• Title/Summary/Keyword: Key distribution

Search Result 2,530, Processing Time 0.04 seconds

A Efficient Key Generation and Renewal for Broadcast Encryption (브로드캐스트 암호화에서의 효율적인 키 생성과 갱신 방법)

  • Lee, Deok-Gyu;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.149-156
    • /
    • 2004
  • Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. Important thing is that only user who is permitted before only must be able to get digital information in broadcast encryption schemes. If broadcast message transfers, users who authority is get digital information to use private key given in the advance by oneself. Thus, user acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. Take advantage of two technique of proposal system. One is method that server creates key forecasting user without user's agreement, and another is method that server and user agree each other and create key Advantage of two proposal system because uses a secret key broadcast message decryption do can and renewal is available effectively using one information whatever key renewal later.

Determinants of Key Account Management Performance in Business-to-Business Relationship: The Garments Industry in Bangladesh

  • Ahmmed, Kawsar;Noor, Nor Azila Mohd
    • Journal of Distribution Science
    • /
    • v.12 no.11
    • /
    • pp.5-13
    • /
    • 2014
  • Purpose - This study traces the determinants of key account management performance in the garments industry in Bangladesh. The key account management approach involves significant challenges for marketers to manage their strategically important customers and use this approach as a strategic weapon in their selling efforts. This study examines three categories of determinants of key account management performance including operational variables, organizational variables, and relational variables by exploring data from 100% export oriented readymade garments companies in Bangladesh. Research design, data, and methodology - Data were collected from 30 readymade garments manufacturers, considering a company as a unit of analysis. Using the data, instrument validity and reliability and, subsequently, data normality were examined using the Statistical Package for the Social Sciences (SPSS) software to isolate the important determinants of key account management performance. Results - The instruments are reliable and the data are reasonably normal. Conclusion - The study explored and validated the adapted instruments of various operational, organizational, and relational antecedent factors of key account management performance, most of which were thus far ignored.

A Secure Authentication Protocol of Nodes between Cluster based on ECC (ECC 기반의 클러스터간 노드들의 안전한 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.167-175
    • /
    • 2008
  • The current pre-distribution of secret keys uses a-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among nodes and it is not efficient to find public-key because of the problem for time and energy consumption. We presents key establishment scheme designed to satisfy authentication and confidentiality, without the need of a key distribution center. Proposed scheme is scalable since every node only needs to hold a small number of keys independent of the network size, and it is resilient against node capture and replication due to the fact that keys are localized. In simulation result, we estimate process time of parameter used in proposed scheme and efficiency of Proposed scheme even if increase ECC key length.

  • PDF

The Urgency of Business Agility During COVID-19 Pandemic: Distribution of Small and Medium Business Products and Services

  • BONGSO, Gromyko;HARTOYO, Rachmat
    • Journal of Distribution Science
    • /
    • v.20 no.6
    • /
    • pp.57-66
    • /
    • 2022
  • Purpose: Business agility is an important key to survival for SMEs in Indonesia, especially during the COVID-19 pandemic. Indonesian local product distribution and service distribution are mostly served by SMEs. Agile businesses will be able to assist them in the proper distribution of products and services. This research examines how the direct and indirect influence of IT capabilities on business agility through organizational learning and business intelligence for small and medium enterprises in the distribution of Indonesian products and services. Research design, data and methodology: This research uses SEM method with SmartPLS tool. The sample of this research was conducted on small and medium enterprises in the distribution of Indonesian products and services. The sample obtained in this study was 202 SME owners or managers (strategic level). Results: Business intelligence plays a key role in improving business agility. The results of IT capability can directly and indirectly affect business agility through organizational learning. Conclusions: Business intelligence has the biggest role in increasing business agility in SMEs in Indonesia. IT capability has an indirect effect on business agility through organizational learning. The findings of this study prove that IT capabilities do not indirectly affect business agility through business intelligence.

Session Key Distribution Scheme in V2I of VANET using Identity-Based Cryptography (VANET의 V2I 환경에서 IBC를 이용한 세션키 분배 기법)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.1
    • /
    • pp.112-120
    • /
    • 2009
  • This paper proposes a session key distribution scheme on non-interactive key distribution algorithm of Identity-based cryptography in V2I of VANET. In the current VANET, IEEE 802.11i is used to provide secure data communication between the vehicle and infrastructure. However, since the 4-way handshake procedure reply when the vehicle handover to another RSU/AP, IEEE 802.11i increases the communication overhead and latency. The proposed scheme using non-interactive key distribution algorithm of Identity-based cryptography provided session key generation and exchange without message exchange and reduced communication overhead and latency than the IEEE 802.11i.

An Efficient Variant of Self-Healing Group Key Distribution Scheme with Revocation Capability (자가 치료 기능과 취소 능력을 가진 효율적인 그룹키 분배 기법)

  • Kang Ju-Sung;Hong Dowon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.941-948
    • /
    • 2005
  • In the self-healing group key distribution scheme, users are capable of recovering lost group keys on their own without requesting additional transmission from the group manager, where there is no reliable network infrastructure. In this paper, we propose a new self-healing group key distribution scheme with revocation capability, which is optimal in terms of user memory storage and more efficient in terms of communication complexity than the previous results. We obtain a slightly improved result from (13) and (14) by using the new broadcasting method. In addition, we prove that our scheme has the properties of t-wise forward secrecy and t-wise backward secrecy, and extend this self-healing approach to the session key recovery scheme from a single broadcast message.

Joint distribution of wind speed and direction in the context of field measurement

  • Wang, Hao;Tao, Tianyou;Wu, Teng;Mao, Jianxiao;Li, Aiqun
    • Wind and Structures
    • /
    • v.20 no.5
    • /
    • pp.701-718
    • /
    • 2015
  • The joint distribution of wind speed and wind direction at a bridge site is vital to the estimation of the basic wind speed, and hence to the wind-induced vibration analysis of long-span bridges. Instead of the conventional way relying on the weather stations, this study proposed an alternate approach to obtain the original records of wind speed and the corresponding directions based on field measurement supported by the Structural Health Monitoring System (SHMS). Specifically, SHMS of Sutong Cable-stayed Bridge (SCB) is utilized to study the basic wind speed with directional information. Four anemometers are installed in the SHMS of SCB: upstream and downstream of the main deck center, top of the north and south tower respectively. Using the recorded wind data from SHMS, the joint distribution of wind speed and direction is investigated based on statistical methods, and then the basic wind speeds in 10-year and 100-year recurrence intervals at these four key positions are calculated. Analytical results verify the reliability of the recorded wind data from SHMS, and indicate that the joint probability model for the extreme wind speed at SCB site fits well with the Weibull model. It is shown that the calculated basic wind speed is reduced by considering the influence of wind direction. Compared to the design basic wind speed in the Specification of China, basic wind speed considering the influence of direction or not is much smaller, indicating a high safety coefficient in the design of SCB. The results obtained in this study can provide not only references for further wind-resistance research of SCB, but also improve the understanding of the safety coefficient for wind-resistance design of other engineering structures in the similar area.

Key Distribution Scheme for Supporting Multiple Set-Top Box in Chipset Pairing Conditional Access System (칩셋 페어링 접근제한시스템 환경에서 다중 셋톱박스를 지원하는 키 분배 기법)

  • Lee, Hoon-Jung;Son, Jung-Gab;Oh, Hee-Kuck
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.39-46
    • /
    • 2012
  • In this paper, we propose a key distribution scheme for flexible chipset pairing conditional access system. Chipset pairing conditional access system is the implementation of CA (Conditional Access) module by using both embedded secure chip in a Set-Top Box(STB) and smartcard, and the secure chip embedded in a STB forms a secure channel between the smartcard and the STB. In short, it is the system that a smartcard outputs encrypted CW (Control Word) to the STB, and the STB decrypts an encrypted CW by using the embedded secure chip. The drawback of this chipset pairing conditional access system is that one smartcard is able to be used for only one specified STB since it is the system using the STB bound to a smartcard. However, the key distribution scheme proposed in this paper overcomes a drawback of current chipset pairing conditional access system by using Chinese Remainder Theorem(CRT). To be specific, with this scheme, one smartcard can be used for multiple, not single, STBs, and applied to current chipset pairing without great changes.