• Title/Summary/Keyword: Multi-identity

Search Result 271, Processing Time 0.032 seconds

Efficient Multi-receiver Identity-Based Encryption Scheme from Bilinear Pairing (Bilinear Pairing을 이용한 효율적인 신원기반 다중 수신자 암호 기법)

  • Jung, Chae-Duk;Yoon, Suk-Bong;Sur, Chul;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.301-308
    • /
    • 2007
  • In this paper, we propose a new efficient multi-receiver identity-based encryption scheme from Bilinear Pairing. The proposed scheme eliminates pairing computation to encrypt a message for multiple receivers and only need one pairing computation to decrypt the ciphertext. Moreover, we show how to properly transform our scheme into a highly efficient stateless public key broadcast encryption scheme based on the subset-cover framework.

Frontal Face Generation Algorithm from Multi-view Images Based on Generative Adversarial Network

  • Heo, Young- Jin;Kim, Byung-Gyu;Roy, Partha Pratim
    • Journal of Multimedia Information System
    • /
    • v.8 no.2
    • /
    • pp.85-92
    • /
    • 2021
  • In a face, there is much information of person's identity. Because of this property, various tasks such as expression recognition, identity recognition and deepfake have been actively conducted. Most of them use the exact frontal view of the given face. However, various directions of the face can be observed rather than the exact frontal image in real situation. The profile (side view) lacks information when comparing with the frontal view image. Therefore, if we can generate the frontal face from other directions, we can obtain more information on the given face. In this paper, we propose a combined style model based the conditional generative adversarial network (cGAN) for generating the frontal face from multi-view images that consist of characteristics that not only includes the style around the face (hair and beard) but also detailed areas (eye, nose, and mouth).

Current Situation of Rural Multi-Cultural Families and the Welfare challenge (농촌 다문화가족의 실태 및 복지적 과제)

  • Kim, Kyoung-Min;Jung, Ki-Ok;Chang, Sae-Cheol
    • Journal of Agricultural Extension & Community Development
    • /
    • v.17 no.3
    • /
    • pp.505-526
    • /
    • 2010
  • Because of the international marriage of bachelors in the rural areas, there have been grown many foreign residents, the Multi-cultural families. For the improvement of multi-cultural families, the first important thing is their early settlement in Korea. For those foreigners' settlement, systematic approach to Korean education program is necessary. Second, multi-cultural families need support to maintain their basic lives safely. Agricultural education for the next generation is, moreover, also important for them. Third, healthy growth and training for the formation of the Self-Identity of their children are needed for those multi-cultural families too. Education for bring up their children as the global talents, the cost of private education and the one of bringing up children also have to be supported. Fourth, the improvement of understanding multicultural families is significant. Development and education of various programs to participate multi-cultural families are also required.

Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption

  • Hu, Shengzhou;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.5100-5119
    • /
    • 2018
  • Most of existing privacy-preserving multi-authorities attribute-based encryption schemes (PP-MA-ABE) only considers the privacy of the user identity (ID). However, in many occasions information leakage is caused by the disclosing of his/her some sensitive attributes. In this paper, we propose a collusion-resisting ciphertext-policy PP-MA-ABE (CRPP-MACP-ABE) scheme with hiding both user's ID and attributes in the cloud storage system. We present a method to depict anonymous users and introduce a managerial role denoted by IDM for the management of user's anonymous identity certificate ($AID_{Cred}$). The scheme uses $AID_{Cred}$ to realize privacy-preserving of the user, namely, by verifying which attribute authorities (AAs) obtain the blinded public attribute keys, pseudonyms involved in the $AID_{Cred}$ and then distributes corresponding private keys for the user. We use different pseudonyms of the user to resist the collusion attack launched by viciousAAs. In addition, we utilize IDM to cooperate with multiple authorities in producing consistent private key for the user to avoid the collusion attack launched by vicious users. The proposed CRPP-MACP-ABE scheme is proved secure. Some computation and communication costs in our scheme are finished in preparation phase (i.e. user registration). Compared with the existing schemes, our scheme is more efficient.

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

  • Elsayed Mostafa;M.M. Hassan;Wael Said
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.63-76
    • /
    • 2023
  • Identity and access management in cloud computing is one of the leading significant issues that require various security countermeasures to preserve user privacy. An authentication mechanism is a leading solution to authenticate and verify the identities of cloud users while accessing cloud applications. Building a secured and flexible authentication mechanism in a cloud computing platform is challenging. Authentication techniques can be combined with other security techniques such as intrusion detection systems to maintain a verifiable layer of security. In this paper, we provide an interactive, flexible, and reliable multi-factor authentication mechanisms that are primarily based on a proposed Authentication Method Selector (AMS) technique. The basic idea of AMS is to rely on the user's previous authentication information and user behavior which can be embedded with additional authentication methods according to the organization's requirements. In AMS, the administrator has the ability to add the appropriate authentication method based on the requirements of the organization. Based on these requirements, the administrator will activate and initialize the authentication method that has been added to the authentication pool. An intrusion detection component has been added to apply the users' location and users' default web browser feature. The AMS and intrusion detection components provide a security enhancement to increase the accuracy and efficiency of cloud user identity verification.

Effects of Social Exclusion on Unification Perception of Adolescents and Buffering Effect of National Identity (청소년의 사회적 배제가 통일의식에 미치는 영향 및 국민정체성의 조절효과)

  • Jeon, Byeong-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.173-183
    • /
    • 2015
  • This study has analyzed the factors that influence the unification perception of adolescents. To achieve this, 399 adolescents who live in Gyeonggi, Chungnam and Chungbuk area were selected as study subjects. For the data analysis, PASW Statistics 18.0 was used. The main results of this study are as follows: First, the level of unification perception of general and multi-cultural family adolescents were 3.22 and 2.96 respectively showing that general adolescents were significantly higher. Second, the factors that influence the unification perception were shown to be same for each group, but significantly different for their influence of each group. The factors that influence the unification perception of general adolescents were shown in the order of national identity, unification education, exclusion of school life. The factors that influence the unification perception of adolescents in multi-cultural family were shown in the order of exclusion of family relationship, national identity, exclusion of school life. Third, in the relationship between social exclusion and unification perception, buffering effects of national identity were identified to be different in each group. Based on these results, several ways were suggested to improve the unification perception of adolescents.

An Improvement of Certification-based One-Round Tripartite Key Agreement Protocols

  • Mtong, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.5
    • /
    • pp.297-301
    • /
    • 2013
  • Key agreement protocols allow multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. Since Joux first published the pairing-based one round tripartite key agreement protocol, many authenticated protocols have been proposed. Unfortunately, many of them have been broken while others have been shown to be deficient in some desirable security attributes. In 2004, Cheng et al. presented two protocols aimed at strengthening Shim's certificate-based and Zhang et al.'s tripartite identity-based protocols. This paper reports that 1) In Cheng et al.'s identity-based protocol, an adversary can extract long-term private keys of all the parties involved; and 2) Cheng et al.'s certification-based protocol is weak against key integrity attacks. This paper suggests possible remedies for the security flaws in both protocols and then presents a modified Cheng et al.'s identity-based, one-round tripartite protocol that is more secure than the original protocol.

  • PDF

Design Globalism & Cultural Identity (디자인의 글로벌 니즘과 문화적 아이덴티티)

  • 이재국
    • Archives of design research
    • /
    • v.11
    • /
    • pp.142-155
    • /
    • 1995
  • A matter of primary concern about all the design is concentrated on how to create more valuable things to allow people to live an affluent life. However, it is very difficult to achieve the goal because every design work is changed in accordance with given situations. Situations are changeable, so is design. There is no progress without change, but change is not necessarily progress. It is highly desirable that their changes be beneficial to mankind. Our main problem is to be able to discrimination between which should be discarded and that which should be kept, built and improved Viewed at this aspect, it is significant to study the relation between globalism and cultural identity of design, because every design has been constantly influenced by global trends and local characteristics. The paper is composed of four parts Introduction, Characteristic of global design, Cultural identity of design and Conclusion In Introduction, the purpose and background of the study are presented. In Chapter1. social back ground, multi-kinds smallproduction and new problems and searched. In Chapter2, vernacular design, transmission and propagation and tradition and innovation are considered. In Conclusion, some suggestive words on the subject are mentioned.

  • PDF

The Acquisition of National Identity: A Comparison of In-country and Over-seas Korean Adolescents (한국청소년과 재외교포 청소년의 민족정체감조사 비교)

  • Yi, Soon Hyung
    • Korean Journal of Child Studies
    • /
    • v.13 no.2
    • /
    • pp.99-112
    • /
    • 1992
  • The purpose of the present study was to investigate methodological and theoretical problems in measuring the acquisition of national identity of in-country and over-seas Korean adolescents. The subjects consisted of 344 in-country and 89 over-seas (total 433) adolescents. 14 to 26 years of age. Data were collected with the use of two questionnaires. The Cognition of National Characteristics(CNC) and The Measure of National Belongings(MNB). As statistical measures. F-test and Pearson's correlation coefficient were used. The results are disclosed as follows; 1) The concept of national identity organized not only cognition of the national characteristics in multi-dimension which is related each other, but also a sense of belonging. 2) Two measuring methods(CNC and MNB) for this study are closely related. 3) Overseas Korean adolescents performed more than in-country Korean adolescents in 5 sub-national characteristics(language, social norm, history of the nation, & breaking with ideological thinking) except the consanguinity, of CNC and MNB. Crisis hypothesis was supposed as alternative factor to explain that overseas Korean adolescents cognified about the national characteristics and feel a sense of belonging more than the in-country respondents. 4) Some demographic variables, such as age of the respondents, place of birth, level of understanding Korean language, are contributed to acquiring national identity.

  • PDF

A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4576-4598
    • /
    • 2018
  • In big data age, flexible and affordable cloud storage service greatly enhances productivity for enterprises and individuals, but spontaneously has their outsourced data susceptible to integrity breaches. Provable Data Possession (PDP) as a critical technology, could enable data owners to efficiently verify cloud data integrity, without downloading entire copy. To address challenging integrity problem on multiple clouds for multiple owners, an identity-based batch PDP scheme was presented in ProvSec 2016, which attempted to eliminate public key certificate management issue and reduce computation overheads in a secure and batch method. In this paper, we firstly demonstrate this scheme is insecure so that any clouds who have outsourced data deleted or modified, could efficiently pass integrity verification, simply by utilizing two arbitrary block-tag pairs of one data owner. Specifically, malicious clouds are able to fabricate integrity proofs by 1) universally forging valid tags and 2) recovering data owners' private keys. Secondly, to enhance the security, we propose an improved scheme to withstand these attacks, and prove its security with CDH assumption under random oracle model. Finally, based on simulations and overheads analysis, our batch scheme demonstrates better efficiency compared to an identity based multi-cloud PDP with single owner effort.