• Title/Summary/Keyword: Key distribution

Search Result 2,530, Processing Time 0.031 seconds

Design of GE subgroup based User Authentication Protocol For efficient Electric Commerce (효율적 전자상거래를 위한 유한체 서브그룹 기반의 사용자 인증 프로토콜 설계)

  • 정경숙;홍석미;정태충
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.1
    • /
    • pp.209-220
    • /
    • 2004
  • If protocol has fast operations and short key length, it can be efficient user authentication protocol. Lenstra and Verheul proposed XTR. XTR have short key length and fast computing speed. Therefore, this can be used usefully in complex arithmetic. In this paper, to design efficient user authentication protocol we used a subgroup of Galois Field to problem domain. Proposed protocol does not use GF(p/sup 6/) that is existent finite field, and uses GF(p²) that is subgroup and solves problem. XTR-ElGamal based user authentication protocol reduced bit number that is required when exchange key by doing with upside. Also, proposed protocol provided easy calculation and execution by reducing required overhead when calculate. In this paper, we designed authentication protocol with y/sub i/ = g/sup b.p/sup 2(i-1)//ㆍv mol q, 1(equation omitted) 3 that is required to do user authentication.

  • PDF

The Study of Efficient Rekey Interval Allotment for Minimum Cost on Secure Multicast (보안 멀티캐스트 환경에서 최소비용을 위한 효과적인 Rekey Interval 할당에 관한 연구)

  • Baag, Jin-Young;Lee, Goo-Yeon;Lee, Yong
    • Journal of Industrial Technology
    • /
    • v.21 no.A
    • /
    • pp.123-127
    • /
    • 2001
  • This paper proposed for allotment of group key's rekey interval required from secure multicast environment. New group key distribution occurs in two cases: one is periodical update and the other is permitted or unpermitted withdrawal of group member. In later case, the group controller distributes new group key to member except withdrawal member because it can't predict precisely. In former case, the group member who cheated the group can adjust the rekey interval. Using relation between security level, overhead and cost from rekey interval, this paper suggests effective rekey interval allotment through probable performance analysis in large dynamic group.

  • PDF

Securing Mobile Ad Hoc Networks Using Enhanced Identity-Based Cryptography

  • Mehr, Kamal Adli;Niya, Javad Musevi
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.512-522
    • /
    • 2015
  • Recent developments in identity-based cryptography (IBC) have provided new solutions to problems related to the security of mobile ad hoc networks (MANETs). Although many proposals to solve problems related to the security of MANETs are suggested by the research community, there is no one solution that fits all. The interdependency cycle between secure routing and security services makes the use of IBC in MANETs very challenging. In this paper, two novel methods are proposed to eliminate the need for this cycle. One of these methods utilizes a key pool to secure routes for the distribution of cryptographic materials, while the other adopts a pairing-based key agreement method. Furthermore, our proposed methods utilize threshold cryptography for shared secret and private key generation to eliminate the "single point of failure" and distribute cryptographic services among network nodes. These characteristics guarantee high levels of availability and scalability for the proposed methods. To illustrate the effectiveness and capabilities of the proposed methods, they are simulated and compared against the performance of existing methods.

Perceptions of Key Stakeholders Towards Sustainable Tourism Development: A Case Study in Mekong Delta, Vietnam

  • VU, Hieu Minh;LAM, Trung Minh;PRABHAKARAN, Sudesh
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.4
    • /
    • pp.717-726
    • /
    • 2021
  • Tourism is one of the key economic drivers not only in Vietnam but also in the world. This study explores the awareness and perceptions of key stakeholders such as local residents, tourism businesses, and tourists on sustainable tourism development in the Mekong Delta in Vietnam. Both quantitative and qualitative research approaches have been used with the secondary and primary data to provide insights on the subject. The secondary data is from vast sources, including the governmental department of tourism, statistical departments, annual all-level governmental reports, businesses, and others. The primary data is from the survey by questionnaires with 230 enterprises, 720 local residents, and 670 tourists and from the semi-structured and in-depth interviews conducted with local residents, businesses, tourists, local authorities' officers, and especially with 5 experts who are also stakeholders of Mekong Delta tourism. The results will help the related authorities understand the awareness and perceptions of the key stakeholders and deliver valuable information and a concrete delineated roadmap toward sustainable tourism development of the research settings.

Identity-Based Key Management Scheme for Smart Grid over Lattice

  • Wangke, Yu;Shuhua, Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.74-96
    • /
    • 2023
  • At present, the smart grid has become one of the indispensable infrastructures in people's lives. As a commonly used communication method, wireless communication is gradually, being widely used in smart grid systems due to its convenient deployment and wide range of serious challenges to security. For the insecurity of the schemes based on large integer factorization and discrete logarithm problem in the quantum environment, an identity-based key management scheme for smart grid over lattice is proposed. To assure the communication security, through constructing intra-cluster and inter-cluster multi-hop routing secure mechanism. The time parameter and identity information are introduced in the relying phase. Through using the symmetric cryptography algorithm to encrypt improve communication efficiency. Through output the authentication information with probability, the protocol makes the private key of the certification body no relation with the distribution of authentication information. Theoretic studies and figures show that the efficiency of keys can be authenticated, so the number of attacks, including masquerade, reply and message manipulation attacks can be resisted. The new scheme can not only increase the security, but also decrease the communication energy consumption.

Pulsed-laser-diode Intermittently Pumped 2-㎛ Acousto-optic Q-switched Tm:LuAG Laser

  • Wen, Ya;Jiang, Yan;Zheng, Hao;Zhang, Hongliang;Wang, Chao;Wu, Chunting;Jin, Guangyong
    • Current Optics and Photonics
    • /
    • v.4 no.3
    • /
    • pp.238-246
    • /
    • 2020
  • The heat distribution in crystals in a 2-㎛ acousto-optic Q-switched Tm:LuAG laser pumped by pulsed-laser-diode (pulsed-LD) intermittent-pumping technology was analyzed using COMSOL software. The thermal lensing effect of the Tm:LuAG crystal can be mitigated by pulsed-LD intermittent-pumping techniques. An experimental setup using this kind of approach achieved maximum output energy of 8.31 mJ, minimum pulse width of 101.9 ns, and highest peak power of 81.55 kW, reached at a Q-switched repetition rate of 200 Hz. It offers significant improvement of performance of the output laser beam, compared to pulsed-LD double-ended pumping technology at the same repetition rate.

On the Public Key Cryptosystems over Imaginary Quadratic Fields (복소 이차체위에서의 공개키 암호계에 관한 소고)

  • Kim, Yong-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.4
    • /
    • pp.270-273
    • /
    • 2009
  • In 1988, Buchmann et al. proposed a public key cryptosystem making use of ideals of the maximal orders in quadra tic fields which may pave the way for a public key cryptosystem using imaginary quadratic non-invertible ideals as generators. Next year, H$\ddot{u}$hnlein, Tagaki et al. published the cryptosystem with trapdoor and conductor prime p over non-maximal orders. On the other hand Kim and Moon proposed a public key cryptosystrem and a key distribution cry ptotsystem over class semigroup in 2003. We, in this paper, introduce and analyze the cryptotsystems mentioned above.

  • PDF

A stress model reflecting the effect of the friction angle on rockbursts in coal mines

  • Fan, Jinyang;Chen, Jie;Jiang, Deyi;Wu, Jianxun;Shu, Cai;Liu, Wei
    • Geomechanics and Engineering
    • /
    • v.18 no.1
    • /
    • pp.21-27
    • /
    • 2019
  • Rockburst disasters pose serious threat to mining safety and underground excavation, especially in China, resulting in massive life-wealth loss and even compulsive closed-down of some coal mines. To investigate the mechanism of rockbursts that occur under a state of static forces, a stress model with sidewall as prototype was developed and verified by a group of laboratory experiments and numerical simulations. In this model, roadway sidewall was simplified as a square plate with axial compression and end (horizontal) restraints. The stress field was solved via the Airy stress function. To track the "closeness degree" of the stress state approaching the yield limit, an unbalanced force F was defined based on the Mohr-Coulomb yield criterion. The distribution of the unbalanced force in the plane model indicated that only the friction angle above a critical value could cause the first failure on the coal in the deeper of the sidewall, inducing the occurrence of rockbursts. The laboratory tests reproduced the rockburst process, which was similar to the prediction from the theoretical model, numerical simulation and some disaster scenes.

Group Key Management using (2,4)-Tree ((2,4)-트리를 이용한 그룹키 관리)

  • 조태남;이상호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.77-89
    • /
    • 2001
  • Recently, with the explosive growth of communication technologies, group oriented services such as teleconference and multi-player game are increasing. Access control to information is handled by secret communications with group keys shared among members, and efficient updating of group keys is vital to such secret communications of large and dynamic groups. In this paper, we employ (2,4)-tree as a key tree, which is one of height balanced trees, to reduce the number of key updates caused by join or leave of members. Especially, we use CBT(Core Based Tree) to gather network configurations of group members and reflect this information to key tree structure to update group keys efficiently when splitting or merging of subgroups occurs by network failure or recovery.