• Title/Summary/Keyword: Pseudo ID

Search Result 10, Processing Time 0.031 seconds

Multi User-Authentication System using One Time-Pseudo Random Number and Personal DNA STR Information in RFID Smart Card (RFID 스마트카드내 DNA STR Information과 일회용 의사난수를 사용한 다중 사용자 인증시스템)

  • Sung, Soon-Hwa;Kong, Eun-Bae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.747-754
    • /
    • 2003
  • Thia paper suggests a milti user-authentication system comprises that DNA biometric informatiom, owner's RFID(Radio Frequency Identification) smartcard of hardware token, and PKI digital signqture of software. This system improved items proposed in [1] as follows : this mechanism provides one RFID smartcard instead of two user-authentication smartcard(the biometric registered seal card and the DNA personal ID card), and solbers user information exposure as RFID of low proce when the card is lost. In addition, this can be perfect multi user-autentication system to enable identification even in cases such as identical twins, the DNA collected from the blood of patient who has undergone a medical procedure involving blood replacement and the DNA of the blood donor, mutation in the DNA base of cancer cells and other cells. Therefore, the proposed system is applied to terminal log-on with RFID smart card that stores accurate digital DNA biometric information instead of present biometric user-authentication system with the card is lost, which doesn't expose any personal DNA information. The security of PKI digital signature private key can be improved because secure pseudo random number generator can generate infinite one-time pseudo randon number corresponding to a user ID to keep private key of PKI digital signature securely whenever authenticated users access a system. Un addition, this user-authentication system can be used in credit card, resident card, passport, etc. acceletating the use of biometric RFID smart' card. The security of proposed system is shown by statistical anaysis.

The effect of crosslinking and dry for the adsorption rate on the chitosan bead (키토산 비드의 교차결합(crosslinking)과 건조공정이 흡착속도에 미치는 영향)

  • Shin, Jeongwoo;Kim, Taehoon;Lee, Youngmin;An, Byungryul
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.35 no.4
    • /
    • pp.301-309
    • /
    • 2021
  • Chitosan, natural organic polymer, has been applied in water treatment as adsorbent due to non-toxic for human being. The amino group as functional group, can interacts with cation and anion at the same time. The prepared chitosan bead (HCB) was crosslinked to increase chemical stability (HCB-G) and both HCB and HCB-G were prepared to increase physical strength by drying referred to DCB and DCB-G, respectively. The adsorption effect for crosslinking and drying for four types of chitosan bead was tested using pseudo fist order (PFO), pseudo second order (PSO), and intraparticle diffusion model (ID). Regardless of PFO and PSO, the order of K, rate constant, is as followed: HCB > HCB-G > DCB > DCB-G for Cu(II) and phosphate. Drying leading to contraction of bead significantly reduced adsorption rate due to reduce the porosity of chitosan. In addition, crosslingking also negatively effect on adsorption rate. When compared with Cu(II) using hydrogel bead, phosphate showed higher value than Cu(II) for PFO and PSO. The application of ID showed that both hydrogel beads (HCB and HCB-G) obtained a very low R2 ranging to 0.37 to 0.81, while R2 can be obtained to over 0.9 for DCB and DCB-G, indicting ID is appropriate for low adsorption rate.

Anonymity Certification Technique of a Smart Card base for Personal Information Protection (개인정보보호를 위한 스마트카드 기반의 익명 인증 기법)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.6071-6080
    • /
    • 2012
  • Regarding the official authentication method which is a strong encrypt method for financial transactions, there has recently been a concern for the problem of storage. As a solution for such problems, this study provides the anonymous authentication method based on the smart card used for such a purpose by utilizing the pseudo ID replacing the user's personal data. Such an anonymous authentication method makes it possible to prevent any inside leakage, intermediary attack, limited re-transmission attack, service-denying attack, directional safety attack and secret inspector attack in regard to the user's personal data. As a result, there would be no concern for the leakage of any personal data. In comparative analysis, after executing the comparison and analysis process through the experiment for the authentication process by using the previously-used smart card, the new one has shown about 10% a high level of efficiency for the encrypt and decrypt process together with excellent features in terms of flexibility in regard to the user's anonymity and tracking ability.

Effect of Phenolic Mediators and Humic Acid on the Removal of 1-Indanone Using Manganese Oxide (망간산화물(Birnessite)을 이용한 1- Indanone 제거 시 페놀계 반응매개체와 휴믹산(HA) 영향 평가)

  • Choi, Chan-Kyu;Eom, Won-Suk;Shin, Hyun-Sang
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.34 no.7
    • /
    • pp.445-453
    • /
    • 2012
  • An investigation for removal of 1-indanone (1-ID), which were commonly produced from the biological and/or chemical treatment and natural weathering of the PAHs-contaminated soils, via oxidative transformation mediated by birnessite in the presence of various phenolic mediators is described. This study also examines the potential effect of the natural occurring substance humic acid (HA) on the oxidative transformation. The experiment was carried out in aqueous phase as a batch test (10 mg/L 1-ID, 0.3 mM phenolic mediators, $1.0g/L\;{\delta}-MnO_2$, at pH 5). All of the 11 tested phenoilic mediators belong to the group of natural occurring phenols and are widely used as model constituents of humic substances. From the results of HPLC analysis, it is demonstrated that 1-ID was not reactive to birnessite itself, but it can be effectively removed in birnessite-mediated cross coupling reactions in the presence of the phenolic mediators. The percent removals of 1-ID after 2 day incubation were ranged from 9.2 to 71.2% depending on the phenolic mediators applied. The initial rate constant ($K_{int}$, $hr^{-1}$) values for the 1-ID removals obtained from the pseudo-first-order kinetic plots also widely ranged from 0.18 to 15.0. Results of the correlative analysis between the removal efficiencies and structural characteristics of phenolic mediators indicate that the transformation of the 1-ID was considerably enhanced by the addition of electron-donating substituents (e.g., -OH, $-OCH_3$) at the benzne ring, and much less enhanced by the addition of electron-withdrawing substituents (e.g., -COOH, -CHO). The presence of HA showed that removal efficiencies of 1-ID in the birnessite-phenolic mediator systems decreased with increasing HA concentrations. However at low concentration of HA (< 2 mg/L), it caused some enhancement in the removals of 1-ID as compared to the control.

EC-ELGAMAL Homomorphic Cryptography based E-voting System (EC-ELGAMAL 준동형 암호화기반 전자투표)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.4
    • /
    • pp.909-916
    • /
    • 2013
  • Since realization of E-voting system expands participation of voters and efficient count of voting, political and social and technical revolution is possible. However, without secure e-voting system, practical usages are infeasible. In the paper, we propose an e-voting system which is able to open votes in server without decryption during midst process using EC-ELGAMAL homomorphic cryptography. Users ensure anonymity with pseudo id from server and check their voting with Bloom Filter technology. Furthermore, we combine attributes and voters' information, so we can collect information of voter under the condition of anonymity.

Receipt-free Sealed-bid Auction Scheme Using Cryptographic Techniques

  • Her, Yong-Sork
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.247-250
    • /
    • 2005
  • Recently, a concept of bid-rigging is issued in electronic auction. To prevent this attack, Abe-Suzuki proposed firstly receipt-free scheme based on bidding-booth. Chen-Lee-Kim pointed out that Abe-Suzuki's scheme only provides receipt-freeness for losing bidders. Also, they introduced a new receipt-free sealed bid auction scheme using the homomorphic encryption technique. The main participants of their scheme are Auctioneer, Auction Issuer, Bidder and Seller. Bid-rigging can happen by a seller in their scheme. We propose receipt-free sealed-bid auction scheme using a universal re-encryption mixnet. For our receipt-free sealed-bid auction, we use Pseudo ID of a bidder and universal re-encryption technique of Golle et al. Also, our scheme satisfies privacy, correctness, public verifiability, non-reputation, and receipt-freeness.

  • PDF

Reducing RFID Reader Load with the Meet-in-the-Middle Strategy

  • Cheon, Jung-Hee;Hong, Jeong-Dae;Tsudik, Gene
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.10-14
    • /
    • 2012
  • When tag privacy is required in radio frequency identification (ID) system, a reader needs to identify, and optionally authenticate, a multitude of tags without revealing their IDs. One approach for identification with lightweight tags is that each tag performs pseudo-random function with his unique embedded key. In this case, a reader (or a back-end server) needs to perform a brute-force search for each tag-reader interaction, whose cost gets larger when the number of tags increases. In this paper, we suggest a simple and efficient identification technique that reduces readers computation to $O$(${\sqrt{N}}$ log$N$) without increasing communication cost. Our technique is based on the well-known "meet-in-the-middle" strategy used in the past to attack symmetric ciphers.

A Divalent Immunotoxin Formed by the Disulfide Bond between Hinge Regions of Fab Domain

  • Choe, Seong Hyeok;Kim, Ji Eun;Lee, Yong Chan;Jang, Yeong Ju;Choe, Mu Hyeon
    • Bulletin of the Korean Chemical Society
    • /
    • v.22 no.12
    • /
    • pp.1361-1365
    • /
    • 2001
  • Recombinant immunotoxins are hybrid cytotoxic proteins designed to selectively kill cancer cells. A divalent immunotoxins, [B3(FabH1)-PE38]2, was constructed by recombining Fab domain of B3 antibody as a cell-targeting domain and Pseudo monas exotoxin A (PE) as a cytotoxic domain. Monoclonal antibody, B3, is the murine antibody (IgG1k) directed against Lewis Y-related carbohydrate antigens, which are abundant on the surface of many carcinomas. Fab fragment of this antibody was used in this study with the modified hinge sequence where last two cysteines out of three were mutated to serine. PE is a 66 kDa bacterial toxin that kills eukaryotic cells by inhibiting protein synthesis with ADP ribosylation of ribosomal elongation factor 2 (EF2). Fc region of B3 antibody was substituted with the truncated form of PE (38 kDa, PE38) on DNA level. [B3(FabH1)-PE38]2 was formed by disulfide bond between cysteines in the modified hinge region of B3(FabH1)-PE38. Each polypeptide for recombinant immunotoxins was overexpressed in Escherichia coli and collected as inclusion bodies. Each inclusion body was solubilized and refolded, and cytotoxic effects were measured. Divalent immunotoxins, [B3(FabH1)-PE38]2, had ID50 values of about 10 ng/mL on A431 cell lines and about 4 ng/mL on CRL1739 cell lines. Control immunotoxins, B3(scFv)-PE40, had ID50 values of about 28 ng/mL on A431 cell lines and about 41 ng/mL on CRL1739 cell lines. Divalent immunotoxins, [B3(FabH1)-PE38]2, had higher cytotoxic effects than B3(scFv)-PE40 control immunotoxins.

A Study of Authentication of Using Multi-factor (다중체계 인증을 이용한 중요 시스템 보안 접근에 관한 연구)

  • Choi, Byeong-Hun;Kim, Sang-Geun;Bae, Je-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.73-80
    • /
    • 2009
  • Internet accidents have skyrocketed every year. It always has been threatened by the methods such as hacking and Spyware. The majority of security accident is formed of the loss of authentication information, and the internal user who is not authorized. The importance of security is also emphasized when someone tries to do something accessing to the main information system. Accordingly, Biometrics has been used in many ways. OTP, however, must have a few devices accessing to several systems, and Biometrics involve some risk of mis-recognition rate and mis-denial rate. It also has the risk possible to access to the main information system when losing OTP. This research reduced risks about the loss as separating RFID leader for mobile, Tag and the accessor's cellular phone, and is about pseudo random validation key generated from the administration system through contact with RFID leader for mobile and Tag. As sending the key to user's cell phone which is already registered, security is strengthened more than existing connection methods through the ID and password. RFID for mobile not generalized to the present has been studied as a tool accessing to the main information system.

Secret Sharing based Node Authentication in FANET (FANET에서의 비밀분산 기반 노드 인증)

  • Yang Ji Hun;Lee Soo Jin
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.25-34
    • /
    • 2022
  • This paper proposes a secret sharing based fast node authentication technique applicable to Flying Ad-Hoc Network (FANET) that can be used to construct self-organized communication network in multi drones and drone squadrons operations. Before deployment, each node stores an exponential share, exponential secret and a portion of PUF CRP table. After being deployed in the field, in the early-stage of network formation, each node broadcasts its ID, exponential share and a hash value of PUF Response and pseudo-random number. Then each node performs a reconstruction of the exponential secret using the exponential shares transmitted from neighboring nodes. When the exponential secret is reconstructed, simultaneous authentication is completed for all nodes that have transmitted the exponential share used in the reconstruction. A node that transmits an incorrect exponential share to disturb the reconstruction of the exponential secret during the authentication process can be detected before performing the reconstruction through the verification of the hash value, and will be excluded from the reconstruction.