• Title/Summary/Keyword: Key Recovery System

검색결과 123건 처리시간 0.019초

Translucent Cryptography의 취약점 개선 (The Improvement of Translucent Cryptography)

  • 김종희;이필중
    • 한국통신학회논문지
    • /
    • 제27권12C호
    • /
    • pp.1276-1281
    • /
    • 2002
  • 키 복구 시스템의 대안으로 Bellare와 Rivest가 translucent cryptography의 개념을 소개하였다. Translucent cryptography란 사용자간의 암호 통신을 제3자가 확률 p(0$\leq$p$\leq$1)로 복구할 수 있는 시스템이다. 이 시스템에서는 사용자의 비공개키를 사전에 위탁할 필요가 없으며, p의 값을 조정함으로써 사용자와 복구 기관 사이의 균형을 조정할 수 있다. 예를 들어, p의 값을 0.4로 한다면 복구 기관은 사용자간의 암호 메시지 100개 중 40개를 복구할 수 있게 된다. 본 논문에서는 translucent cryptography에서 사용자가 손쉽게 복구 기관을 속여 복구 기관이 p의 확률만큼 복호화할 수 없는 문제점을 지적하고, 이에 대한 개선책을 제안한다.

전자 상거래 인증 기술 (Public Key Certification Technology for Electronic Commerce)

  • 하영국;임신영;강상승;함호상;박상봉
    • 한국전자거래학회지
    • /
    • 제4권2호
    • /
    • pp.23-40
    • /
    • 1999
  • Nowadays, major application of public key certification technology based on PKI(Public Key Infrastructure) is electronic commerce. Public key certification technology may include various sub-technologies such as key recovery, secret sharing, certificate/key management, and directory system technology. This thesis discusses PKI-based certification authority technology for electronic commerce on the Internet.

  • PDF

Transient Performance Improvement in the Boundary Control of Boost Converters using Synthetic Optimized Trajectory

  • Feng, Gaohui;Yuan, Liqiang;Zhao, Zhengming;Ge, Junjie;Ye, Xiuxi;Lu, Ting
    • Journal of Power Electronics
    • /
    • 제16권2호
    • /
    • pp.584-597
    • /
    • 2016
  • This paper focuses on an improvement in the transient performance of Boost converters when the load changes abruptly. This is achieved on the basis of the nature trajectory in Boost converters. Three key aspects of the transient performance are analyzed including the storage energy change law in the inductors and capacitors of converters during the transient process, the ideal minimum voltage deviation in the transient process, and the minimum voltage deviation control trajectory. The changing relationship curve between the voltage deviation and the recovery time is depicted through analysis and simulations when the load suddenly increases. In addition, the relationship curve between the current fluctuation and the recovery time is obtained when the load suddenly decreases. Considering the aspects of an increasing and decreasing load, this paper proposes the transient performance synthetic optimized trajectory and control laws. Through simulation and experimental results, the transient performances are compared with the other typical three control methods, and the ability of proposed synthetic trajectory and control law to achieve optimal transient performance is verified.

A Novel Method for Survivability Test Based on End Nodes in Large Scale Network

  • Ming, Liang;Zhao, Gang;Wang, Dongxia;Huang, Minhuan;Li, Xiang;Miao, Qing;Xu, Fei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권2호
    • /
    • pp.620-636
    • /
    • 2015
  • Survivability is a necessary property of network system in disturbed environment. Recovery ability is a key actor of survivability. This paper concludes network survivability into a novel composite metric, i.e. Network Recovery Degree (NRD). In order to measure this metric in quantity, a concept of Source-Destination Pair (SD Pair), is created to abstract end-to-end activity based on end nodes in network, and the quality of SD Pair is also used to describe network performance, such as connectivity, quality of service, link degree, and so on. After that, a Survivability Test method in large scale Network based on SD pairs, called STNSD, is provided. How to select SD Pairs effectively in large scale network is also provided. We set up simulation environment to validate the test method in a severe destroy scenario and evaluate the method scalability in different large scale network scenarios. Experiment and analysis shows that the metric NRD correctly reflects the effort of different survivability strategy, and the proposed test method STNSD has good scalability and can be used to test and evaluate quantitative survivability in large scale network.

CRYPTANALYSIS AND IMPROVEMENT OF A PROXY SIGNATURE WITH MESSAGE RECOVERY USING SELF-CERTIFIED PUBLIC KEY

  • Chande, Manoj Kumar;Lee, Cheng-Chi
    • 대한수학회보
    • /
    • 제53권4호
    • /
    • pp.1051-1069
    • /
    • 2016
  • Combining the concept of self-certified public key and message recovery, Li-Zhang-Zhu (LZZ) gives the proxy signature scheme with message recovery using self-certified public key. The security of the proposed scheme is based on the discrete logarithm problem (DLP) and one-way hash function (OWHF). Their scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, their scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signer. In this paper, it is shown that in their signature scheme a malicious signer can cheat the system authority (SA), by obtaining a proxy signature key without the permission of the original signer. At the same time malicious original signer can also cheat the SA, he can also obtain a proxy signature key without the permission of the proxy signer. An improved signature scheme is being proposed, which involves the remedial measures to get rid of security flaws of the LZZ et al.'s. The security and performance analysis shows that the proposed signature scheme is maintaining higher level of security, with little bit of computational complexity.

일방향 키 분배 기능을 가지는 유연한 키 복구 시스템 (A Flexible Key Recovery System with One-way Key Distribution Property)

  • 유준석;김희도;전종민;원동호
    • 정보처리학회논문지C
    • /
    • 제8C권3호
    • /
    • pp.235-244
    • /
    • 2001
  • 급속산 암호의 민간 부문 확산에 따라 암소 사용으로 인한 부작용을 방지하기 위한 대책으로 키 복구에 대한 연구가 활발히 진행되고 있다. 그러나 지금까지 제시된 기존의 키 복구 기술들은 그 대부분이 정부의 법 집행권 보장에만 설계초점을 맞추고 있기 때문에 다양한 사용자들의 요구를 충족시키기 어렵다. 본 논문에서는 키 복구 시스템에 대한 사용주체들의 입장을 고려하여 다양한 환경에서 사용할 수 있는 키 복구 시스템을 제안한다. 제안하는 방식은 암호통신 과정 중에 키가 분배되는 일방향 키 분배가 가능하고 기존의 시스템만큼 효율적이며, 충분한 유연성을 제공한다.

  • PDF

증명가능한 비밀 분산 방식을 이용한 키 복구 시스템에 관한 연구 (A Study on the Key Recovery System using Verifiable Secret Sharing Scheme)

  • 채승철;김해만;이인수;박성준;이임영
    • 한국멀티미디어학회:학술대회논문집
    • /
    • 한국멀티미디어학회 1998년도 춘계학술발표논문집
    • /
    • pp.169-174
    • /
    • 1998
  • 암호의 사용은 사용자에게 많은 이점을 주지만, 키와 분실이나 범죄 집단의 암호의 악용과 오용 등의 가능성이 있다. 이러한 것을 해결하기 위해 나온 방식이 키 복구(Key recovery)방식이다. 본 논문에서는 비밀 분산 방식을 이용한 새로운 키 복구 방식을 제안한다. 또한 키 복구 시스템에서는 유사시에 키를 얻을 수 있는 확실한 보장이 있어야 하는데, 본 제안 방식에서는 사용자의 부정조작을 검사할 수 있게 함으로써 키 획득에 대한 보장을 할 수 있도록 하였다.

  • PDF

사용자만이 비밀키를 복구할 수 있는 키 복구 시스템 (The Key Recovery System for Users to Recover Their Own Secret Key)

  • 최희봉;유희종;오수현;원동호
    • 정보처리학회논문지C
    • /
    • 제8C권2호
    • /
    • pp.122-127
    • /
    • 2001
  • 1998년 A. Young등은 공개키 기반구조(PKI)를 이용한 키 복구 시스템인 ARC를 제안하였다. 그리고 1999년 P.Paillier 등은 ARC를 개선하여 사용자의 증명서 저장공간이 필요 없는 SE-PKI 키 복구 시스템을 제안하였다. 또한 2001년 유희종 등은 Paillier가 제안한 SE-PKI 키 복구 시스템에 비밀분산 개념을 추가하여 다수의 키 위탁 기관이 참여하는 키 복구 시스템을 제안했다. 본 논문에서는 새로운 scheme을 추가하여 사용자의 비밀키를 사용자만이 인증기관의 도움을 받아 키 위탁 기관으로부터 온 라인 상에서 안전하게 복구할 수 있는 키 복구 시스템을 제안한다. 이 키 복구 시스템에서는 사용자가 비밀키를 자주 변경하는 경우 이전 암호문을 복호화하기 위해 필요한 비밀키 관리가 용이하다.

  • PDF

An Active Clamp High Step-Up Boost Converter with a Coupled Inductor

  • Luo, Quanming;Zhang, Yang;Sun, Pengju;Zhou, Luowei
    • Journal of Power Electronics
    • /
    • 제15권1호
    • /
    • pp.86-95
    • /
    • 2015
  • An active clamp high step-up boost converter with a coupled inductor is proposed in this paper. In the proposed strategy, a coupled inductor is adopted to achieve a high voltage gain. The clamp circuit is included to achieve the zero-voltage-switching (ZVS) condition for both the main and clamp switches. A rectifier composed of a capacitor and a diode is added to reduce the voltage stress of the output rectifier diode. As a result, diodes with a low reverse-recovery time and forward voltage-drop can be utilized. Since the voltage stresses of the main and clamp switches are far below the output voltage, low-voltage-rated MOSFETs can be adopted to reduce conduction losses. Moreover, the reverse-recovery losses of the diodes are reduced due to the inherent leakage inductance of the coupled inductor. Therefore, high efficiency can be expected. Firstly, the derivation of the proposed converter is given and the operation analysis is described. Then, a steady-state performance analysis of the proposed converter is analyzed in detail. Finally, a 250 W prototype is built to verify the analysis. The measured maximum efficiency of the prototype is 95%.

Improved Trigger System for the Suppression of Harmonics and EMI Derived from the Reverse-Recovery Characteristics of a Thyristor

  • Wei, Tianliu;Wang, Qiuyuan;Mao, Chengxiong;Lu, Jiming;Wang, Dan
    • Journal of Power Electronics
    • /
    • 제17권6호
    • /
    • pp.1683-1693
    • /
    • 2017
  • This paper analyses the harmonic pollution to power grids caused by thyristor-controlled devices. It also formulates a mathematic derivation for the voltage spikes in thyristor-controlled branches to explain the harmonic and EMI derived from the reverse-recovery characteristics of the thyristor. With an equivalent nonlinear time-varying voltage source, a detailed simulation model is established, and the periodic dynamic switching characteristic of the thyristor can be explicitly implied. The simulation results are consistent with the probed results from on-site measurements. An improved trigger system with gate-shorted circuit structure is proposed to reduce the voltage spikes that cause EMI. The experimental results indicate that a prototype with the improved trigger system can effectively suppress the voltage spikes.