• Title/Summary/Keyword: Private Use

Search Result 1,491, Processing Time 0.025 seconds

Private Key Recovery on Bitcoin with Duplicated Signatures

  • Ko, Ju-Seong;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1280-1300
    • /
    • 2020
  • In the modern financial sector, interest in providing financial services that employ blockchain technology has increased. Blockchain technology is efficient and can operate without a trusted party to store all transaction information; additionally, it provides transparency and prevents the tampering of transaction information. However, new security threats can occur because blockchain technology shares all the transaction information. Furthermore, studies have reported that the private keys of users who use the same signature value two or more times can be recovered. Because private keys of blockchain identify users, private key leaks can result in attackers stealing the ownership rights to users' property. Therefore, as more financial services use blockchain technology, actions to counteract the threat of private key recovery must be continually investigated. Private key recovery studies are presented here. Based on these studies, duplicated signatures generated by blockchain users are defined. Additionally, scenarios that generate and use duplicated signatures are applied in an actual bitcoin environment to demonstrate that actual bitcoin users' private keys can be recovered.

Use of Early Childhood Care Centers and the Sociodemographic Factors of Choosing an Institute (영유아의 교육 및 보육기관 이용과 기관유형선택에 영향을 미치는 사회인구학적 요인)

  • 김지경
    • Journal of the Korean Home Economics Association
    • /
    • v.42 no.8
    • /
    • pp.65-76
    • /
    • 2004
  • The purpose of this study is to offer essential information related to early childhood education and care policy. Using the Korea Labor and Income Panel Study(KLIPS) Vol.5., this study analyzed sociodemographic factors that decide the use and type of institute for early childhood education and care. The following results are obtained: First, it is not easy for young children under three years old to use education and care institutes because of their preference for home care. Second, the mother's job status affects the child's use of child care centers and private institutes for education except for the using of early child education centers. Third, the affecting main factors for the use of child care centers are quite similar to critical factors for use of the private institute for education. Thus, young children using the private institute for education could be interpreted as coming from a low-income class compared with the children using the early child education centers.

A Study on the Improvement Plans of Private Sector Investment for the Mixed-Use of School Facilities (학교시설 복합화를 위한 민자사업 방식 개선 방안에 관한 연구)

  • Lee, Jae-Kook;Oh, Byeong-Uk
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.10 no.1
    • /
    • pp.31-38
    • /
    • 2010
  • The use of school should not be limited to student education any longer but be extended for attaining social benefits. For this reason, school should play central roles not only in education but also in childcare, welfare, culture, physical education, etc. In order for school to accommodate various new functions, it is essential to promote the mixed-uses of school facilities, and this process requires the involvement of private capitals for early achievement of social benefits from school facilities. Thus, this study purposed to examine the necessity of the multiple uses of school facilities through the investment of private capitals, to diagnose the adequacy of build-transfer-lease (BTL) applied currently to the multiple uses of school facilities, and to find obstacles to the activation of private sector investment and suggest solutions for the obstacles. In particular, this study aimed at proposing plans to enhance the efficiency of private sector investment and activate private sector investment projects by suggesting how to promote the multiple uses of school facilities in consideration of profitability for private investors.

Role and Subject of Private Security to Counter-Terrorism (테러방지를 위한 민간경비의 역할과 과제)

  • Kwon, Jeonghoon
    • Journal of the Society of Disaster Information
    • /
    • v.7 no.2
    • /
    • pp.130-139
    • /
    • 2011
  • This paper examined closely on the application of the private securities to the measures for countering terrorism. It is related to the fact that the role of human information comes into the picture nowadays. On closer examination of the application of the private securities to the national facilities, transportation, and multi-use facilities, it was found that having consistent commissioned education through the private-public cooperation and enacting legislation for allowing armed guard to board ships, making private security guards to use sniffer dogs, placing private security guards in each subway station is required, and the active publicity campaign of the government concerned needs to take place for directing and setting up the system for supervising managers of the authorities and changing the way they think of countering terrorism.

A study based on question on consciousness of electrical safety in electrical facilities for private use (자가용 전기설비 수용가의 전기안전의식에 대한 설문조사)

  • Kim, Sun-Gu;Bae, Seck-Myung;Haung, Gaung-Su;Yi, Geon-Ho
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2005.05a
    • /
    • pp.394-397
    • /
    • 2005
  • In korea, the power consumption is increasing every year because of economic growth, requiring of convenience and delightfulness condition. As increasing power consumption, Private Use is steadily increasing and the rate of electrical accident is increasing. Therefore we research the electrical safety culture of our people by the survey of electrical safety. The subject to investigation is possessor, occupier of Private Use and electrical safety manager. This paper will be used to base data for the protection of electrical accident and facility accident at Private Use

  • PDF

A Study on the Actual Condition Investigation of the Disconnecting Switchgear of 170kV GIS (170kV GIS용 단로기의 현장 사용 실태 조사)

  • Lee, Eun-Suk;Kim, Jong-Seo;Cheon, Jong-Cheol
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2003.07b
    • /
    • pp.1180-1183
    • /
    • 2003
  • 170kV GIS(Gas Insulated Switchgear) is widely used in large industrial factory-electrical facilities of private use because has many benefits. But Other equipments's failures are occurred by GIS failures and give rise economic problems to user. Therefore we will examine the actual condition of the 170kV GIS-electrical facilities of private use and are able to confirm the distribution characteristic analysis of disconnecting switchgear. In this paper, we presents the actual condition investigation of the disconnecting switchgear of 170kV GIS-electrical facilities of private use by post - failure pattern, inspection method, test equipments and so forth.

  • PDF

Study on Legal Regulations for Utilization of Drone in Private Security (민간경비에서 드론 활용과 법적 규제에 관한 연구)

  • Kim, Kye Won;Seo, Jin Seok
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.163-178
    • /
    • 2017
  • Recently, drone applications have been expanded not only in the military and security fields but also in daily life such as commercial and sports, and there is also a growing interest in using drone for private security work. This study focuses on the discussion on the use of drones in private security, drones regulation in the related laws such as the Private Security Act and the Aviation Safety Law, and major issues in accepting the Private Security Act. First, it focuses on the scope of private security work as defined by the Private Security Act, focusing on the use of drones as surveillance, information gathering, guidance and warning services, evacuation services, search and related material transport services, respectively. Second, the related laws for the use of drones in private security work include the Private Security Act and the Aviation Safety Act. However, the Private Security Act does not prescribe the current drones and the use of drones is regulated by Aviation Safety Act. Third, it is necessary to adjust the qualifications and authority range of security guards in the Private Security Act, to accept the drones as a type of security equipment, and to consider how countermeasures against threat types using drones should be accepted in the Private Security Act.

Analysis of problems caused by Big Data's private information handling (빅데이터 개인정보 취급에 따른 문제점 분석)

  • Choi, Hee Sik;Cho, Yang Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.89-97
    • /
    • 2014
  • Recently, spread of Smartphones caused activation of mobile services, because of that Big Data such as clouding service able to proceed with large amount of data which are hard to collect, save, search and analyze. Many companies collected variety of private and personal information without users' agreement for their business strategy and marketing. This situation raised social issues. As companies use Big Data, numbers of damage cases are growing. In this Thesis, when Big Data process, methods of analyze and research of data are very important. This thesis will suggest that choices of security levels and algorithms are important for security of private informations. To use Big Data, it has to encrypt the personal data to emphasize the importance of security level and selection of algorithm. Thesis will also suggest that research of utilization of Big Data and protection of private informations and making guidelines for users are require for security of private information and activation of Big Data industries.

A Study on the Blockchain based Frequency Allocation Process for Private 5G (블록체인 기반 5G 특화망 주파수 할당 프로세스 연구)

  • Won-Seok Yoo;Won-Cheol Lee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.1
    • /
    • pp.24-32
    • /
    • 2023
  • The current Private 5G use procedure goes through the step of application examination, use and usage inspection, and can be divided in to application, examination step as a procedure before frequency allocation, and use, usage inspection step as a procedure after frequency allocation. Various types of documents are required to apply for a Private 5G, and due to the document screening process and radio station inspection for using Private 5G frequencies, the procedure for Private 5G applicants to use Private 5G is complicated and takes a considerable amount of time. In this paper, we proposed Frequency Allocation Process for Private 5G using a blockchain platform, which is fast and simplified than the current procedure. Through the use of a blockchain platform and NFT (Non-Fungible Token), reliability and integrity of the data required in the frequency allocation process were secured, and security of frequency usage information was maintained and a reliable Private 5G frequency allocation process was established. Also by applying the RPA system that minimizes human intervention, fairness was secured in the process of allocating Private 5G. Finally, the frequency allocation process of Private 5G based on the Ethereum blockchain was performed though a simulation.

Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing

  • Li, Guojia;You, Lin;Hu, Gengran;Hu, Liqin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2865-2878
    • /
    • 2021
  • As a current popular technology, the blockchain has a serious issue: the private key cannot be retrieved due to force majeure. Since the outcome of the blockchain-based Bitcoin, there have been many occurrences of the users who lost or forgot their private keys and could not retrieve their token wallets, and it may cause the permanent loss of their corresponding blockchain accounts, resulting in irreparable losses for the users. We propose a recoverable private key scheme for consortium blockchain based on the verifiable secret sharing which can enable the user's private key in the consortium blockchain to be securely recovered through a verifiable secret sharing method. In our secret sharing scheme, users use the biometric keys to encrypt shares, and the preset committer peers in the consortium blockchain act as the participants to store the users' private key shares. Due to the particularity of the biometric key, only the user can complete the correct secret recovery. Our comparisons with the existing mnemonic systems or the multi-signature schemes have shown that our scheme can allow users to recover their private keys without storing the passwords accurately. Hence, our scheme can improve the account security and recoverability of the data-sharing systems across physical and virtual platforms that use blockchain technology.