• Title/Summary/Keyword: Key generation

Search Result 1,491, Processing Time 0.024 seconds

Performance Analysis on Strongest Channel Gain User for Intelligent Reflecting Surface NOMA

  • Kyuhyuk Chung
    • International journal of advanced smart convergence
    • /
    • v.12 no.3
    • /
    • pp.19-24
    • /
    • 2023
  • Recently, fifth generation (5G) networks are being deployed in phases all over the world, the paradigm has shifted to developing the next generation wireless technologies, which have grown exponentially in last few decades, wireless networks are promising for the demand to enormous connections. Non-orthogonal multiple access (NOMA) and intelligent reflecting surface (IRS) are considered as the key technoloies for next-generation beyond 5G (B5G) and sixth generation (6G) networks, in which IRS can play an important advance in the wireless propagation environment, and NOMA can effectively increase massive connectivity to improve user fairness. In this paper, we analyze a performance on the strongest channel user in terms of achievable data rates numerically. Then, with the achievable data rates, the signal-to-noise ratio (SNR) gain is calculated for the IRS-NOMA network over the conventional NOMA network. As a consequence, IRS-NOMA schemes have been considered as some key technologies.

Deduction for Key Uncertainty Factors for the Next-generation Convergence Service (차세대 컨버전스서비스 핵심불확실성요인 도출에 관한 분석)

  • Sawng, Yeong-Wha;Park, Sun-Young;Lee, Jung-Mann
    • Journal of Korea Technology Innovation Society
    • /
    • v.12 no.1
    • /
    • pp.212-236
    • /
    • 2009
  • This study is an attempt to deduct environmental uncertainties facing next-generation convergence services, in four areas including customer, technology, service provider and regulation. We assess the level of residual uncertainty with regard to key environmental uncertainty factors, and conduct a scenario planning analysis. Based on the results of this analysis, we provide suggestions on market entry strategy for providers of this next-generation convergence service. The strategic assessment of six scenarios developed in this study, each with two levels of residual uncertainty (alternate futures and a range of futures) resulted in two key success factors (KSF), namely, customer demand trends and easing of advertising restrictions. Four types of strategic scenarios were then discerned, for each of which we present response capabilities that may be required of service providers, along with strategic suggestions. The results of this study are rich in implications for both policy-makers and regulators seeking ways to create and stimulate a convergence service market and prospective providers of next-generation convergence services, as they provide concrete tips related to market entry strategy, including efficient resource allocation, types of market entry and time-frames for entry.

  • PDF

A Security Nonce Generation Algorithm Scheme Research for Improving Data Reliability and Anomaly Pattern Detection of Smart City Platform Data Management (스마트시티 플랫폼 데이터 운영의 이상패턴 탐지 및 데이터 신뢰성 향상을 위한 보안 난수 생성 알고리즘 방안 연구)

  • Lee, Jaekwan;Shin, Jinho;Joo, Yongjae;Noh, Jaekoo;Kim, Jae Do;Kim, Yongjoon;Jung, Namjoon
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.4 no.2
    • /
    • pp.75-80
    • /
    • 2018
  • The smart city is developing an energy system efficiently through a common management of the city resource for the growth and a low carbon social. However, the smart city doesn't counter a verification effectively about a anomaly pattern detection when existing security technology (authentication, integrity, confidentiality) is used by fixed security key and key deodorization according to generated big data. This paper is proposed the "security nonce generation based on security nonce generation" for anomaly pattern detection of the adversary and a safety of the key is high through the key generation of the KDC (Key Distribution Center; KDC) for improvement. The proposed scheme distributes the generated security nonce and authentication keys to each facilities system by the KDC. This proposed scheme can be enhanced to the security by doing the external pattern detection and changed new security key through distributed security nonce with keys. Therefore, this paper can do improving the security and a responsibility of the smart city platform management data through the anomaly pattern detection and the safety of the keys.

Reduce on the Cost of Photovoltaic Power Generation for Polycrystalline Silicon Solar Cells by Double Printing of Ag/Cu Front Contact Layer

  • Peng, Zhuoyin;Liu, Zhou;Chen, Jianlin;Liao, Lida;Chen, Jian;Li, Cong;Li, Wei
    • Electronic Materials Letters
    • /
    • v.14 no.6
    • /
    • pp.718-724
    • /
    • 2018
  • With the development of photovoltaic industry, the cost of photovoltaic power generation has become the significant issue. And the metallization process has decided the cost of original materials and photovoltaic efficiency of the solar cells. Nowadays, double printing process has been introduced instead of one-step printing process for front contact of polycrystalline silicon solar cells, which can effectively improve the photovoltaic conversion efficiency of silicon solar cells. Here, the relative cheap Cu paste has replaced the expensive Ag paste to form Ag/Cu composite front contact of silicon solar cells. The photovoltaic performance and the cost of photovoltaic power generation have been investigated. With the optimization on structure and height of Cu finger layer for Ag/Cu composite double-printed front contact, the silicon solar cells have exhibited a photovoltaic conversion efficiency of 18.41%, which has reduced 3.42 cent per Watt for the cost of photovoltaic power generation.

Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption

  • Du, Jiajie;HelIl, Nurmamat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3274-3297
    • /
    • 2021
  • Permission delegation is an important research issue in access control. It allows a user to delegate some of his permissions to others to reduce his workload, or enables others to complete some tasks on his behalf when he is unavailable to do so. As an ideal solution for controlling read access on outsourced data objects on the cloud, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has attracted much attention. Some existing CP-ABE schemes handle the read permission delegation through the delegation of the user's private key to others. Still, these schemes lack the further consideration of granularity and traceability of the permission delegation. To this end, this article proposes a flexible and fine-grained CP-ABE key delegation approach that supports white-box traceability. In this approach, the key delegator first examines the relations between the data objects, read permission thereof that he intends to delegate, and the attributes associated with the access policies of these data objects. Then he chooses a minimal attribute set from his attributes according to the principle of least privilege. He constructs the delegation key with the minimal attribute set. Thus, we can achieve the shortest delegation key and minimize the time of key delegation under the premise of guaranteeing the delegator's access control requirement. The Key Generation Center (KGC) then embeds the delegatee's identity into the key to trace the route of the delegation key. Our approach prevents the delegatee from combining his existing key with the new delegation key to access unauthorized data objects. Theoretical analysis and test results show that our approach helps the KGC transfer some of its burdensome key generation tasks to regular users (delegators) to accommodate more users.

Factors Influencing Innovation Capability and Operational Performance: A Case Study of Power Generation Fields in Vietnam

  • NGUYEN, To Tam;LE-ANH, Tuan;NGUYEN, Thi Xuan Hoa
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.5
    • /
    • pp.541-552
    • /
    • 2022
  • This research examines the effects of organizational learning and network involvement, as well as many contextual factors, on power generation businesses' innovation capability and operational success in Vietnam. This research also aims to attest to the moderating roles of top management support and company age, and firm possession type in the power generation industry. This study applied the exploratory factor analysis (EFA) and PLS-SEM approach for data analysis. In this research, we have tested hypotheses with data collected from 132 top managers and other key personnel from power generation companies in Vietnam. The results also attest to the moderating role of top management support on the two relationships between organizational learning - innovation capability and network involvement - innovation capability. Another important finding is that the company age has a negative impact on operational performance but shows a positive moderating role in the relationship between innovation capability and operational performance. This study highlights the central roles of organizational learning and innovation capability in impacting the organizational performance of power generation companies. These companies play a key role in supporting the development of industries in practice. This research also emphasizes the moderating roles of top management support and company age and possession type in practice.

Stereoscopic Conversion based on Key Frames (키 프레임 기반 스테레오스코픽 변환 방법)

  • 김만배;박상훈
    • Journal of Broadcast Engineering
    • /
    • v.7 no.3
    • /
    • pp.219-228
    • /
    • 2002
  • In this paper, we propose a new method of converting 2D video into 3D stereoscopic video, called stereoscopic conversion. In general, stereoscopic images are produced using the motion informations. However unreliable motion informations obtained especially from block-based motion estimation cause the wrong generation of stereoscopic images. To solve for this problem, we propose a stereoscopic conversion method based upon the utilization of key frame that has the better accuracy of estimated motion informations. As well, as generation scheme of stereoscopic images associated with the motion type of each key frame is proposed. For the performance evaluation of our proposed method, we apply it to five test images and measure the accuracy of key frame-based stereoscopic conversion. Experimental results show that our proposed method has the accuracy more than about 90 percent in terms of the detection ratio of key frames.

Secure Recovery Protocol of (1,3) Distributed Key Share with Trustless Setup for Asset Management in Blockchain (블록체인 기반 가상자산 관리를 위한 (1,3) 분산키의 비신뢰 기반 안전한 분산 복구 프로토콜)

  • Bae, Kyoungil;Park, Junhoo;Ryou, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.863-874
    • /
    • 2021
  • Distributed key generation (DKG) with trustless setup is a cryptographic protocol that distributes Shamir secret shares of a private key to participants while keeping the actual private key hidden to the participants. Also, by extending it to a threshold signature protocol, digital signatures can be generated without construction of private keys. This paper proposes a recovery protocol maintaining trustless setup assumptions, in particular to the useful (1,3) share structure. The proposed protocol meets same levels of security requirements with DKG in terms of correctness and secrecy. The protocol can also enable delegation and revocation of digital sign rights for blockchain-based asset management.

The Efficient Group Key Management Blocking Collusion Attack (공모공격을 차단하는 효율적인 그룹 키 관리)

  • Kim, Tae-Gyun;Chung, Jong-In
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.409-418
    • /
    • 2004
  • Multicast services are provided on the Internet in fast increasing . Therefore it is important to keep security for multicast communication. Member leaving is deeply associated with scalability problem for group key management. If one member of the group is removed, new group key has to be generated and distributed to all remaining members of group. Minimizing the number of messages and operation cost for generation of the composite keys are important evaluating criteria of multicast key management scheme since generation and distribution of new keys for rekeying require expensive operation. Batch removal can reduce these important parameters rather than removing members sequentially In fashion one after another. In this paper, Hamming distance is calculated between eve교 members to be removed. The members with Hamming distance less than threshold are selected for rekeying procedure. With running the round assignment algorithm In the case of removing several members simultaneously, our model has advantages of reducing the number of message and operation cost for generation of the composite keys and eliminating possibility of collusion attack for rekeying.

The One Time Biometric Key Generation and Authentication Model for Portection of Paid Video Contents (상용 비디오 콘텐츠 보호를 위한 일회용 바이오메트릭 키 생성 및 인증 모델)

  • Yun, Sunghyun
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.101-106
    • /
    • 2014
  • Most peoples are used to prefer to view the video contents rather than the other contents since the video contents are more easy to understand with both their eyes and ears. As the wide spread use of smartphones, the demands for the contents services are increasing rapidly. To promote the contents business, it's important to provide security of subscriber authentication and corresponding communication channels through which the contents are delivered. Generally, symmetric key encryption scheme is used to protect the contents in the channel, and the session key should be upadated periodically for the security reasons. In addition, to protect viewing paid contents by illegal users, the proxy authentication should not be allowed. In this paper, we propose biometric based user authentication and one time key generation models. The proposed model is consist of biometric template registration, session key generation and chanel encryption steps. We analyze the difference and benefits of our model with existing CAS models which are made for CATV contents protection, and also provides applications of our model in electronic commerce area.