• Title/Summary/Keyword: Protocol Design and Verification

Search Result 120, Processing Time 0.034 seconds

Efficient Proxy Re-encryption Scheme for E-Voting System

  • Li, Wenchao;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1847-1870
    • /
    • 2021
  • With the development of information and communication technologies, especially wireless networks and cell phones, the e-voting system becomes popular as its cost-effectiveness, swiftness, scalability, and ecological sustainability. However, the current e-voting schemes are faced with the problem of privacy leakage and further cause worse vote-buying and voter-coercion problems. Moreover, in large-scale voting, some previous e-voting system encryption scheme with pairing operation also brings huge overhead pressure to the voting system. Thus, it is a vital problem to design a protocol that can protect voter privacy and simultaneously has high efficiency to guarantee the effective implementation of e-voting. To address these problems, our paper proposes an efficient unidirectional proxy re-encryption scheme that provides the re-encryption of vote content and the verification of users' identity. This function can be exactly applied in the e-voting system to protect the content of vote and preserve the privacy of the voter. Our proposal is proven to be CCA secure and collusion resistant. The detailed analysis also shows that our scheme achieves higher efficiency in computation cost and ciphertext size than the schemes in related fields.

System Analysis Method Using Composition and Minimization (합성 및 축소화 기법을 이용한 시스템의 해석 방법)

  • Lee, Wan Bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2330-2336
    • /
    • 2013
  • Since many man-made systems consist of autonomous and interactive components, it is intrinsically difficult to analyze their abnormal behavior. The logical analysis of such a system is an indispensable process for high quality and reliable system development. In this paper, we propose an analysis method using two algebraic operations, named composition and minimization. Repetitive composition and minimization of component models with respect to a set of important events produces a new analysis model that has the same input output responses to an environment. An analysis example of the alternating bit protocol demonstrates the effectiveness of the proposed method showing that each message generated at the sender side eventually arrives to a receiver.

Implementation of Offline Payment Solution using USIM in IMT-2000 (IMT-2000 단말기용 USIM상에서의 오프라인 지불 솔루션 탑재에 관한 연구)

  • 백장미;하남수;홍인식
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.849-860
    • /
    • 2003
  • As mobile device is becoming more popular, E-Commerce changes into M-Commerce. Especially, IMT-2000 (International Mobile Telecommunication 2000) service is prepared for M-Commerce and this has USIM (Universal Subscriber Identity Module) as a core of certification of individuality and transactions. As a result, the area of mobile service going to expand by USIM. But, mobile services using USIM leave much to be desired, and developed application don't variety. In this paper, for the efficient design of USIM, the structure of USIM and protocol is analyzed, and secure payment solution in USIM is proposed. Specially, offline payment system is proposed for the verification of proposed protocols including security, saving, and calculation of balance. finally, the simulation of proposed payment system on USIM is performed using Java Card.

  • PDF

Design of a Realtime Interactive Authentication Method using PKI in the Wireless Network (무선 네트워크 기반에서 PKI 방식을 이용한 상호인증 프로토콜 설계)

  • Park, Jea-Seong;Han, Seung-Jo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.873-877
    • /
    • 2008
  • There were many exposed problems in previous authentication method on LAN. Especially Open System Authentication Method, Shared Key Method, Mac Based Authentication Method are very hard to use in wireless network that needs security. So now, many researches have been performed about $802.1{\times}$ and user authentication method applying PKI. But certificate verification protocol has been used abolished list called CRL since it's first usage of PKI, there were still has a problem about distribution point. In this paper, I applied CVS to use CA direct not to use CRL and OSCP server in order to improve this problems.

  • PDF

Design and Verification of Applied Information Processing Protocol in the Message Security System (정보처리를 응용한 메시지 보안 시스템의 설계 및 검증)

  • Shin, Seung-Jung;Kim, Suk-Woo;Ryu, Dae-Hyun;Kwon, Chang-Heui;Kim, Young-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05b
    • /
    • pp.879-882
    • /
    • 2003
  • 인터넷환경에서 전자상거래는 여러 가지 상황관계를 상호간에 메시지를 통해서 이루어진다. 그러므로 이에 대한 가장 중요한 요소는 메시지 인증이며, 이는 거래당사자들이 수신된 메시지의 신뢰성을 확인하는 과정이다. 메시지의 진정성은 위조불가, 부인분가, 변경불가, 출처인증으로 구성되어 있고, 공개키 암호화를 통해 수행 할 수 있다. X.400 메시지처리 시스템과 공개키 암호화에 기반을 두고 있는 PGP가 메시지 교환에 널리 사용되고 있다. 본 연구에서는 공개키 암호화와 X.400 프로토콜 그리고 PGP상에 존재하는 메시지 인증 문제를 해결하기 위하여 NMAP로 명명된 공개정보 기반 암호화 시스템을 제안하고 이를 설계 구현하였다. 구현된 메시지 인증 프로토콜의 검증을 위해 퍼지적분을 사용하였다. 제안된 시스템은 전자상거래의 활성화와 비대화형 인증 서비스 제공에 사용될 수 있을 것이다.

  • PDF

Design of Communication Board for Communication Network of Nuclear Safety Class Control Equipment (원자력 안전등급 제어기기의 통신망을 위한 통신보드 설계)

  • Lee, Dongil;Ryoo, Kwangki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.185-191
    • /
    • 2015
  • This paper suggest the safety class communication board in order to design the safety network of the nuclear safety class controller. The reactor protection system use the digitized networks because from analog system to digital system. The communication board shall be provided to pass the required performance and test of the safety class in the digital network used in the nuclear safety class. Communication protocol is composed of physical layer(PHY), data link layer(MAC: Medium Access Control), the application layer in the OSI 7 layer only. The data link layer data package for the cyber security has changed. CRC32 were used for data quality and the using one way communication, not requests and not responses for receiving data, does not affect the nuclear safety system. It has been designed in accordance with requirements, design, verification and procedure for the approving the nuclear safety class. For hardware verification such as electromagnetic test, aging test, inspection, burn-in test, seismic test and environmental test in was performed. FPGA firmware to verify compliance with the life-cycle of IEEE 1074 was performed by the component testing and integration testing.

Trustworthy Smart Band: Security Requirements Analysis with Threat Modeling (위협 모델링을 통한 스마트밴드 보안 요구사항 분석)

  • Kang, Suin;Kim, Hye Min;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1355-1369
    • /
    • 2018
  • As smart bands make life more convenient and provide a positive lifestyle, many people are now using them. Since smart bands deal with private information, security design and implementation for smart band system become necessary. To make a trustworthy smart band, we must derive the security requirements of the system first, and then design the system satisfying the security requirements. In this paper, we apply threat modeling techniques such as Data Flow Diagram, STRIDE, and Attack Tree to the smart band system to identify threats and derive security requirements accordingly. Through threat modeling, we found the vulnerabilities of the smart band system and successfully exploited smart bands with them. To defend against these threats, we propose security measures and verify that they are secure by using Scyther which is a tool for automatic verification of security protocol.

A Study on Real-time Streaming System Using the Dual-Streaming Technique (듀얼 스트리밍 기법을 활용한 실시간 스트리밍 시스템)

  • Ban, Tae-Hak;Kim, Eung-Yeol;Yang, Xitong;Kim, Ho-Sung;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.791-793
    • /
    • 2015
  • Recently, UCC (User Created Contents) and VoD (Video on Demand), and multimedia content are growing, IP-TV, Smart TV, OHTV (Open Hybrid TV) various services such as multi platform (Multi-platform) environment, services and QoS issues. To solve this problem, the network efficiently, and improve the quality of content is necessary for the system. In this paper, the network of channels State and transmission of multimedia data based on dynamic resource usage, TCP and UDP, Adaptive dual-streaming system used for design and analysis. In addition, the existing TCP and UDP streaming system using a single protocol for analysis and verification of the effectiveness of the difference between and. This is a disaster, and medical/first aid system will be utilized in the field of feed, are ubiquitous.

  • PDF

The 3D Character Modeling for Golf Swing Motion Analysis by Economical Verification of Body Information (인체정보 DB의 경제적인 조합을 통한 골프 스윙 동작 분석용 3D 캐릭터 모델링)

  • 곽현민;채균식;박찬종;이상태
    • Science of Emotion and Sensibility
    • /
    • v.6 no.2
    • /
    • pp.59-64
    • /
    • 2003
  • The national standard anthropometry of Korea is conducted every 5∼6 year term after its first research was started in 1979, The fourth research was conducted in 1997. The result of the national standard anthropometry has been reflected in manufactured goods design of allied industries such as clothing, shoes and furniture. In this paper, we measured anthropometry data for every bodily figurative classification after dividing users according to gender, age and bodily figure using the result of the national standard anthropometry. We constructed 3D character through the process of analyzing interrelation of measured anthropomeoy and measuring representative category. In the process for organization , we measured anthropometry which can effectively express sports action of golf, tennis etc. We made it by presenting measurement which is able to form each type of 3D character after the category was decided. Quantitative and objective valuation for posture and action became possible by developing visible information offer and posture action analysis protocol in theoretical approach for analysis of posture and action in sports.

  • PDF

Traceability Number-Driven Livestock Inventory Management IoT System Utilizing Electronic Scale Access Control Technology (전자저울 접근제어 기술을 통한 이력번호 기반의 재고관리 IoT 시스템)

  • Youchan Jeon
    • Smart Media Journal
    • /
    • v.12 no.10
    • /
    • pp.85-92
    • /
    • 2023
  • In December 2014, Livestock and Livestock Products Traceability Act was established, allowing consumers to receive livestock traceability information. While the Livestock Traceability System provides consumers with transparent and fair information about their food, it has brought increased workload and penalty burdens to stakeholders in the livestock industry. In this paper, we propose an IoT system for inventory management based on traceability numbers to enable sellers to conveniently provide livestock traceability information to consumers. We analyzed the protocol for managing data from electronic scales and conducted functional testing and verification on mobile devices. Furthermore, we implemented the design and system functionality, taking into account UI/UX on Android OS-based devices to synchronize and interconnect traceability and product information with electronic scales. We anticipate that the proposed approach will minimize user inconvenience and raise production efficiency in the existing market.