• Title/Summary/Keyword: Private key

Search Result 685, Processing Time 0.023 seconds

The Study on Community Formation Effect from Urban Garden Management by Different Operators (도시텃밭 운영주체별 운영방식의 차이에 따른 공동체 형성 효과)

  • Lee, Cha-Hee;Son, Yong-Hoon
    • Journal of Korean Society of Rural Planning
    • /
    • v.20 no.1
    • /
    • pp.63-76
    • /
    • 2014
  • The purpose of this study is to identify effect in how urban garden is run by different operators in Korea, and consequently how it determines the level of community formation among urban garden users. Based on this analysis, the study is intended to present some points as to how to better manage urban garden. The operators are divided into three types: public, public-private partnership and private. The study interviewed each operating entity and surveyed garden users to gauge the extent to which communities are developed. After the ANOVA analysis and Scheffe post-hoc analysis, it was found that the levels of community formation among users of public and public-private partnership urban gardens were similar (so can be grouped together), whereas that of private urban garden users was higher (separated as another group). However, this study found no meaningful differences in the level of community formation among all types of urban garden in a local community. Some key suggestions are made as a result. First, as for the public and public-private partnership types of urban garden, it is necessary to foster leaders to build a community. Next, it is worth noting the potential of public-private partnership in realizing community revival through urban garden. The last suggestion is that, generally, the urban garden has only little influence on community formation in a local area so far, thus more practical consideration needs to be given to enhance the role of urban garden in a local community.

A password-based mutual authentication and key-agreement protocol (패스워드 기반의 상호 인증 및 키 교환 프로토콜)

  • 박호상;정수환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.37-43
    • /
    • 2002
  • This paper proposes a password-based mutual authentication and key agreement protocol, which is designed by applying ECDSA and ECDH. The proposed protocol, AKE-ECC, computes 2 times of point multiplication over ECC on each of client and server, and generates the key pairs(public key. private key) and a common session key using ECDH that is different compare to previously proposed protocol. It is against common attacks include a dictionary attack and the security of proposed protocol is based on the ECDLP, ECDH.

Statistical Analysis of Private Education Expenses in Korea (초·중·고생의 사교육비 지출에 대한 통계 분석)

  • Oh, Man-Suk;Kim, Jin-Hee
    • The Korean Journal of Applied Statistics
    • /
    • v.24 no.1
    • /
    • pp.193-206
    • /
    • 2011
  • Due to the great impact of private education expenses on many areas including economics and politics, reducing private education expenses is one of the key issues in Korea. In this paper, we analyze the data from a survey on private education expenses, conducted by Statistics, Korea, in 2008. We study the effect of some demographic variables on two dependent variables, the expenses for out-of-school private education (Private) and the expenses for after-school programs (Afterschool), by using a multiple linear regression model. The analysis results show that 'residential area' and 'school level' variables have a significant effect on the two dependent variables. 'Private' increases in the order of small town, middle town, or metropolitan city, and Seoul, by about 7%. On the other hand, 'Afterschool' are about the same for all areas except for the small town. In terms of the effect of 'school level', 'Private' for high school students is about 17% larger than all other students including professional high school students. This shows a strong correlation between university admission and private education, in Korea. 'Afterschool' is larger for high school and elementary school students and decreases in the order of professional school students and middle school students. It seems that after-school programs are alternatives to expensive private education programs for elementary school students, and that high school students are attracted to after-school programs to get a good GPA, which is important for university admissions.

Enhancing Security in Mobile IPv6

  • Modares, Hero;Moravejosharieh, Amirhossein;Salleh, Rosli Bin;Lloret, Jaime
    • ETRI Journal
    • /
    • v.36 no.1
    • /
    • pp.51-61
    • /
    • 2014
  • In the Mobile IPv6 (MIPv6) protocol, a mobile node (MN) is a mobile device with a permanent home address (HoA) on its home link. The MN will acquire a care-of address (CoA) when it roams into a foreign link. It then sends a binding update (BU) message to the home agent (HA) and the correspondent node (CN) to inform them of its current CoA so that future data packets destined for its HoA will be forwarded to the CoA. The BU message, however, is vulnerable to different types of security attacks, such as the man-in-the-middle attack, the session hijacking attack, and the denial-of-service attack. The current security protocols in MIPv6 are not able to effectively protect the BU message against these attacks. The private-key-based BU (PKBU) protocol is proposed in this research to overcome the shortcomings of some existing MIPv6 protocols. PKBU incorporates a method to assert the address ownership of the MN, thus allowing the CN to validate that the MN is not a malicious node. The results obtained show that it addresses the security requirements while being able to check the address ownership of the MN. PKBU also incorporates a method to verify the reachability of the MN.

Identity-based Threshold Broadcast Encryption in the Standard Model

  • Zhang, Leyou;Hu, Yupu;Wu, Qing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.3
    • /
    • pp.400-410
    • /
    • 2010
  • In an identity-based threshold broadcast encryption (IDTHBE) scheme, a broadcaster chooses a set of n recipients and a threshold value t, and the plaintext can be recovered only if at least t receivers cooperate. IDTHBE scheme is different from the standard threshold public key encryption schemes, where the set of receivers and the threshold value are decided from the beginning. This kind of scheme has wide applications in ad hoc networks. Previously proposed IDTHBE schemes have ciphertexts which contain at least n elements. In addition, the security of theses schemes relies on the random oracles. In this paper, we introduce two new constructions of IDTHBE for ad hoc networks. Our first scheme achieves S-size private keys while the modified scheme achieves constant size private keys. Both schemes achieve approximately (n-t)-size ciphertexts. Furthermore, we also show that they are provablesecurity under the decision bilinear Diffie-Hellman Exponent (BDHE) assumption in the standard model.

Efficient Proxy Signature Technology using Proxy-Register (위임등록을 통한 효율적인 대리 서명방식)

  • Park, Se-Joon;Lee, Yong-Jun;Oh, Hae-Suk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1C
    • /
    • pp.166-174
    • /
    • 2004
  • Proxy signature is the signature that an original signer delegates his signing capability to a proxy signer and the proxy signer creates a signature on behalf of the original signer. The basic methodology of proxy signature is that the original signer creates a signature on delegation information and gives it secretly to the proxy signer, and the proxy signer uses it as a proxy private key or uses it to generate a proxy private key. In this paper, we suggest the proxy-register protocol that the original signer register to the verifier about the proxy related information, and verifier sets the warrant of proxy signer, validity period for proxy signature and some limitation.

Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint

  • Kumari, Shipra;Om, Hari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4987-5014
    • /
    • 2015
  • The bilinear pairing, also known as Weil pairing or Tate pairing, is widely used in cryptography and its properties help to construct cryptographic schemes for different applications in which the security of the transmitted data is a major concern. In remote login authentication schemes, there are two major requirements: i) proving the identity of a user and the server for legitimacy without exposing their private keys and ii) freedom for a user to choose and change his password (private key) efficiently. Most of the existing methods based on the bilinear property have some security breaches due to the lack of features and the design issues. In this paper, we develop a new scheme using the bilinear property of an elliptic point and the biometric characteristics. Our method provides many features along with three major goals. a) Checking the correctness of the password before sending the authentication message, which prevents the wastage of communication cost; b) Efficient password change phase in which the user is asked to give a new password after checking the correctness of the current password without involving the server; c) User anonymity - enforcing the suitability of our scheme for applications in which a user does not want to disclose his identity. We use BAN logic to ensure the mutual authentication and session key agreement properties. The paper provides informal security analysis to illustrate that our scheme resists all the security attacks. Furthermore, we use the AVISPA tool for formal security verification of our scheme.

The Commercialization of Academic Research in the Context of Shifting Intellectual Property Regimes in the Twentieth Century (20세기 대학연구의 상업화와 지적재산권 제도의 변화)

  • Yi, Doogab
    • Korean Journal of Environmental Biology
    • /
    • v.32 no.4
    • /
    • pp.403-412
    • /
    • 2014
  • This article chronicles key shifts in intellectual property regimes in the twentieth century as they related to the commercialization of academic research. The institutionalization and growth of scientific research in the research university in the twentieth century and the increasing awareness of its potential to promote technology innovation and economic growth posited an important question of the ownership of knowledge created in the academic setting, where knowledge was traditionally regarded as a common property among academic researchers. This paper shows the ownership of academic knowledge emerged as a key public policy and legal issue in the latter half of the twentieth century for academic researchers and government officials who pursue the commercialization of academic knowledge for private gain and public benefit. The resulting institutionalization of patent management in the research university and shifts in federal patent policy in turn opened a new legal avenue for the establishment of the private ownership of academic knowledge and the expansion of intellectual property rights in academia, especially in the area of biological and biomedical research. Reflecting upon historical shifts in intellectual property regimes in the twentieth century, this paper suggests recent controversies regarding ownership of biological knowledge and profit sharing in developing counties are linked to critical issues pertinent to the welfare of indigenous population, utilization of new natural resources, and sustainable development for humanity.

Blockchain-Based Mobile Cryptocurrency Wallet

  • Yeom, Gwyduk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.59-66
    • /
    • 2019
  • As the monetary value of cryptocurrency increases, the security measures for cryptocurrency becomes more important. A limitation of the existing cryptocurrency exchanges is their vulnerability to threats of hacking due to their centralized manner of management. In order to overcome such limitation, blockchain technology is increasingly adopted. The blockchain technology enables decentralization and Peer-to-Peer(P2P) transactions, in which blocks of information are linked in chain topology, and each node participating in the blockchain shares a distributed ledger. In this paper, we propose and implement a mobile electronic wallet that can safely store, send and receive cryptocurrencies. The proposed mobile cryptocurrency wallet connects to the network only when the wallet actively is used. Wallet owner manages his or her private key offline, which is advantageous in terms of security. JavaScript based wallet apps were implemented to respectively run on Android and iOS mobile phones. I demonstrate the process of transferring Ethereum cryptocurrency from an account to another account through Ropsten, a test net for Ethereum. Hardware wallets, such as Ledger Nano S, provide a slightly higher level of security, yet have the disadvantages of added burden of carrying additional physical devices and high costs (about 80$).

A study on QR code-based backup methods to strengthen the security of Cold wallet Purse (콜드월렛 지갑 보안 강화를 위한 QR코드 기반 백업 방안에 대한 연구)

  • Byoung Hoon Choi;JinYong Lee;Nam Hyun Koh;Sam Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.21-26
    • /
    • 2023
  • Recently, cryptocurrencies such as Ethereum and Bitcoin, which are called digital assets, Cryptocurrency has completely different characteristics from real assets and must be handled carefully and safely. But The disadvantage of digital assets is that anyone who knows the private key of the wallet can easily steal the digital assets. If the seed card is lost, stolen, or exposed when used, you can use the wallet by recovering the private key using the seed card acquired by someone else. In this paper We aim to safely protect encrypted assets by using QR codes when providing mnemonic words needed to create seed cards.