• Title/Summary/Keyword: Signature Systems

Search Result 391, Processing Time 0.023 seconds

Securing Anonymous Authenticated Announcement Protocol for Group Signature in Internet of Vehicles

  • Amir, Nur Afiqah Suzelan;Malip, Amizah;Othman, Wan Ainun Mior
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4573-4594
    • /
    • 2020
  • Announcement protocol in Internet of Vehicles (IoV) is an intelligent application to enhance public safety, alleviate traffic jams and improve transportation quality. It requires communication between vehicles, roadside units and pedestrian to disseminate safety-related messages. However, as vehicles connected to internet, it makes them accessible globally to a potential adversary. Safety-related application requires a message to be reliable, however it may intrude the privacy of a vehicle. Contrarily, if some misbehaviour emerges, the malicious vehicles must be able to traceable and revoke from the network. This is a contradiction between privacy and accountability since the privacy of a user should be preserved. For a secure communication among intelligent entities, we propose a novel announcement protocol in IoV using group signature. To the best of our knowledge, our work is the first comprehensive construction of an announcement protocol in IoV that deploys group signature. We show that our protocol efficiently solves these conflicting security requirements of message reliability, privacy and accountability using 5G communication channel. The performance analysis and simulation results signify our work achieves performance efficiency in IoV communication.

Reliable blockchain-based ring signature protocol for online financial transactions

  • Jinqi Su;Lin He;Runtao Ren;Qilei Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2083-2100
    • /
    • 2023
  • The rise of Industry 5.0 has led to a smarter and more digital way of doing business, but with it comes the issue of user privacy and security. Only when privacy and security issues are addressed, will users be able to transact online with greater peace of mind. Thus, to address the security and privacy problems associated with industry blockchain technology, we propose a privacy protection scheme for online financial transactions based on verifiable ring signatures and blockchain by comparing and combining the unconditional anonymity provided by ring signatures with the high integrity provided by blockchain technology. Firstly, we present an algorithm for verifying ring signature based on distributed key generation, which can ensure the integrity of transaction data. Secondly, by using the block chain technique, we choose the proxy node to send the plaintext message into the block chain, and guarantee the security of the asset transaction. On this basis, the designed scheme is subjected to a security analysis to verify that it is completely anonymous, verifiable and unerasable. The protection of user privacy can be achieved while enabling online transactions. Finally, it is shown that the proposed method is more effective and practical than other similar solutions in performance assessment and simulation. It is proved that the scheme is a safe and efficient online financial transaction ring signature scheme.

On-line Signature Verification Using Fusion Model Based on Segment Matching and HMM (구간 분할 및 HMM 기반 융합 모델에 의한 온라인 서명 검증)

  • Yang Dong Hwa;Lee Dae-Jong;Chun Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.12-17
    • /
    • 2005
  • The segment matching method shows better performance than the global and points-based methods to compare reference signature with an input signature. However, the segment-to-segment matching method has the problem of decreasing recognition rate according to the variation of partitioning points. This paper proposes a fusion model based on the segment matching and HMM to construct a more reliable authentic system. First, a segment matching classifier is designed by conventional technique to calculate matching values lot dynamic information of signatures. And also, a novel HMM classifier is constructed by using the principal component analysis to calculate matching values for static information of signatures. Finally, SVM classifier is adopted to effectively combine two independent classifiers. From the various experiments, we find that the proposed method shows better performance than the conventional segment matching method.

A Study on the Sampling of Ocean Meteorological Data to Analyze Signature of Naval Ships (함정 신호해석 연구에 필요한 해양기상환경 자료의 표본추출에 관한 연구)

  • Cho, Yong-Jin
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.2
    • /
    • pp.19-28
    • /
    • 2018
  • In this paper, we studied on the sampling of ocean meteorological data to analyze signature of naval ships. The newest ocean meteorological data, that was quality controled by the Korea Meteorological Administration(KMA), was collected. Outliers were removed from the data by setting the usable range of data. After that, the data size was reduced through the random sampling method, taking geopolitical significance and effective area of buoy, for probabilistic analysis. Moreover, the sample sizes were set at 100, 200, and 400 by considering the population size and a 95% confidence level. The final sample was obtained using the two-dimensional stratified sampling method based on highly correlated water temperature and air temperature. The sum of the squared errors and the confidence interval was calculated to compare the result of sampling. As a result, this study proposed reasonable sample size for infra­red signature analysis of naval ships.

An Efficient Signature Recognition Based on Histogram Using Statistical Characteristics (통계적 속성을 이용한 히스토그램 기반 효율적인 서명인식)

  • Cho, Yong-Hyun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.701-709
    • /
    • 2010
  • This paper presents an efficient signature recognition method by using the hybrid similarity criterion, which is in inverse proportion to distance and in proportion to correlation between the images. The distance is applied to express the spacial property of image, and the correlation is also applied to express the statistical property. The proposed criterion provides the robust recognition to both the geometrical variations such as position, size, and rotation and the shape variation. The normalized cross-correlation(NCC), which is calculated by considering 4 directions based on the histogram of binary image, is applied to express rapidly and accurately the similarity between the images. The proposed method has been applied to the problem for recognizing the 20 truck images of 288*288 pixels and the 105(3 persons * 35 images) signature images of 256*256 pixels, respectively. The experimental results show that the proposed method has a superior recognition performance that appears the image characters well. Especially, the hybrid criterion of NCC and ordinal distance has a superior recognition performance to the hybrid criterion using city-block or Euclidean distance.

Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment

  • Park, Sung-Wook;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.9 no.3
    • /
    • pp.461-476
    • /
    • 2013
  • Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an zero-knowledge proof scheme and ring signature based on NTRU for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

A Study on the Diffuser Design of Exhaust Pipes for the Infra-Red Signature Reduction of Naval Ship (함정 적외선 신호 감소를 위한 폐기관의 디퓨져 설계에 관한 연구)

  • Yoon, Seok-Tae;Cho, Yong-Jin;Ko, Dae-Eun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.12
    • /
    • pp.793-798
    • /
    • 2017
  • In modern naval ships, an infrared signature suppression (IRSS) system is used to reduce the metal surface temperature of the heated exhaust pipe and high-temperature exhaust gases generated from the propulsion system. Generally, the IRSS systems used in Korean naval ships consist of an eductor, mixing tube, and diffuser. The diffuser reduces the temperature of the metal surface by creating an air film due to a pressure difference between the internal gas and the external air. In this study, design variables were selected by analyzing the shapes of a diffuser designed by an advanced overseas engineering company. The characteristics of the design variables that affect the performance of the IRSS were investigated through the Taguchi experimental method. A heat flow analysis technique for IRSS systems established in previous studies was used analyze the performance of the diffuser. The performance evaluation was based on the area-averaged value of the metal surface temperature and exhaust gas temperature at the outlet of the diffuser, which are directly related to the intensity of the infrared signature. The results show that the temperature of the exhaust gas was significantly affected by changes in the diameter of the diffuser outlet, and the temperature of the diffuser's metal surface was significantly affected by changes in the number of diffuser rings.

Integrity Guarantee Scheme of Mobile Agents through Authentication of Digital Signature with TTS (TTS기반에서 디지털 서명의 실행 인증을 통한 에이전트의 무결성 보장 기법)

  • Jung Chang-Ryul;Yoon Hong-Sang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6C
    • /
    • pp.651-657
    • /
    • 2006
  • This paper propose the technique for the execution authentication of digital signature with TTS(traceable trust server) to guarantee the safe execution of mobile agents. That is to say, it is focused on improving the processing speed of systems and the traffic of network which are problems in the existing studies. The digital signature is used to guarantee the efficient and safe execution and the integrity of mobile agents. The certificate of it is chained with synthesis function, cryptographic algorithm based on public key, and hash function. And white hosts can be protected against the threat of being used maliciously. Then, we prove the efficiency of system overhead and the traffic of network by the analysis. In case the certificate chain of a digital signature is used, the safe execution of mobile agents can be protected against attackers that wish to insert a newly created certificate after cutting off the chain after striking space key 2 times.

An Anonymous Rights Trading System using group signature schemes (그룹서명을 이용하여 익명성이 보장되는 디지털 권한 전달 시스템)

  • 주학수;김대엽;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.3-13
    • /
    • 2004
  • E-Commerce is suddenly spreading in a daily life. A rights trading system is a system that circulates digital-tickets such as plane tickets, software license, coupon. There are two main approaches so far account-based and smart-card based systems. The NTT Proposed FlexToken, a new smart card based copy prevention scheme for digital rights. They Proposed using pseudonymous self certified keys of Petersen and Horster in order to ensure anonymity of users. However. Petersen and Holster's scheme should register a pseudonymous key pair at TTP (One-time) every time so that users create the signature which is satisfied with unlinkability property In this paper, we propose a new anonymous rights trading system using group signature. This paper has a meaning having applied to digital rights trading system an efficient smart card based group signature.

Target Recognition Algorithm Based on a Scanned Image on a Millimeter-Wave(Ka-Band) Multi-Mode Seeker (스캔 영상 기반의 밀리미터파(Ka 밴드) 복합모드 탐색기 표적인식 알고리즘 연구)

  • Roh, Kyung A;Jung, Jun Young;Song, Sung Chan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.2
    • /
    • pp.177-180
    • /
    • 2019
  • To improve the accuracy rate of guided weapons, many studies have been conducted on the accurate detection and identification of targets from sea clutter. Because of the variety and complicated characteristics of both sea-clutter and target signals, an active target recognition technique is required. In this study, we propose an algorithm to distinguish clutter and recognize targets by applying a fractal signature(FS) classifier, which is a fractal dimension, and a high-resolution target image(HRTI) classifier, which applies scene matching to an image formed from a scanned image. Simulation results using the algorithm revealed that the HRTI classifier recognized targets 1 and 2 at a 100 % rate, whereas the FS classifier recognized targets 1 and 2 at rates of 90 % and 93 %, respectively.