• Title/Summary/Keyword: One-Time Signature

Search Result 98, Processing Time 0.028 seconds

An Efficient Micropayment System using a Session Key (세션키를 이용한 효율적 소액지불시스템)

  • Jeong Yoon Su;Baek Seung-Ho;Hwang Yoon Cheol;Oh Chung Shick;Lee Sang-ho
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.462-470
    • /
    • 2005
  • A hash chain is highly efficient and attractive structure to use in electronic cash. Previous systems using hash chain are used extensively in various cryptography applications such as one-time passwords, server-supported signatures and microments. However, The most hash chain based systems using fro-paid method provide anonymity but have the problem to increase payment cost. Therefore, in this paper, we propose a new hash chain based microment system which improves efficiency using session key and guarantees user anonymity through blind signature in the withdrawal process of the root value without disclosing privacy Information.

ENERGY SPECTRUM OF NONTHERMAL ELECTRONS ACCELERATED AT A PLANE SHOCK

  • Kang, Hye-Sung
    • Journal of The Korean Astronomical Society
    • /
    • v.44 no.2
    • /
    • pp.49-58
    • /
    • 2011
  • We calculate the energy spectra of cosmic ray (CR) protons and electrons at a plane shock with quasi-parallel magnetic fields, using time-dependent, diffusive shock acceleration (DSA) simulations, including energy losses via synchrotron emission and Inverse Compton (IC) scattering. A thermal leakage injection model and a Bohm type diffusion coefficient are adopted. The electron spectrum at the shock becomes steady after the DSA energy gains balance the synchrotron/IC losses, and it cuts off at the equilibrium momentum $p_{eq}$. In the postshock region the cutoff momentum of the electron spectrum decreases with the distance from the shock due to the energy losses and the thickness of the spatial distribution of electrons scales as $p^{-1}$. Thus the slope of the downstream integrated spectrum steepens by one power of p for $p_{br}$ < p < $p_{eq}$, where the break momentum decreases with the shock age as $p_{br}\;{\infty}\;t^{-1}$. In a CR modified shock, both the proton and electron spectrum exhibit a concave curvature and deviate from the canonical test-particle power-law, and the upstream integrated electron spectrum could dominate over the downstream integrated spectrum near the cutoff momentum. Thus the spectral shape near the cutoff of X-ray synchrotron emission could reveal a signature of nonlinear DSA.

The Impact of the Virgo Cluster on the AGN Activity

  • Tremou, Evangelia;Jung, Taehyun;Chung, Aeree;Sohn, Bong Won
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.38 no.2
    • /
    • pp.35.1-35.1
    • /
    • 2013
  • By probing nuclear regions and overall properties of AGN hosts as a function of their environments, we aim to observationally examine how AGN activities are related to their surroundings. We have selected eight representative AGN hosts in the Virgo cluster, including seven cluster members (M49, M60, M84, M87, NGC 4435, NGC 4526, NGC 4636) and one galaxy that is likely to be background (NGC 4261) but still close enough to be studied in high resolution. The selected galaxies are located in a range of density regions showing various morphology in 1.4 GHz continuum. High resolution observations with the KVN allow us to access the inner region of the AGN without suffering from dust extinction and synchrotron self-absorption. Since half of our targets are weak to be detected at K-band within its coherence time, we applied phase referencing (fast antenna position switching) to calibrate fast atmospheric phase fluctuations. We successfully detected relatively bright AGNs, such as M87, M84 and NGC4261, but no detection signature was found to the other members of the sample. In this talk, we will present our first results from our KVN observations, while we will discuss in detail the applied technique and our immediate future plans.

  • PDF

A Study of Blockchain Technology-based Electronic Voting in Shareholders' Meeting (블록체인 기술 기반의 주주총회 전자투표에 관한 연구)

  • Kim, Seog;Jeen, Sungkwang;Kim, Hyekyung;Choi, Jeongil
    • Journal of Information Technology Services
    • /
    • v.19 no.3
    • /
    • pp.101-115
    • /
    • 2020
  • Electronic voting is one of information technology service to handle a wide range of functions, including registration, certification, input and results of voting, using electronic technology, depending on the degree of automation. It helps voters exercise their voting rights not only for individual suffrage but also for major corporate decisions as shareholders by expressing their opinions regardless of geographical and time constraints. Such electronic voting helps open and expand voting participation, but on the contrary, it is possible to identify who voted and what kind of vote, such voting cannot guarantee confidentiality. Therefore, if blockchain technology is applied to electronic voting, it can increase the speed of processing and confidentiality by encrypting voting information. In this regard, the study aims to identify institutional issues on how electronic voting can be activated at a company's shareholders' meeting, and to find ways to overcome the limitations of existing electronic voting by utilizing the technical characteristics of blockchain. This study proposes a consortium-type blockchain-based electronic voting system to enhance the convenience and reliability of electronic voting for shareholders' meetings. In addition, this paper suggests how to enhance shareholders' profits through electronic voting at shareholders' meetings, as well as its policy measures and future improvements.

Secure OTP Smart Card Authentication Protocol for Denial of Service (서비스거부공격에 안전한 OTP 스마트카드 인증 프로토콜)

  • Shin, Kwang-Cheul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.201-206
    • /
    • 2007
  • Development of Information and Communication technology coming to activity of internet banking and electronic business, and smart card of medium is generalized prevailing for user authentication of electronic signature certificate management center with cyber cash, traffic card, exit and entrance card. In field that using public network, security of smart cart and privacy of card possessor's is very important. Point of smart card security is use safety for smart card by user authentication. Anonymous establishment for privacy protection and denial of service attack for availability is need to provision. In this paper, after analyze for Hwang-Li, Sun's, L-H-Y scheme, password identify element is a change of safety using one time password hash function. We proposed an efficient new smart card authentication protocol against anonymity and denial of service.

  • PDF

Event-related potentials reveal neural signatures of cross-modal interaction between visual and tactile stimulation (유발전위신호(ERP)를 통한 시각과 촉각 통합작용의 신경생리적 특징 분석)

  • Ju, Yu-Mi;Lee, Kyoung-Min
    • Proceedings of the Korean Society for Cognitive Science Conference
    • /
    • 2010.05a
    • /
    • pp.48-54
    • /
    • 2010
  • INTRODUCTION Interaction between temporal events at the millisecond level is important for visual and tactile interaction. OBJECT The aim of the present study is to identify any neural signature, as reflected in event-related potentials (ERP), for the integrative processes when the two sensory modalities are stimulated in synchrony as opposed to when they are stimulated separately. METHOD The basic strategy was to compare ERP signals obtained with simultaneous visual and tactile stimulation with a linear summation of ERP patterns obtained with each modality stimulated separately. Condition were presented, paired with various stimulus-onset-asynchronies (SOA) ranging from - 300 ms (tactile-first) to 300 ms (visual-first), and in trials where only one modality was stimulated alone. RESULT A positive deviation was located in observed ERP at C4 electrode (contralateral to the stimulated hand) at 200-400 ms, in comparison to the predicted ERP. The deviation was present at all SOAs other than -300ms (tactile-first) and 300 ms (visual-first). There was also a positive deviation at occipital leads at the 50-ms SOA (visual-first) trials. DISCUSSION It suggested that neural signatures of cross-modal integration occur within a limited time-window. The deviations were specifically localized at the contralateral somatosensory and visual cortices, indicating that the integration happens at or before the level of the primary cortices.

  • PDF

A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid

  • Zhang, Yueyu;Chen, Jie;Zhou, Hua;Dang, Lanjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.617-636
    • /
    • 2021
  • This paper presents a privacy-preserving data aggregation scheme deals with the multidimensional data. It is essential that the multidimensional data is rarely mentioned in all researches on smart grid. We use the Paillier Cryptosystem and blinding factor technique to encrypt the multidimensional data as a whole and take advantage of the homomorphic property of the Paillier Cryptosystem to achieve data aggregation. Signature and efficient batch verification have also been applied into our scheme for data integrity and quick verification. And the efficient batch verification only requires 2 pairing operations. Our scheme also supports fault tolerance which means that even some smart meters don't work, our scheme can still work well. In addition, we give two extensions of our scheme. One is that our scheme can be used to compute a fixed user's time-of-use electricity bill. The other is that our scheme is able to effectively and quickly deal with the dynamic user situation. In security analysis, we prove the detailed unforgeability and security of batch verification, and briefly introduce other security features. Performance analysis shows that our scheme has lower computational complexity and communication overhead than existing schemes.

An Efficient Multi-Layer Encryption Framework with Authentication for EHR in Mobile Crowd Computing

  • kumar, Rethina;Ganapathy, Gopinath;Kang, GeonUk
    • International journal of advanced smart convergence
    • /
    • v.8 no.2
    • /
    • pp.204-210
    • /
    • 2019
  • Mobile Crowd Computing is one of the most efficient and effective way to collect the Electronic health records and they are very intelligent in processing them. Mobile Crowd Computing can handle, analyze and process the huge volumes of Electronic Health Records (EHR) from the high-performance Cloud Environment. Electronic Health Records are very sensitive, so they need to be secured, authenticated and processed efficiently. However, security, privacy and authentication of Electronic health records(EHR) and Patient health records(PHR) in the Mobile Crowd Computing Environment have become a critical issue that restricts many healthcare services from using Crowd Computing services .Our proposed Efficient Multi-layer Encryption Framework(MLEF) applies a set of multiple security Algorithms to provide access control over integrity, confidentiality, privacy and authentication with cost efficient to the Electronic health records(HER)and Patient health records(PHR). Our system provides the efficient way to create an environment that is capable of capturing, storing, searching, sharing, analyzing and authenticating electronic healthcare records efficiently to provide right intervention to the right patient at the right time in the Mobile Crowd Computing Environment.

A Study on the protection of personal information using a Virtual IDs in an anonymous bulletin board (익명 게시판 환경에서 가상 아이디를 이용한 개인정보보호에 관한 연구)

  • Min, So-Yeon;Jang, Seung-Jae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.9
    • /
    • pp.4214-4223
    • /
    • 2012
  • The argument related to the use of real and anonymous names on the Internet bulletin board has recently become a main issue. When using real names, it is possible to violate free discussion and privacy. Also, when using anonymous names, it is possible to have the reverse function of the Internet in regard to the use of malicious replies or the distribution of false ideas. Therefore, this paper has made it possible to prevent the spread of the user's personal information and execute the single log-in process by using the XML-token method which is one of the SSO technologies. Also, by issuing virtual IDs and forming the path when establishing tokens, the anonymous bulletin board which provides anonymity with a conditional tracing process has been suggested. After analyzing the performance of visitor numbers at authentication time, the anonymous bulletin board based on the group signature method showed the average response rate of 0.72 seconds, 0.18 seconds, which was suggested scheme. In the authentication time 4-5 times faster response speed, respectively. Also, since the suggested system does not have to provide a single authentication process or make the user provide his or her signature, the level of user's convenience seems to be much higher. Such a result shows that the system suggested on the anonymous bulletin board has a more appropriate level of user's convenience.

Intrusion Detection Method Using Unsupervised Learning-Based Embedding and Autoencoder (비지도 학습 기반의 임베딩과 오토인코더를 사용한 침입 탐지 방법)

  • Junwoo Lee;Kangseok Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.8
    • /
    • pp.355-364
    • /
    • 2023
  • As advanced cyber threats continue to increase in recent years, it is difficult to detect new types of cyber attacks with existing pattern or signature-based intrusion detection method. Therefore, research on anomaly detection methods using data learning-based artificial intelligence technology is increasing. In addition, supervised learning-based anomaly detection methods are difficult to use in real environments because they require sufficient labeled data for learning. Research on an unsupervised learning-based method that learns from normal data and detects an anomaly by finding a pattern in the data itself has been actively conducted. Therefore, this study aims to extract a latent vector that preserves useful sequence information from sequence log data and develop an anomaly detection learning model using the extracted latent vector. Word2Vec was used to create a dense vector representation corresponding to the characteristics of each sequence, and an unsupervised autoencoder was developed to extract latent vectors from sequence data expressed as dense vectors. The developed autoencoder model is a recurrent neural network GRU (Gated Recurrent Unit) based denoising autoencoder suitable for sequence data, a one-dimensional convolutional neural network-based autoencoder to solve the limited short-term memory problem that GRU can have, and an autoencoder combining GRU and one-dimensional convolution was used. The data used in the experiment is time-series-based NGIDS (Next Generation IDS Dataset) data, and as a result of the experiment, an autoencoder that combines GRU and one-dimensional convolution is better than a model using a GRU-based autoencoder or a one-dimensional convolution-based autoencoder. It was efficient in terms of learning time for extracting useful latent patterns from training data, and showed stable performance with smaller fluctuations in anomaly detection performance.