environment. Instead of using stereo camera, monocular camera and the projected infrared light are used in order to reduce the effects of the ambient light while getting 3D depth map. Modeling of the projected light pattern enabled precise estimation of the range. Identification of the cells from the pattern is the key issue in the proposed method. Several methods of correctly identifying the cells are discussed and verified with experiments.

Binary Hashing CNN Features for Action Recognition

  • Li, Weisheng;Feng, Chen;Xiao, Bin;Chen, Yanquan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권9호
    • /
    • pp.4412-4428
    • /
    • 2018
  • The purpose of this work is to solve the problem of representing an entire video using Convolutional Neural Network (CNN) features for human action recognition. Recently, due to insufficient GPU memory, it has been difficult to take the whole video as the input of the CNN for end-to-end learning. A typical method is to use sampled video frames as inputs and corresponding labels as supervision. One major issue of this popular approach is that the local samples may not contain the information indicated by the global labels and sufficient motion information. To address this issue, we propose a binary hashing method to enhance the local feature extractors. First, we extract the local features and aggregate them into global features using maximum/minimum pooling. Second, we use the binary hashing method to capture the motion features. Finally, we concatenate the hashing features with global features using different normalization methods to train the classifier. Experimental results on the JHMDB and MPII-Cooking datasets show that, for these new local features, binary hashing mapping on the sparsely sampled features led to significant performance improvements.

SCALING ANALYSIS IN BEPU LICENSING OF LWR

  • D'auria, Francesco;Lanfredini, Marco;Muellner, Nikolaus
    • Nuclear Engineering and Technology
    • /
    • 제44권6호
    • /
    • pp.611-622
    • /
    • 2012
  • "Scaling" plays an important role for safety analyses in the licensing of water cooled nuclear power reactors. Accident analyses, a sub set of safety analyses, is mostly based on nuclear reactor system thermal hydraulics, and therefore based on an adequate experimental data base, and in recent licensing applications, on best estimate computer code calculations. In the field of nuclear reactor technology, only a small set of the needed experiments can be executed at a nuclear power plant; the major part of experiments, either because of economics or because of safety concerns, has to be executed at reduced scale facilities. How to address the scaling issue has been the subject of numerous investigations in the past few decades (a lot of work has been performed in the 80thies and 90thies of the last century), and is still the focus of many scientific studies. The present paper proposes a "roadmap" to scaling. Key elements are the "scaling-pyramid", related "scaling bridges" and a logical path across scaling achievements (which constitute the "scaling puzzle"). The objective is addressing the scaling issue when demonstrating the applicability of the system codes, the "key-to-scaling", in the licensing process of a nuclear power plant. The proposed "road map to scaling" aims at solving the "scaling puzzle", by introducing a unified approach to the problem.

중국 공동주택 거실의 감성적 색채계획에 관한 연구 - 2000년 이후의 북경지역의 공동주택을 중심으로 - (A Plan & Research of Perceptual Color Designation in China Public Residential Housing - Centered In the Boiling Public Residential Housing After 2000 -)

  • 허예;홍관선
    • 한국실내디자인학회:학술대회논문집
    • /
    • 한국실내디자인학회 2008년도 춘계학술발표대회 논문집
    • /
    • pp.105-108
    • /
    • 2008
  • Beijing as one of the prosperous cities has been attracting more and more to the people in China and overseas because of the coming Olympic Games. And the housing enterprises have become extremely popular as follows. The request of housing designation has also been increased and a color factor should be the key point of housing designation. This study is a research of perceptual color designation in public residential housing in Beijing. In particular, this study will deal with the color designation development trend of public residential housing in Beijing after an analysis of color designation of high-class residential housing from 2000 to 2007 in Beijing. Color around people is not only understood more rationally and personally in 21 century but also it is pursued to get a brand-newly incentive from tradition. While color could give housing many wonderful looks. Chromatics people have had a deeper acknowledge of color and color function so color has played a key role of housing designation. Color effect on people in physical and physiology aspect is getting more important. The color issue are one of the most effective and efficient factor in the in public residential housing, therefore this study deal with this issue 'How to effectively use the color in public residential housing space.

  • PDF

Robust Fuzzy Control of a Class of Nonlinear Descriptor Systems with Time-Varying Delay

  • Yan Wang;Sun, Zeng-Qi;Sun, Fu-Chun
    • International Journal of Control, Automation, and Systems
    • /
    • 제2권1호
    • /
    • pp.76-82
    • /
    • 2004
  • A robust fuzzy controller is designed to stabilize a class of solvable nonlinear descriptor systems with time-varying delay. First, a new modeling and control method for nonlinear descriptor systems is presented with a fuzzy descriptor model. A sufficient condition for the existence of the fuzzy controller is given in terms of a series of LMIs. Then, a less conservative fuzzy controller design approach is obtained based on the fuzzy rules and weights. This method includes the interactions of the different subsystems into one matrix. The effectiveness of the presented approach and the design procedure of the fuzzy controller are illustrated by way of an example.

키-프레임 기반 실시간 유체 시뮬레이션 (Key-Frame Based Real-Time Fluid Simulations)

  • 유지현;박상훈
    • 한국멀티미디어학회논문지
    • /
    • 제9권11호
    • /
    • pp.1515-1528
    • /
    • 2006
  • 물리기반 유체 애니메이션 시스템들이 시각 특수효과 산업계에서 빠르게 발전하고 있고, 이를 이용해 매우 높은 화질의 영상을 제작하는 것이 가능하게 되었다. 그러나 컴퓨터 게임과 같은 실시간 응용 분야의 경우, 화질보다는 시뮬레이션 속도가 더 중요한 문제이다. 본 논문은 프로그래머블 그래픽스 파이프라인을 이용하여 유체에 대한 애니메이션을 수행하는 실시간 기법에 대해 설명한다. 두 개의 키-프레임이 주어졌을 때, 본 기법을 이용하여 원시 프레임으로부터 목적 프레임으로 변하는 연속 영상을 대화식으로 생성할 수 있음을 보인다.

  • PDF