• Title/Summary/Keyword: Recovery Scheme

Search Result 479, Processing Time 0.027 seconds

A Identity Escrow mechanism supporting key recovery (키 복구를 지원하는 향상된 신원위탁 메커니즘)

  • 이용호;이임영;김주한;문기영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.119-128
    • /
    • 2002
  • In case certification between user and service provider is achieved, problem that user's identity is revealed is occurring by social issue, so it was presented identity escrow scheme to solve these problem. In identity escrow scheme, the issuer who have correct user's identity transmits securely anonymity authentication information to user, and user achieves authentication phase with service provider keeping oneself anonymity using this. In this paper, we present requirement for security and trusty of identity escrow scheme and propose new mechanism that can security this. Also, propose method that service provider can deliver securely contents to user and propose mechanism that improve that support ky recovery at encryption communication that using secret key that it was generated by key agreement between users.

A 0.9-V human body communication receiver using a dummy electrode and clock phase inversion scheme

  • Oh, Kwang-Il;Kim, Sung-Eun;Kang, Taewook;Kim, Hyuk;Lim, In-Gi;Park, Mi-Jeong;Lee, Jae-Jin;Park, Hyung-Il
    • ETRI Journal
    • /
    • v.44 no.5
    • /
    • pp.859-874
    • /
    • 2022
  • This paper presents a low-power and lightweight human body communication (HBC) receiver with an embedded dummy electrode for improved signal acquisition. The clock data recovery (CDR) circuit in the receiver operates with a low supply voltage and utilizes a clock phase inversion scheme. The receiver is equipped with a main electrode and dummy electrode that strengthen the capacitive-coupled signal at the receiver frontend. The receiver CDR circuit exploits a clock inversion scheme to allow 0.9-V operation while achieving a shorter lock time than at 3.3-V operation. In experiments, a receiver chip fabricated using 130-nm complementary metal-oxide-semiconductor technology was demonstrated to successfully receive the transmitted signal when the transmitter and receiver are placed separately on each hand of the user while consuming only 4.98 mW at a 0.9-V supply voltage.

Backhaul transmission scheme for UAV based on improved Nash equilibrium strategy

  • Liu, Lishan;Wu, Duanpo;Jin, Xinyu;Cen, Shuwei;Dong, Fang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2666-2687
    • /
    • 2022
  • As a new alternative communication scheme in 5G, unmanned aerial vehicle (UAV) is used as a relay in the remote base station (BS) for assistant communication. In order to ameliorate the quality of the backhaul link, a UAV backhaul transmission scheme based on improved Nash equilibrium (NE) strategy is proposed. First, the capacity of air-to-ground (A2G) channel by the link preprocess is maximized. Then, the maximum utility function of each UAV is used as the basis of obtaining NE point according to the backhaul channel and the backhaul congestion. Finally, the improved NE strategy is applied in multiple iterations until maximum utility functions of all the UAVs are reached, and the UAVs which are rejected by air-to-air (A2A) link during the process would participate in the source recovery process to construct a multi-hop backhaul network. Simulation results show that average effective backhaul rate, minimum effective backhaul rate increases by 10%, 28.5% respectively in ideal A2G channel, and 11.8%, 42.3% respectively in fading channel, comparing to pure NE strategy. And the average number of iterations is decreased by 5%.

A Study on the Key Recovery System using Verifiable Secret Sharing Scheme (증명가능한 비밀 분산 방식을 이용한 키 복구 시스템에 관한 연구)

  • 채승철;김해만;이인수;박성준;이임영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 1998.04a
    • /
    • pp.169-174
    • /
    • 1998
  • 암호의 사용은 사용자에게 많은 이점을 주지만, 키와 분실이나 범죄 집단의 암호의 악용과 오용 등의 가능성이 있다. 이러한 것을 해결하기 위해 나온 방식이 키 복구(Key recovery)방식이다. 본 논문에서는 비밀 분산 방식을 이용한 새로운 키 복구 방식을 제안한다. 또한 키 복구 시스템에서는 유사시에 키를 얻을 수 있는 확실한 보장이 있어야 하는데, 본 제안 방식에서는 사용자의 부정조작을 검사할 수 있게 함으로써 키 획득에 대한 보장을 할 수 있도록 하였다.

  • PDF

STRONG CONVERGENCE THEOREMS FOR INFINITE COUNTABLE NONEXPANSIVE MAPPINGS AND IMAGE RECOVERY PROBLEM

  • Yao, Yonghong;Liou, Yeong-Cheng
    • Journal of the Korean Mathematical Society
    • /
    • v.45 no.6
    • /
    • pp.1591-1600
    • /
    • 2008
  • In this paper, we introduce an iterative scheme given by infinite nonexpansive mappings in Banach spaces. We prove strong convergence theorems which are connected with the problem of image recovery. Our results enrich and complement the recent many results.

Joint Carrier Recovery and Adaptive Blind Equalization Algorithm for High-level QAM (반송파 동기와 결합한 고차 QAM을 위한 적응 자력등화 알고리즘)

  • 임창현;김기윤;김동규;최형진
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.47-50
    • /
    • 1999
  • Adaptive channel equalization accomplished without resorting to a training sequence is known as blind equalization. The Constant Modulus Algorithm(CMA) and Modified CMA(MCMA) are widely referenced algorithms for blind equalization of a QAM system. This paper proposes a hybrid scheme of CMA and MCMA with Carrier Recovery that is robust for high level QAM with low steady state tracking error.

  • PDF

Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery

  • Wang, Chengyou;Zhang, Heng;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.510-522
    • /
    • 2018
  • As the major source of information, digital images play an indispensable role in our lives. However, with the development of image processing techniques, people can optionally retouch or even forge an image by using image processing software. Therefore, the authenticity and integrity of digital images are facing severe challenge. To resolve this issue, the fragile watermarking schemes for image authentication have been proposed. According to different purposes, the fragile watermarking can be divided into two categories: fragile watermarking for tamper localization and fragile watermarking with recovery ability. The fragile watermarking for image tamper localization can only identify and locate the tampered regions, but it cannot further restore the modified regions. In some cases, image recovery for tampered regions is very essential. Generally, the fragile watermarking for image authentication and recovery includes three procedures: watermark generation and embedding, tamper localization, and image self-recovery. In this article, we make a review on self-embedding fragile watermarking methods. The basic model and the evaluation indexes of this watermarking scheme are presented in this paper. Some related works proposed in recent years and their advantages and disadvantages are described in detail to help the future research in this field. Based on the analysis, we give the future research prospects and suggestions in the end.

Adaptive mesh refinement/recovery strategy for FEA

  • Choi, Chang-Koon;Lee, Eun-Jin;Yu, Won-Jin
    • Structural Engineering and Mechanics
    • /
    • v.17 no.3_4
    • /
    • pp.379-391
    • /
    • 2004
  • This paper deals with the development of h-version adaptive mesh refinement and recovery strategy using variable-node elements and its application to various engineering field problems with 2D quadrilateral and 3D hexahedral models. The variable-node elements which have variable mid-side nodes on edges or faces are effectively used in overcoming some problems in connecting the different layer patterns of the transition zone between the refined and coarse mesh. A modified recovery technique of gradients adequate for variable-node elements and proper selection of error norms for each engineering field problems are proposed. In the region in which the error is greater than the permissible refinement error, the mesh is locally refined by subdivision. Reversely, in some parts of the domain having the error smaller than the permissible recovery error, the mesh is locally recovered (coarsened) by combination. Hierarchical structures (e.g. quadtrees and octrees) and element-based storage structures are composed to perform this adaptive process of refinement and recovery. Some numerical examples of a 3D heat conduction analysis of the concrete with hydration heat and a 2D flow analysis of vortex shedding show effectiveness and validity of the proposed scheme.

A Selective Error Control Scheme based on Timely Retransmission in Multimedia Communications (멀티미디어통신에서 적시 재전송에 기반한 선택적인 오류 제어 방법)

  • Jeong, Chung-Il;Gwon, Do-Han;Park, Chang-Yun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.10
    • /
    • pp.1225-1236
    • /
    • 1999
  • 기존의 오류 제어 방법들은 실시간 특성과 신축적인 신뢰성을 가지는 멀티미디어 통신 응용의 특징을 충분히 반영하지 못하고 있다. 본 연구는 기존의 재전송을 기반으로 하는 방법에 두 가지 기법을 추가하여 이 문제에 접근하였다. 첫째, 실시간 데이타의 마감 시간을 고려하여 미리 재전송을 실시하는 사전 재전송과 시간적으로 불가능하다고 판단될 때 복구를 포기하는 재전송 포기를 통한 적시 재전송 기법이다. 둘째, 요구되는 신뢰성에 근접하도록 오류가 많이 발생하였을 때만 재전송을 하는 선택적 오류 제어 기법이다. 본 연구는 두 기법을 적용한 오류 제어 프로토콜을 구현하고 네트워크 환경을 바꾸어 가며 성능을 검사하였다. 실험 결과, 제안된 오류 제어 방법은 전체적인 오류 제어 부하는 감소시키면서 오류 복구율을 높인다는 점을 확인하였다.Abstract The current error control schemes do not fit well to the characteristics of multimedia communications: real-time transmission and flexible reliability requirements. This research proposes a new error control scheme, which extends the retransmission-based error control with the following two mechanisms. First, error recovery is performed in two timely fashions: one is retransmission in advance where a retransmission is performed early enough for the deadline if an error is suspected, and the other is retransmission abort where a retransmission is given up if its recovery within the deadline seems to be impossible. Second, error control is selectively performed only when an actual error rate approaches to the threshold on a given reliability requirement. The proposed scheme has been implemented and experimented in various network environments. The performance results show that it has lower control overhead and higher error recovery than the existing schemes.