• 제목/요약/키워드: Pairing-Free

검색결과 25건 처리시간 0.023초

Analysis of Certificateless Signcryption Schemes and Construction of a Secure and Efficient Pairing-free one based on ECC

  • Cao, Liling;Ge, Wancheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권9호
    • /
    • pp.4527-4547
    • /
    • 2018
  • Signcryption is a cryptographic primitive that provides authentication (signing) and confidentiality (encrypting) simultaneously at a lower computational cost and communication overhead. With the proposition of certificateless public key cryptography (CLPKC), certificateless signcryption (CLSC) scheme has gradually become a research hotspot and attracted extensive attentions. However, many of previous CLSC schemes are constructed based on time-consuming pairing operation, which is impractical for mobile devices with limited computation ability and battery capacity. Although researchers have proposed pairing-free CLSC schemes to solve the issue of efficiency, many of them are in fact still insecure. Therefore, the challenging problem is to keep the balance between efficiency and security in CLSC schemes. In this paper, several existing CLSC schemes are cryptanalyzed and a new CLSC scheme without pairing based on elliptic curve cryptosystem (ECC) is presented. The proposed CLSC scheme is provably secure against indistinguishability under adaptive chosen-ciphertext attack (IND-CCA2) and existential unforgeability under adaptive chosen-message attack (EUF-CMA) resting on Gap Diffie-Hellman (GDH) assumption and discrete logarithm problem in the random oracle model. Furthermore, the proposed scheme resists the ephemeral secret leakage (ESL) attack, public key replacement (PKR) attack, malicious but passive KGC (MPK) attack, and presents efficient computational overhead compared with the existing related CLSC schemes.

A pairing-free key-insulated certificate-based signature scheme with provable security

  • Xiong, Hu;Wu, Shikun;Geng, Ji;Ahene, Emmanuel;Wu, Songyang;Qin, Zhiguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권3호
    • /
    • pp.1246-1259
    • /
    • 2015
  • Certificate-based signature (CBS) combines the advantages of both public key-based signature and identity-based signature, while saving from the disadvantages of drawbacks in both PKS and IBS. The insecure deployment of CBS under the hostile circumstances usually causes the exposure of signing key to be inescapable. To resist the threat of key leakage, we present a pairing-free key insulated CBS scheme by incorporating the idea of key insulated mechanism and CBS. Our scheme eliminates the costly pairing operations and as a matter of fact outperforms the existing key insulated CBS schemes. It is more suitable for low-power devices. Furthermore, the unforgeability of our scheme has been formally proven to rest on the discrete logarithm assumption in the random oracle model.

Numerical Investigation on a Rotor Tip-Vortex Instability in Very Low Advance Ratio Flight

  • Chung, Ki-Hoon;Hwang, Chang-Jeon;Lee, Duck-Joo;Yim, Jong-Bong
    • International Journal of Aeronautical and Space Sciences
    • /
    • 제6권2호
    • /
    • pp.84-96
    • /
    • 2005
  • Helical tip vortex is known as stable vortex structure, however the specific frequency component of far wake perturbation induces the vortex pairing in hover and axial flight. It is expected that the tip vortex pairing phenomena may happen in transition flight and very low advance ratio flight so that inflow may be most nonuniform in the low advance ratio flight. The objectives of this paper are that a tip-vortex instability during the transition from hover into very low advance ratio forward flight is numerically predicted to understand a physics by using a time-marching free-wake method. To achieve the objectives, numerical method is firstly validated in typical axial and forward flights cases. Present scheme with trim routine can predict airloads and inflow distribution of forward flight with good accuracy. Then, the transition flight condition is calculated. The rotor used in this wake calculation is a small-scale AH-1G model. By using a tip-vortex trajectory tracking method, the tip-vortex pairing process are clearly observed in transient flight($\mu$=0.03) and disappears at a slightly higher advance ratio($\mu$=0.05). According to the steady flight simulation at $\mu$=0.03, it is confirmed the tip-vortex pairing process is continued in the rear part of rotor disk and not occurs in the front part. Time averaged inflow in this case is predicted as smooth distribution.

효율적인 인증서기반 다중수신자 암호 기법 및 응용 (Efficient Multi-Receiver Certificate-Based Encryption Scheme and Its Application)

  • 서철;정채덕;이경현
    • 한국정보통신학회논문지
    • /
    • 제11권12호
    • /
    • pp.2271-2279
    • /
    • 2007
  • 본 논문에서는 다중수신자 환경에서 신원기반 암호 기법의 키 위탁 문제를 해결함과 동시에 묵시적인 공개키 인증을 유지하기 위하여 인증서기반 (certificate-based) 다중수신자 암호 기법을 소개한다. 제안 기법은 다중수신자에 대하여 메시지를 암호화하는 단계에서 Pairing 연산을 제거하였을 뿐만 아니라 복호화 단계에서 단 한번의 Pairing 연산만을 요구한다. 또한, Baek등에 의해 제안되었던 다중수신자 환경에서 가장 효율적인 신원기반 암호 기법[1]과의 계산량 비교를 통하여 제안 기법이 보다 효율적임을 보인다. 마지막으로 제안 기법을 이용하여 Subset-Cover 프레임워크 기반의 새로운 스테이트리스 공개키 브로드캐 스트 암호 기법을 제시한다.

Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System

  • Zhou, Jing-xian;Yan, Jian-hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.6243-6259
    • /
    • 2019
  • As a foundation of next-generation air transportation systems, automatic dependent surveillance-broadcast (ADS-B) helps pilots and air traffic controllers create a safer and more efficient national airspace system. Owing to the open communication environment, it is easy to insert fake aircraft into the system via spoofing or the insertion of false messages. Efforts have thus been made in academic research and practice in the aviation industry to ensure the security of transmission of messages of the ADS-B system. An identity-based batch verification (IBV) scheme was recently proposed to enhance the security and efficiency of the ADS-B system, but current IBV schemes are often too resource intensive because of the application of complex hash-to-point operations or bilinear pairing operations. In this paper, we propose a lightweight IBV signature scheme for the ADS-B system that is robust against adaptive chosen message attacks in the random oracle model, and ensures the security of batch message verification and against the replaying attack. The proposed IBV scheme needs only a small and constant number of point multiplication and point addition computations instead of hash-to-point or pairing operations. Detailed performance analyses were conducted to show that the proposed IBV scheme has clear advantages over prevalent schemes in terms of computational cost and transmission overhead.

Surface Gravity Waves with Strong Frequency Modulation

  • 이귀주
    • 한국해양공학회지
    • /
    • 제20권3호
    • /
    • pp.1-6
    • /
    • 2006
  • Modulation theory describes propagation of surface waves with deep wave number and frequency modulation. Locally spectrally narrow wave packet can have accumulated large scale frequency shift of carrier wave during propagation. Some important nonlinear modulation effects, such as negative frequencies, phase kinks, crest pairing, etc., often observed experimentally at long fetch propagation of finite amplitude surface wave trains, are reproduced by the proposed theory. The presented model permits also to analyze the appropriately short surface wave packets and modulation periods. Solutions show the wave phase kinks to arise on areas' of relatively small free surface displacement in complete accordance with the experiments.

Pairing Free Certificate Based Signcryption Schemes Using ECQV Implicit Certificates

  • Braeken, An
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1546-1565
    • /
    • 2019
  • Signcryption schemes offer the possibility to simultaneously sign and encrypt a message. In order to guarantee the authentication of both signer and receiver in the most efficient way during the signcryption, certificate based solutions have been proposed in literature. We first compare into detail three recently proposed certificate based signcryption systems relying on the elliptic curve discrete logarithm problem and without the usage of compute intensive pairing operations. Next, we demonstrate how the performance of these certificate based systems can be improved by using the Elliptic Curve Qu Vanstone (ECQV) implicit certificates. What is more, generalized signcryption schemes are easily derived from these schemes and the anonymity feature of sender and receiver is already inherently included or can be very efficiently obtained without a significant additional cost.

A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks

  • Ren, Huimin;Kim, Suhyun;Seo, Daehee;Lee, Imyeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권5호
    • /
    • pp.1687-1707
    • /
    • 2022
  • With the development of multiuser online meetings, more group-oriented technologies and applications for instance collaborative work are becoming increasingly important. Authenticated Group Key Agreement (AGKA) schemes provide a shared group key for users with after their identities are confirmed to guarantee the confidentiality and integrity of group communications. On the basis of the Public Key Cryptography (PKC) system used, AGKA can be classified as Public Key Infrastructure-based, Identity-based, and Certificateless. Because the latter type can solve the certificate management overhead and the key escrow problems of the first two types, Certificateless-AGKA (CL-AGKA) protocols have become a popular area of research. However, most CL-AGKA protocols are vulnerable to Public Key Replacement Attacks (PKRA) due to the lack of public key authentication. In the present work, we present a CL-AGKA scheme that can resist PKRA in order to solve impersonation attacks caused by those attacks. Beyond security, improving scheme efficiency is another direction for AGKA research. To reduce the communication and computation cost, we present a scheme with only one round of information interaction and construct a CL-AGKA scheme replacing the bilinear pairing with elliptic curve cryptography. Therefore, our scheme has good applicability to communication environments with limited bandwidth and computing capabilities.

Numerical Prediction of Rotor Tip-Vortex Roll-Up in Axial Flights by Using a Time-Marching Free-Wake Method

  • Chung, Ki-Hoon;Na, Seon-Uk;Jeon, Wan-Ho;Lee, Duck-Joo
    • International Journal of Aeronautical and Space Sciences
    • /
    • 제1권1호
    • /
    • pp.1-12
    • /
    • 2000
  • The wake geometries of a two-bladed rotor in axial flights using a time-marching free-wake method without a non-physical model of the far wake are calculated. The computed free-wake geometries of AH-1G model rotor in climb flight are compared with the experimental visualization results. The time-marching free-wake method can predict the behavior of the tip vortex and the wake roil-up phenomena with remarkable agreements. Tip vortices shed from the two-bladed rotor can interact with each other significantly. The interaction consists of a turn of the tip vortex from one blade rolling around the tip vortex from the other. Wake expansion of wake geometries in radial direction after the contraction is a result of adjacent tip vortices begging to pair together and spiral about each other. Detailed numerical results show regular pairing phenomenon in the climb flights, the hover at high angle of attack and slow descent flight too. On the contrary, unstable motions of wake are observed numerically in the hover at low angle of attack and fast descent flight. It is because of the inherent wake instability and blade-vortex-interaction rather then the effect of recirculation due to the experimental equipment.

  • PDF

재조합 E.coli에서 고온성 Bacillus 균주의 과발현에 관한 연구 (Overexpression of Termostable Bacillus sp. in Recombinant E.coli)

  • 서화정;이인선
    • 한국식품위생안전성학회지
    • /
    • 제15권1호
    • /
    • pp.51-54
    • /
    • 2000
  • 1. E.coli에서 별도의 expression vector를 사용하지 않고도 Bacillus 균주 유래의 유용효소(D-Amino acid aminotransferase;D-AAT, Aspartate aminotransferase;AspAT, Alanine dehydrogenase;AlaDH 등)의 유전자의 5'-up stream부위의 발현 기구를 검토한 결과 각 유용 효소의 유전자들의 5'-upstream부위에 존재하는 프로모터들이 연속적으로 존재한다는 사실이 유추되었고, E.coli의 SD sequence와 매우 상동성이 높은 서열 또한 존재함을 확인하였다. 2. 유용 효소 유전자의 번역과 관련된 5'-upstream 부위의 분석을 통하여 유용 효소의 유전자들은 E.coli의 ribosomal RNA와 매우 안정한 SD pairing을 형성(D-AAT의 경우: -13.0kcal/mol, AspAT의 경우; -9.5kcal/mol, AlaDH의 경우 -15.8kca1/mol)할 수 있음을 확인하여, 이러한 높은 자유에너지 변화는 E.coli내에서 유용 효소의 번역에 기여함을 예상할 수 있다.

  • PDF