• Title/Summary/Keyword: Oracle Problem

Search Result 53, Processing Time 0.019 seconds

Provably secure certificateless encryption scheme in the standard model

  • Deng, Lunzhi;Xia, Tian;He, Xiuru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2534-2553
    • /
    • 2020
  • Recently, numerous certificateless encryption (CLE) schemes have been introduced. The security proofs of most schemes are given under the random oracle model (ROM). In the standard model, the adversary is able to calculate the hash function instead of asking the challenger. Currently, there is only one scheme that was proved to be secure in SM. In this paper, we constructed a new CLE scheme and gave the security proofs in SM. In the new scheme, the size of the storage space required by the system is constant. The computation cost is lower than other CLE schemes due to it needs only two pairing operations.

Research on Identity-based Batch Anonymous Authentication Scheme for VANET

  • Song, Cheng;Gu, Xinan;Wang, Lei;Liu, Zhizhong;Ping, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6175-6189
    • /
    • 2019
  • To slove the security and efficiency problem of anonymous authentication in vehicular ad-hoc network (VANET), we adopt the bilinear pairing theory to propose an identity-based batch anonymous authentication scheme for VANET. The tamper-proof device in the on-board unit and the trusted authority jointly realize the anonymity of vehicle identity and the signature of messages, which further enhances the security of this scheme, as well as reduces the overhead of trusted authority. Batch authentication can improve the efficiency of anonymous authentication for VANET. Security and efficiency analyses demonstrate that this scheme not only satisfies such security properties as anonymity, non-forgeability and non-repudiation, but also has advantage in time and space complexity. Simulation results show that this scheme can achieve good performance in real-time VANET communication.

Knowledge-based Decision Support System for Process Planning in the Electric Motor Manufacturing (전동기 제조업의 지식기반 공정계획 지원시스템에 관한 연구)

  • Song, Jung-Su;Kim, Jae-Gyun;Lee, Jae-Man
    • IE interfaces
    • /
    • v.11 no.2
    • /
    • pp.159-176
    • /
    • 1998
  • In the motor manufacturing system with the properties of short delivery and order based production, the process plan is performed individually for each order by the expert of process plan after the completion of the detail design process to satisfy the specification to be required by customer. Also it is hard to establish the standard process plan in reality because part routings and operation times are varied for each order. Hence, the production planner has the problem that is hard to establish the production schedule releasing the job to the factory because there occurs the big difference between the real time to be completed the process plan and the time to be required by the production planner. In this paper, we study the decision supporting system for the process plan based on knowledge base concept. First, we represent the knowledge of process planner as a database model through the modified POI-Feature graph. Then we design and implement the decision supporting system imbedded in the heuristic algorithm in the client/server environment using the ORACLE relational database management system.

  • PDF

Elliptic Curve AMP Protocol (타원곡선을 이용한 AMP 프로토콜)

  • Ahn, Chang-Sup;Heu, Shin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.712-714
    • /
    • 2001
  • 낮은 엔트로피의 패스워드를 이용하여 안전한 인증 및 키교환을 위해 Diffie-Hellman에 기반한 AMP(Authentication and key agreement via Memorable Password) 프로토콜이 제안되었다. 본 논문에서는 타원곡선 암호화가 가질수 있는 높은 보안성과 효율성을을 위해 타원곡선이산대수문제(Elliptic Curve Discrete Logarithm Problem)에 기반한 EC-AMP (Elliptic Curve-AMP)프로토콜을 제안한다. EC-AMP는 랜덤 오라클(random oracle) 모델에서 여러 가지 공격에 대해 안전하므로 인증 및 키교환이 필요한 네트워크 환경에 패스워드를 이용함으로 얻을수 있는 편의성과 타원곡선이산대수문제가 제공하는 안전성을 보장할 수 있다.

  • PDF

New Public Key Encryption with Equality Test Based on non-Abelian Factorization Problems

  • Zhu, Huijun;Wang, Licheng;Qiu, Shuming;Niu, Xinxin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.764-785
    • /
    • 2018
  • In this paper, we present a new public key encryption scheme with equality test (PKEwET). Compared to other PKEwET schemes, we find that its security can be improved since the proposed scheme is based on non-Abelian factorization problems. To our knowledge, it is the first scheme regarding equality test that can resist quantum algorithm attacks. We show that our scheme is one-way against chosen-ciphertext attacks in the case that the computational Diffie-Hellman problem is hard for a Type-I adversary. It is indistinguishable against chosen-ciphertext attacks in the case that the Decisional Diffie-Hellman problem is hard in the random oracle model for a Type-II adversary. To conclude the paper, we demonstrate that our scheme is more efficient.

Applications of Java Computing Technology to GPS/GIS-based AVL(Automated Vehicle Location) System

  • Kim, Kwang-Soo;Kim, Min-Soo;Lee, Jae-Yeon;Lee, Ki-Won;Lee, Jong-Hun
    • Proceedings of the KSRS Conference
    • /
    • 1998.09a
    • /
    • pp.149-152
    • /
    • 1998
  • Nowadays, GIS, as multi-discipline information system, is closely linked with GPS application in conjunction with GIS-T or Logistics GIS. With this R&D trend. CPS/GIS application system for AVL is newly developed in this study. This AVL is designed and implemented by using pure Java computing technology towards com ing Car-equipped wireless Internet PC age, and main features of Java are included at this system: Platform independence, Multi-thread processing, and Object-oriented paradigm. While, because core modules of this AVL are based on GIS spatial engine, unlike other commercial AVLs, large spatial database problem handling digital image/spatial information and attribute information and direct access problem of GIS data is easily dealt with. this system can directly access external database by using JDBC: MS Access for desktop version and Oracle for W/S version. Finally, it is thought that Java-based AVL, one of CPS/CIS applications, can be easily extended into other prospective GIS applications: Land surveyor supporting system, Flight tracking system, 3D facility management system with CPS, and so forth.

  • PDF

Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group

  • Deng, Lunzhi;Yang, Yixian;Chen, Yuling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5625-5641
    • /
    • 2017
  • Certificateless public key cryptography resolves the certificate management problem in traditional public key cryptography and the key escrow problem in identity-based cryptography. In recent years, some good results have been achieved in speeding up the computation of bilinear pairing. However, the computation cost of the pairing is much higher than that of the scalar multiplication over the elliptic curve group. Therefore, it is still significant to design cryptosystem without pairing operations. A multi-signer universal designated multi-verifier signature scheme allows a set of signers to cooperatively generate a public verifiable signature, the signature holder then can propose a new signature such that only the designated set of verifiers can verify it. Multi-signer universal designated multi-verifier signatures are suitable in many different practical applications such as electronic tenders, electronic voting and electronic auctions. In this paper, we propose a certificateless multi-signer universal designated multi-verifier signature scheme and prove the security in the random oracle model. Our scheme does not use pairing operation. To the best of our knowledge, our scheme is the first certificateless multi-signer universal designated multi-verifier signature scheme.

A study on Production Process Definition through Problem Analysis of ERP System (ERP 시스템의 문제점 분석을 통한 생산관리 프로세스 정의에 관한 연구)

  • 남승돈;양광모;강경식
    • Journal of the Korea Safety Management & Science
    • /
    • v.5 no.4
    • /
    • pp.97-106
    • /
    • 2003
  • At present, tendency of ERP(Enterprise Resource Planning) enterprises is that many ERP enterprises from abroad are rushing into capture of small and medium enterprises at home actively. SAP Korea and Korean Oracle have already showed their new product targeting domestic market of small or medium standing enterprise, and more, even MS(Micro Soft) also rushes into this market in earnest. The domestic business circle of ERP should prepare countermeasure by raising the perfection of product and having good command of minute marketing strategy to survive from aggressive strategy of SMB market. In addition, about the computerization of main affairs of business, ordering developing process was general that developing staffs analysed the affairs of each department that needed computerization and construct according to the operation process by using different tools, but condition is changing that businesses themselves are purchasing business application package from expert soft program enterprise and construct. Therefore, in this study, I try to grasp the problem of management, and define a new process that can help for more efficient management by making it an object producing and management module of enterprise 'K' that is one of domestic small and medium enterprise and that is operating ERP at present. As well, through the analysis of affair related producing, we are aiming to prepare for establishment of target, its range, and making the standard of result evaluation.

Efficient Password-based Group Key Exchange Protocol (효율적인 패스워드 기반 그룹 키 교환 프로토콜)

  • 황정연;최규영;이동훈;백종명
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.59-69
    • /
    • 2004
  • Password-based authenticated group key exchange protocols provide a group of user, communicating over a public(insecure) channel and holding a common human-memorable password, with a session key to be used to construct secure multicast sessions for data integrity and confidentiality. In this paper, we present a password-based authenticated group key exchange protocol and prove the security in the random oracle model and the ideal cipher model under the intractability of the decisional Diffie-Hellman(DH) problem and computational DH problem. The protocol is scalable, i.e. constant round and with O(1) exponentiations per user, and provides forward secrecy.

A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card

  • Li, Xiaowei;Zhang, Yuqing;Liu, Xuefeng;Cao, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1313-1327
    • /
    • 2013
  • How to make people keep both the confidentiality of the sensitive data and the privacy of their real identity in communication networks has been a hot topic in recent years. Researchers proposed privacy-preserving authenticated key exchange protocols (PPAKE) to answer this question. However, lots of PPAKE protocols need users to remember long secrets which are inconvenient for them. In this paper we propose a lightweight three-party privacy-preserving authentication key exchange (3PPAKE) protocol using smart card to address the problem. The advantages of the new 3PPAKE protocol are: 1. The only secrets that the users need to remember in the authentication are their short passwords; 2. Both of the users can negotiate a common key and keep their identity privacy, i.e., providing anonymity for both users in the communication; 3. It enjoys better performance in terms of computation cost and security. The security of the scheme is given in the random oracle model. To the best of our knowledge, the new protocol is the first provably secure authentication protocol which provides anonymity for both users in the three-party setting.