• 제목/요약/키워드: Key sharing

검색결과 611건 처리시간 0.026초

보안성과 유연성을 갖춘 데이터 공유 방안 (A Data Sharing Scheme with Security and Flexibility)

  • 이구연;김화종;정충교
    • 산업기술연구
    • /
    • 제24권B호
    • /
    • pp.193-198
    • /
    • 2004
  • We propose and analyse a flexible secure file sharing scheme which can be used for data sharing among members in P2P environment. When a member wants to share data, notification messages are sent to the members with whom the member wants to share data. Each notification message includes one-time password encrypted with the receiver's public key. A member who received the notification message can download the data by using the one-time password. The proposed scheme provides selective sharing, download confirmation and efficient memory management. In terms of security, the proposed scheme supports authentication, entity privacy, replay attack protection and disguise prevention.

  • PDF

On Finding the Multicast Protection Tree Considering SRLG in WDM Optical Networks

  • Li, Yonggang;Jin, Yaohui;Li, Lemin;Li, Longjiang
    • ETRI Journal
    • /
    • 제28권4호
    • /
    • pp.517-520
    • /
    • 2006
  • In this letter, a new sharing mechanism, SRLG sharing, is proposed, which allows the links of the same shared risk link group (SRLG) in a primary light tree to share protections in WDM optical networks. In previous studies, how to share spare resources with SRLG constraints has not been studied in multicast optical networks. In this letter, considering SRLG sharing, we propose a novel algorithm -multicast with SRLG sharing (MSS)- to establish a protection light tree. Finally, the algorithm MSS and the algorithm multicast with no SRLG sharing (MNSS) are compared through a simulation to show that our new sharing scheme of SRLG sharing is more efficient than that of no SRLG sharing in terms of spare resource utilization and blocking probability.

  • PDF

Review of Revenue Sharing Contract: Evaluating its Role for Supply Chain Coordination

  • RYU, Chungsuk
    • 산경연구논집
    • /
    • 제13권3호
    • /
    • pp.1-12
    • /
    • 2022
  • Purpose: The revenue sharing contract has been widely used in industries, and its ability to coordinate the supply chain system has been studied by numerous researchers. By reviewing the representative studies on the revenue sharing contract, this study intends to analyze the key features of this coordinating contract and identify its potential to be a more advanced coordination program than the original contract. Research design, data, and methodology: This study reviews past studies on the revenue sharing contract. The selected studies are investigated with a focus on how this contract is described to realize the supply chain coordination and the key issues that they address. Results: The literature review reveals that the revenue sharing contract requires standardized details about what and how to share. This study also finds additional issues that need to be addressed by researchers to improve this coordinating contract. Conclusions: Future researchers are advised to unify the detailed contents of the revenue sharing contract to confirm that it successfully coordinates the supply chain system. In addition, this study proposes key research issues that would enhance the role of revenue sharing contract as a supply chain coordination program.

암호화를 적용한 위치 공유 앱 개발 (Development of Location Sharing App with Encryption)

  • 김도은;이재문;황기태;정인환
    • 한국인터넷방송통신학회논문지
    • /
    • 제23권6호
    • /
    • pp.27-32
    • /
    • 2023
  • 인터넷상에서 친구 위치 찾기 또는 배달 상황 공유 등 앱에서 위치 공유하는 경우가 많아지고 있다. 그러나 위치 정보는 개인의 중요한 정보이고, 경우에 따라 범죄 등 악용될 수도 있기 때문에 이러한 앱을 개발할 때는 위치 정보에 대한 암호화는 반드시 필요하다. 본 논문은 친구 찾기, 모임 장소 정하기 등의 목적으로 친구들 사이의 위치 정보를 암호화하여 공유하는 앱을 개발하는 것이다. 암호화의 성능을 높이기 위하여 비대칭 키를 이용하여 대칭 키를 암호화하여 전송하였고, 위치 공유를 위해서는 오직 대칭 키만 이용하여 암호화하였다. 제안한 앱은 iOS 상에서 개발되었으며, 성능 측정결과 위치 정보 암호화에 대하여 비대칭 키를 사용하는 것보다 대칭 키를 사용하는 경우 최소 5000배 이상 빨랐다는 것을 알 수 있었다.

보안성과 유연성을 갖춘 Peer-to-Peer 데이터 공유 기법의 설계 및 구현 (Design and Implementation of a Peer-to-Peer Data Sharing Scheme for Closed User Group with Security and Flexibility)

  • 이구연;이용;김화종;정충교;이동은
    • 정보보호학회논문지
    • /
    • 제15권4호
    • /
    • pp.61-70
    • /
    • 2005
  • We propose and implement a flexible secure peer-to-peer(P2P) file sharing scheme which can be used for data sharing among closed user group (CUG) members. When a member wants to share data, notification messages are sent to the members with whom the member wants to share data. Each notification message includes one-time password encrypted with the receiver's public key. A member who received the notification message can download the data by using the one-time password. The proposed scheme provides selective sharing, download confirmation and efficient storage management. In terms of security, the proposed scheme supports authentication, entity privacy, replay attack protection and disguise prevention. We also implement the proposed system and find that the system is very useful among P2P service of closed user groups.

Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds

  • Lu, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권7호
    • /
    • pp.2703-2718
    • /
    • 2015
  • Nowadays, public cloud storage is gaining popularity and a growing number of users are beginning to use the public cloud storage for online data storing and sharing. However, how the encrypted data stored in public clouds can be effectively shared becomes a new challenge. Proxy re-encryption is a public-key primitive that can delegate the decryption right from one user to another. In a proxy re-encryption system, a semi-trusted proxy authorized by a data owner is allowed to transform an encrypted data under the data owner's public key into a re-encrypted data under an authorized recipient's public key without seeing the underlying plaintext. Hence, the paradigm of proxy re-encryption provides a promising solution to effectively share encrypted data. In this paper, we propose a new certificate-based proxy re-encryption scheme for encrypted data sharing in public clouds. In the random oracle model, we formally prove that the proposed scheme achieves chosen-ciphertext security. The simulation results show that it is more efficient than the previous certificate-based proxy re-encryption schemes.

Group Key Management based on (2, 2) Secret Sharing

  • Wuu, Lih-Chyau;Hung, Chi-Hsiang;Kuo, Wen-Chung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권3호
    • /
    • pp.1144-1156
    • /
    • 2014
  • In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distribution of stock market information, pay per view and other subscriber services may require secure multicast to protect integrity and confidentiality of the group traffic, and validate message authenticity. Providing secure multicast for group communication is problematic without a robust group key management. In this paper, we propose a group key management scheme based on the secret sharing technology to require each member by itself to generate the group key when receiving a rekeying message multicast by the group key distributor. The proposed scheme enforces mutual authentication between a member and the group key distributor while executing the rekeying process, and provides forward secrecy and backward secrecy properties, and resists replay attack, impersonating attack, group key disclosing attack and malicious insider attack.

Using Analytic Network Process to Construct Evaluation Indicators of Knowledge Sharing Effectiveness in Taiwan's High-tech Industries

  • Liu, Pang-Lo;Tsai, Chih-Hung
    • International Journal of Quality Innovation
    • /
    • 제9권2호
    • /
    • pp.99-117
    • /
    • 2008
  • High-tech industry has been the principal economic source for Taiwan in recent years. The characteristics of high-tech industries in Taiwan are changeable product markets, short product life cycles and high company attrition rate. In the globalization trend, the high-tech industry has gradually increased corporate competitiveness and reached the goal of sustainable operations through knowledge management, knowledge sharing and new product research and development. Firms have aggressively strengthened and integrated their internal and external resources and enhanced knowledge sharing to increase industry operational performance. Effectively strengthening the knowledge management operation and performance evaluation of knowledge sharing in Taiwan's high-tech industry has become a critical issue. In the selection of knowledge sharing Key Performance Indicators (KPI), this research divided the knowledge sharing indicators into representative strategic indicators such as organizational knowledge learning, organizational knowledge resources, organizational information capacity and organizational knowledge performance through screening using Factor Analysis. The characteristics of the constructs were interdependent. This research calculated and adjusted the correlation among the key performance knowledge sharing indicators using ANP and determined the relative weight of knowledge sharing.

A Study on the Private Key Backup and Restoration using Biometric Information in Blockchain Environment

  • Seungjin, Han
    • 한국컴퓨터정보학회논문지
    • /
    • 제28권3호
    • /
    • pp.59-65
    • /
    • 2023
  • 다양한 분야에서 블록체인을 적용한 연구가 활발하게 증가함에 따라 블록체인의 사용자를 증명하는 개인키의 관리가 중요하게 되었다. 개인키를 분실하게 되면 본인의 모든 데이터에 대한 권한을 잃게 된다. 이에 대한 문제점을 해결하고자 기존에는 블록체인 지갑, 부분 정보를 이용한 개인키 복구, 분산 저장을 통한 개인키의 복구 등을 제안하였다. 본 논문에서는 Shamir's Secrete Sharing(SSS) 스킴과 생체정보를 이용하여 안전한 개인키의 백업 및 복구 방안을 제안하고 이에 대한 안전성을 메시지 교환시의 견고성, 재생공격, 중간자 공격 및 위변조 공격에 대해 평가한다.

동적 군집 무인체계를 위한 비밀분산법 기반의 그룹키 할당 기법 (Group Key Assignment Scheme based on Secret Sharing Scheme for Dynamic Swarm Unmanned Systems)

  • 이종관
    • 융합보안논문지
    • /
    • 제23권4호
    • /
    • pp.93-100
    • /
    • 2023
  • 본 논문은 여러 개의 무인체계 그룹이 하나의 그룹으로 통합되거나 하나의 무인체계 그룹이 여러 개의 그룹으로 분리될 수 있는 동적인 군집 무인체계 환경에서의 그룹키 할당 기법을 제안한다. 제안하는 프로토콜은 그룹키 생성 단계와 그룹키 공유단계로 구성된다. 그룹키 생성에는 그룹의 대표 노드만이 참여하며, 그룹 대표 노드는 비밀분산기법을 이용하여 그룹키를 여러 조각으로 분할하여 전달한다. 이를 수신한 노드들은 자신이 생성한 그룹키의 비밀 조각과 대표노드로 부터 수신한 조각들을 통해 새로운 그룹키를 개별적으로 추출하고 해시함수를 이용하여 추출된 그룹키의 무결성을 검증하다. 제안하는 기법의 성능을 보안성 및 통신효율성 측면에서 분석하여 네트워크 그룹이 매우 동적으로 변화하는 미래 군집 무인체계 운용에 효과적으로 적용될 수 있음을 확인한다.