• Title/Summary/Keyword: Key distribution

Search Result 2,530, Processing Time 0.025 seconds

The Secure and Efficient Key Agreement Protocol with Direct Authentication (직접적 인증을 제공하는 안전하고 효율적인 키동의 프로토콜)

  • Lee, Hyung-Kyu;Lee, Kyung-Ho;Cha, Young-Tae;Sim, Joo-Geol;Won, Dong-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3613-3621
    • /
    • 1999
  • In this paper, we analyzed the suity of key distribution protocol based on discrete logarithm for the purpose of designing key distribution protocol systematically. We also propose the efficient key agreement protocol with direct authentication. In comparison with Station-to-Station protocol, it provides the direct authentication using the Diffie-Hellman problem without signature.

  • PDF

Recent Technology Trends of Free-Space Quantum Key Distribution System and Components (무선 양자암호통신 시스템 및 부품 최신 기술 동향)

  • Youn, C.J.;Ko, H.;Kim, K.J.;Choi, B.S.;Choe, J.S.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.6
    • /
    • pp.94-106
    • /
    • 2018
  • A quantum key distribution (QKD) provides in principle an unconditional secure communication unlike the standard public key cryptography depending on the computational complexity. In particular, free-space QKD can give a secure solution even without a fiber-based infrastructure. In this paper, we investigate an overview of recent research trends in the free-space QKD system, including satellite and handheld moving platforms. In addition, we show the key components for a free-space QKD system such as the integrated components, single photon detectors, and quantum random number generator. We discuss the technical challenges and progress toward a future free- space QKD system and components.

Applied to Satellite Network of Modified Diffie-Hellman Scheme (Diffie-Hellman 방법의 위성망에서의 응용)

  • Park, Jeong-Hyun;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.3
    • /
    • pp.23-30
    • /
    • 1996
  • This paper presented a key distribution scheme based on the Yacobi scheme that does not use the secret key provided by key distribution center as a power, but uses instead a random number generated by the user. The scheme is independent of the exposure of the secret key. Then this paper described modified Diffie-Hellman schemes based on the discrete logarithm and prime resolution into factors. The modified DH scheme was applied to point-to-multicasting, and broadcasting networks via satellite.

A Trusted Key Management Scheme for Digital Rights Management

  • Jeong, Yeon-Jeong;Yoon, Ki-Song;Ryou, Jae-Cheol
    • ETRI Journal
    • /
    • v.27 no.1
    • /
    • pp.114-117
    • /
    • 2005
  • In this paper, we propose a key management scheme which can provide delivery of the key used to encrypt a digital content from the package server to digital rights management (DRM) clients in a secure manner. The proposed scheme can protect digital content from attacks since an encrypted digital content is sent by a package server and only DRM clients can decrypt the encrypted digital content. It protects the key not only from purchasers but also among the other principals who manage the distribution and license servers.

  • PDF

Disease vector occurrence and ecological characteristics of chiggers on the chestnut white-bellied rat Niviventer fulvescens in Southwest China between 2001 and 2019

  • Yan-Ling Chen;Xian-Guo Guo;Wen-Yu Song;Tian-Guang Ren;Lei Zhang;Rong Fan;Cheng-Fu Zhao;Zhi-Wei Zhang;Wen-Ge Dong;Xiao-Bin Huang;Dao-Chao Jin
    • Parasites, Hosts and Diseases
    • /
    • v.61 no.3
    • /
    • pp.272-281
    • /
    • 2023
  • Chigger mites are the vector of scrub typhus. This study estimates the infestation status and ecological characteristics of chiggers on the chestnut white-bellied rat Niviventer fulvescens in Southwest China between 2001 and 2019. Chiggers were identified under the microscope, and infestation indices were calculated. The Preston's log-normal model was used to fit the curve of species abundance distribution. A total of 6,557 chiggers were collected in 136 of 342 N. fulvescens rats, showing high overall infestation indices (prevalence=39.8%, mean abundance=19.2, mean intensity=48.2) and high species diversity (S=100, H'=3.0). Leptotrombidium cangjiangense, Neotrombicula japonica, and Ascoschoengastia sifanga were the three dominant chigger species (constituent ratio=42.9%; 2,736/6,384) and exhibited an aggregated distribution among different rat individuals. We identified 100 chigger species, with 3 of them (Leptotrombidium scutellare, Leptotrombidium wenense, and Leptotrombidium deliense) as the main vectors of scrub typhus in China and nine species as potential vectors of this disease. Disease vector occurrence on N. fulvescens may increase the risk of spreading scrub typhus from rats to humans. Chigger infestation on N. fulvescens varied significantly in different environments. The species abundance distribution showed a log-normal distribution pattern. The estimated number of chigger species on N. fulvescens was 126 species.

Key Distribution Protocol Appropriate to Wireless Terminal Embedding IC Chip (IC 칩을 내장한 무선 단말기에 적용 가능한 키 분배 프로토콜)

  • 안기범;김수진;한종수;이승우;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.85-98
    • /
    • 2003
  • Computational power of IC chip is improved day after day producing IC chips holding co-processor continuously. Also a lot of wireless terminals which IC chip embedded in are produced in order to provide simple and various services in the wireless terminal market. However it is difficult to apply the key distribution protocol under wired communication environment to wireless communication environment. Because the computational power of co-processor embedded in IC chip under wireless communication environment is less than that under wired communication environment. In this paper, we propose the hey distribution protocol appropriate for wireless communication environment which diminishes the computational burden of server and client by using co-processor that performs cryptographic operations and makes up for the restrictive computational power of terminal. And our proposal is satisfied with the security requirements that are not provided in existing key distribution protocol.

Effect of bamboo shoot dietary fiber on gel properties, microstructure and water distribution of pork meat batters

  • Li, Ke;Liu, Jun-Ya;Fu, Lei;Zhao, Ying-Ying;Zhu, He;Zhang, Yan-Yan;Zhang, Hua;Bai, Yan-Hong
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.33 no.7
    • /
    • pp.1180-1190
    • /
    • 2020
  • Objective: To develop healthier comminuted meat products to meet consumer demand, the gel properties, rheological properties, microstructure and water distribution of pork meat batters formulated with various amounts of bamboo shoot dietary fiber (BSDF) were investigated. Methods: Different levels of BSDF (0% to 4%) were added to pork batters, and the pH, color, water-holding capacity, texture and rheological properties of pork batters were determined. Then, pork batters were analyzed for their microstructure and water distribution using scanning electron microscopy (SEM) and low-field nuclear magnetic resonance (LF-NMR). Results: Compared with the control, BSDF addition into meat batters showed a significant reduction in L*-value and a significant increase in b*-value (p<0.05). BSDF addition of up to 4% reduced the pH value of pork batters by approximately 0.15 units; however, the cooking loss and expressible water loss decreased significantly (p<0.05) with the increased addition of BSDF. The hardness and gel strength were noticeably enhanced (p<0.05) as the content of BSDF increased. The rheological results showed that BSDF added into pork batters produced higher storage modulus (G') and loss modulus (G") values. The SEM images suggested that the addition of BSDF could promote pork batters to form a more uniform and compact microstructure. The proportion of immobilized water increased significantly (p<0.05), while the population of free water was decreased (p<0.05), indicating that BSDF improved the water-holding capability of pork batters by decreasing the fraction of free water. Conclusion: BSDF could improve the gel properties, rheological properties and water distribution of pork meat batters and decrease the proportion of free water, suggesting that BSDF has great potential as an effective binder in comminuted meat products.

Investigation on moisture migration of unsaturated clay using cross-borehole electrical resistivity tomography technique

  • Lei, Jiang;Chen, Weizhong;Li, Fanfan;Yu, Hongdan;Ma, Yongshang;Tian, Yun
    • Geomechanics and Engineering
    • /
    • v.25 no.4
    • /
    • pp.295-302
    • /
    • 2021
  • Cross-borehole electrical resistivity tomography (ERT) is an effective groundwater detection tool in geophysical investigations. In this paper, an artificial water injection test was conducted on a small clay sample, where the high-resolution cross-borehole ERT was used to investigate the moisture migration law over time. The moisture migration path can be two-dimensionally imaged based on the relationship between resistivity and saturation. The hydraulic conductivity was estimated, and the magnitude ranged from 10-11 m/s to 10-9 m/s according to the comparison between the simulation flow and the saturation distribution inferred from ERT. The results indicate that cross-borehole ERT could help determine the resistivity distribution of small size clay samples. Finally, the cross-borehole ERT technique has been applied to investigate the self-sealing characteristics of clay.

Key Distribution for Heterogeneous Public-Key Cryptosystems

  • Lv, Xixiang;Yi, Mu;Hui, Li
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.464-468
    • /
    • 2013
  • The widespread use of cryptographic technologies is complicated by inconsistencies and duplication in the key management systems supporting their applications. The proliferation of key management systems or protocols also results in higher operational and infrastructure costs, and fails in interoperability. Thus, it is essential to realize key management interoperability between different and heterogeneous cryptosystems. This paper presents a practical and separable key management system for heterogeneous public-key cryptosystems. We achieve the interoperability between different cryptosystems via cryptography approaches rather than communication protocols. With our scheme, each client can freely use any kind of cryptosystemthat it likes. The proposed scheme has two advantages over the key management interoperability protocol introduced by the organization for the advancement of structured information standards. One is that all the related operations do not involve the communication protocol and thus no special restrictions are taken on the client devices. The other is that the proposed scheme does not suffer from single-point fault and bottleneck problems.

Precoder Distribution and Adaptive Codebook in Wideband Precoding

  • Long, Hang;Kim, Kyeong Jin;Xiang, Wei;Wang, Jing;Liu, Yuanan;Wang, Wenbo
    • ETRI Journal
    • /
    • v.34 no.5
    • /
    • pp.655-665
    • /
    • 2012
  • Based on wideband precoding (WBP) in the multiple-input multiple-output orthogonal frequency division multiplexing system, an adaptive nonuniform codebook is presented in this paper. The relationship between the precoder distribution and spatial correlation is analyzed at first. A closed-form expression based on overlapped isosceles triangles is proposed as an approximation of the precoder distribution. Then, the adaptive codebook design is derived with the approximate distribution to minimize quantization errors. The capacity and bit error rate performance demonstrate that the adaptive codebook with WBP outperforms the conventional fixed uniform codebook.