• 제목/요약/키워드: Private- and Public-key

검색결과 352건 처리시간 0.027초

동등한 권한을 가진 대표노드를 위한 능동적 비밀 분산을 이용한 비공개 블록 암호화 기법 (Fair Private Block Encryption Protocol with Proactive Secret Sharing for Delegated Node of Public Blockchain)

  • 정승욱
    • 융합보안논문지
    • /
    • 제20권4호
    • /
    • pp.177-186
    • /
    • 2020
  • 현재의 퍼블릭 블록체인은 누구나 원장의 내용을 볼 수 있도록 설계가 되어있다. 하지만 응용에 따라서 비밀 정보를 블록체인에 저장해야 하는 경우도 있으나 이에 대한 연구는 아직 미진하다. 본 논문에서는 DPoS(Delegated Proof of Stack) 합의방식을 사용하는 블록체인을 대상으로 공개 블록과 비공개 블록의 두 계층으로 이루어진 블록체인을 제안하고 비공개 블록의 암호화를 위한 요구사항을 도출하였다. 도출된 암호화 요구사항을 만족하는 dealer없는 t-of-n threshold 암호화를 제안하였다. 또한, DPoS의 대표노드들은 가입과 탈퇴가 발생할 수 있어서, 대표노드의 가입과 탈퇴에 따라서 키 조각을 재분배하는 효율적인 방법을 제시하였다. 제안된 기법이 대표노드간의 공평성과 동일한 신뢰성을 만족하는 특징을 가진다.

The Prospects of Metaverse in the Public vs. Private Sector by Millennials and Generation Z: Citizen/Customer Relationship Management

  • Yooncheong CHO
    • 산경연구논집
    • /
    • 제15권2호
    • /
    • pp.1-10
    • /
    • 2024
  • Purpose: The aim of this study is to examine the factors influencing prospects toward for the metaverse in both the public and private sectors, focusing on the perspectives of millennials and generation Z that were rarely examined in previous studies. Research design, data and methodology: This study employed an online survey as its research methodology utilizing factor analysis, ANOVA, and regression analysis to test the formulated hypotheses. Results: The findings of this study reveal that factors such as citizen/customer relationship management, the application of metaverse in both in the public and private sectors. Moreover, the effect size of applying the metaverse to cities on prospects toward the Metaverse was notably higher in the public sector. The effect size of metaverse management for customer relationship management showed a greater impact in the private sector. Conclusions: The results carry significant managerial and policy implications. They shed light on how millennials and generation Z perceive the applications of the metaverse in relation to cities, products, and brands. Notably, the results suggest that application of the metaverse for cities and management of customer relationships for products and brands emerge as key factors influencing the prospect of the metaverse in the public and private sectors.

효율적인 공개키 기반의 디지털 콘텐츠 전송 시스템 (Efficient Public Key Broadcast Encryption System)

  • 이문식
    • 한국군사과학기술학회지
    • /
    • 제13권4호
    • /
    • pp.635-641
    • /
    • 2010
  • In this paper, we propose an efficient public key broadcast encryption system which can also extend traitor trace and revoke system. Although the proposed system has limited collusion size, the ciphertext size in the system can be sublinear in the number of total users, the private key size is constant, the computational cost can be sublinear and it can support black-box tracing algorithm, therefore, our system can be an option to applications where reducing the ciphertext size, private key size is a top priority. Furthermore, we can also apply our system to military document broadcast system, because it has such an efficient measurement.

μ-Hope : 오류 정정 부호를 사용한 RLWE 기반의 경량 KEM (μ-Hope : Compact Size RLWE Based KEM Using Error Correcting Code)

  • 이주엽;김수리;김창한;홍석희
    • 정보보호학회논문지
    • /
    • 제30권5호
    • /
    • pp.781-793
    • /
    • 2020
  • 본 논문에서는 RLWE 기반 암호 알고리즘인 NewHope에 Error Correcting Code(ECC)를 적용한 RLWE 기반의 암호 알고리즘 μ-Hope를 제안한다. 기존의 NewHope는 소수로 12289를 사용하여, 공개키, 개인키, 암호문 사이즈가 각각 928-byte, 1888-byte, 1120-byte로 다른 RLWE 기반 알고리즘에 비하여 그 사이즈가 크다고 할 수 있다. 본 논문에서는 공개키, 개인키, 암호문 크기를 줄이기 위하여 소수 12289를 769로 변경한 μ-Hope를 제안하며 소수의 변경으로부터 발생하는 복호화 실패율을 줄이기 위해 ECC로 XE1을 채택하였다. 그 결과 NewHope 대비 공개키, 개인키, 암호문의 사이즈가 각각 38%, 37%, 37% 감소했다. 또한, 키 사이즈가 줄 뿐만 아니라, ECC의 사용으로 인한 성능 저하보다 작은 소수를 사용하면서 발생하는 연산 효율성이 더 커서 한 번의 키를 교환하는 과정에서 총 25%의 성능 향상도 이룰 수 있었다.

Circulant UOV: a new UOV variant with shorter private key and faster signature generation

  • Peng, Zhiniang;Tang, Shaohua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권3호
    • /
    • pp.1376-1395
    • /
    • 2018
  • UOV is one of the most important signature schemes in Multivariate Public Key Cryptography (MPKC). It has a strong security guarantee and is considered to be quantum-resistant. However, it suffers from large key size and its signing procedure is relatively slow. In this paper, we propose a new secure UOV variant (Circulant UOV) with shorter private key and higher signing efficiency. We estimate that the private key size of Circulant UOV is smaller by about 45% than that of the regular UOV and its signing speed is more than 14 times faster than that of the regular UOV. We also give a practical implementation on modern x64 CPU, which shows that Circulant UOV is comparable to many other signature schemes.

KCDSA 메커니즘을 제공하는 PKCS #11 설계 및 분석 (A Design and Analysis of PKCS #11 supporting the KCDSA mechanism)

  • 김명희;김은환;전문석
    • 정보보호학회논문지
    • /
    • 제14권5호
    • /
    • pp.141-151
    • /
    • 2004
  • 전자상거래의 활성화에 따라 이동매체의 안전에 대한 요구사항이 늘어나고 있다. 이동매체간의 호환성을 제공하기 위해서는 보안 API(Application Programming Interface)가 쉽고 안전하게 설계되어져야한다. 현재 많은 제품과 개발에 호환성과 확장성 표준을 제시하고 있는 RSA사의 PKCS(Public Key Cryptographic Standard) #11 인터페이스를 선택하여, 국내 전자서명 표준인 KCDSA(Korean Certificate-based Digital Signature Algorithm) 메커니즘을 제공하고자 한다. 그리고, PKCS #11 보안 API에 새로운 키 관리 함수를 정의하므로써 보다 더 안전한 키 관리 기능도 지원한다. KCDSA 개인키와 공개키의 객체 속성과 템플릿을 정의하고, KCDSA 메커니즘으로 전자서명을 생성하고 검증할 수 있도록 한다. KCDSA 메커니즘을 제공하는 PKCS #11을 설계 및 구현하여 성능평가하고, 보안성 및 호환성에 대하여 비교분석한다.

Strategies for Stimulating Customer Relationship: A Study of Some Public and Private Sector Banks

  • Kiran, Ravi;Sharma, Ridhima
    • 유통과학연구
    • /
    • 제11권3호
    • /
    • pp.31-37
    • /
    • 2013
  • Purpose - The present research has been undertaken to examine the Customer Relationship Management (CRM) strategies adopted by public and private sector banks in India. The initial part of research helps to identify the factors of overall satisfaction of customers. The study also tries to identify the key determinants of CRM of Indian banking. Research design, data, methodology - The present research uses a self-structured questionnaire having a reliability score of 0.817 to elicit responses from customers in New Delhi and surrounding areas in India to examine the CRM used by public and private sector banks for enhancing customer satisfaction. The scale had 32 questions covering customer perceptions related to overall satisfaction and factors contributing to CRM. Results - The results highlight that overall satisfaction comprises of two factors namely personalised Services; and reliability and dependability. The determinants of CRM as identified through survey are: Speed, safety and security; Employee CRM; on time services; customer targeting; and friendly and helpful staff. The results also highlight that safety and security was preferred to other factors by the respondents. Conclusions - The findings of this study show that in terms of performance private sector banks fared better in providing CRM services than public sector banks.

  • PDF

Public-Private Partnership in the System of Economic Development of the Country

  • Muliar, Volodymyr;Ryda, Tetyana;Dolot, Volodymyr;Didych, Oleg;Grechanyk, Bogdan;Chornysh, Iurii
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.83-88
    • /
    • 2022
  • The main purpose of the study is to determine the key aspects of the public-private partnership system in the context of the economic development of the state. At first glance, the mutually exclusive interests of the state and business do not contribute to the development of common and agreed development goals. At the same time, ignoring the versatility of interests and the aggravation of the discussion regarding the two sides under consideration, the study of the theoretical foundations of the interaction between the public and private sectors of the economy allows us to draw the following conclusion: world economic theory from classical political economy to new institutionalism has a clear structured position on the ancient historical depth of existence of the form of partnerships Based on the results of the study, the main elements of the public-private partnership system in the context of the economic development of the state were identified.

새로운 GSM의 인증프로토콜 제안 (Proposal of new GSM Authentication protocol)

  • 최현;송윤경;박동선
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 하계종합학술대회 논문집 I
    • /
    • pp.113-116
    • /
    • 2003
  • Mobile communication network because information through radio channel is passed, information may be eavesdropped and need information security countermeasure in communication network dimension for safe information exchange because there is possibility that is manufactured. This paper used Public Key Cryptography for protection and authentication connected with user authentication. Use public key and private key that is asymmetry encryption key to quote that is used at encryption, decryption of Public key. Encrypt IMSI and authentication message that is transmitted MS, VLR and HLR interval to public key, wish to embody transmitted authentication protocol safety.

  • PDF

A CASE STUDY OF TAIWAN'S FRAMEWORK TO EVALUATE UNSOLICITED PUBLIC/PRIVATE PARTNERSHIP PROPOSALS

  • Ying-Yi Chih;Yaw-Kuang Chen
    • 국제학술발표논문집
    • /
    • The 2th International Conference on Construction Engineering and Project Management
    • /
    • pp.218-228
    • /
    • 2007
  • The acceptance of unsolicited proposals (a private-initiated process) has been viewed by several governments as a means of encouraging innovative initiatives. However, the ramifications of this mechanism are still poorly understood. This paper analyzes a framework used by the Taiwanese government to evaluate unsolicited proposals. Taiwan's experience demonstrates the need for an improved framework in which key issues such as building consensus, maintaining a transparent procurement process, ensuring sufficient competition, and protecting intellectual property rights shall be addressed. In addition, the case study suggests that the roles of participants, the relationships and interfaces of activities, information flows, and decision making points should all be well defined. Some fundamental differences between solicited and unsolicited proposals are also discussed.

  • PDF