• Title/Summary/Keyword: Signature scheme

Search Result 412, Processing Time 0.026 seconds

Management of Digital Media Broadcasting Contents Users Based on Group Signature Scheme (그룹 인증 기법을 이용한 이동 멀티미디어 방송 콘텐츠 사용자 관리 방안)

  • Shin, Ki-Woo;Park, Young-Hoon;Seo, Seung-Woo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2010.11a
    • /
    • pp.155-158
    • /
    • 2010
  • 급증하고 있는 이동 멀티미디어 방송 콘텐츠 서비스의 수요에 발맞추어 이 서비스를 이용하는 사용자들을 효율적으로 관리하는 방안에 대해 관심이 집중되고 있다. 1991년 Chaum과 van Heyst에 의해 소개된 그룹 인증 관리 기법은 익명성의 보장이나, 관리상의 편의로 인해 앞에서 언급된 문제를 해결하는 데 중요한 역할을 할 것으로 예상되었다. 하지만, 이후 소개된 몇개의 그룹 인증 관리 기법들이 실제로는 익명성을 보장하지 못 하거나, 외부 그룹에 의해 악용될 수 있다는 점이 증명되어, 그룹 인증 관리 기법을 실제로 응용하기 이전에 안전성 보장을 위해 요구되는 적합한 기준들을 선정하고, 이 기준에 부합하는지를 살펴보는 일이 더욱 시급한 문제로 대두되었다. 이에 본 논문은 이동 멀티미디어 방송 콘텐츠 서비스를 이용하는 사용자들을 그룹 인증 기법으로 관리하는 데 있어, 요구되는 안전성 조건과 이에 적합한 그룹 인증 기법을 소개하고, 실제로 소개한 그룹 인증 기법이 본 논문에서 선정한 안전성 조건에 부합하는지를 증명하였다. 더불어, 그룹 인증 기법을 실제 효과적으로 응용할 수 있는 비즈니스 모델을 제안하여 그룹 인증 기법의 효용 및 앞으로의 개발 방향을 제시하였다.

  • PDF

Web Services based XML Security Model for Secure Information Exchange in Electronic Commerce (전자상거래에서 안전한 정보 교환을 위한 웹 서비스 기반의 XML 보안 모델)

  • Cho, Kwang-Moon
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.5
    • /
    • pp.93-99
    • /
    • 2004
  • The most important technology in the electronic commerce based on Internet is to guarantee the security of trading information exchange. Many technologies are proposed as a standard to support this security problem. One of them is an XML (eXtensible Markup Language). This is used in various applications as the document standard for electronic commerce system. The XML security has become very important topic. In this paper an XML security model for web services based electronic commerce system to guarantee the secure exchange of trading information. To accomplish the security of XML, the differences of XML signature, XML encryption and XML key management scheme respect to the conventional system should be provided. The new architecture is proposed based on unique characteristics of XML. Especially the method to integrate the process management system need to the electronic commerce is proposed.

  • PDF

Stochastic Gravitational Wave Background in 0.1-10 Hz

  • Park, Chan;Ahn, Sang-Hyeon;Bae, Yeong-Bok;Kang, Gungwon;Kim, Chunglee;Kim, Whansun;Oh, John J.;Oh, Sang Hoon;Son, Edwin J.;Lee, Yong Ho
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.42 no.2
    • /
    • pp.53.2-53.2
    • /
    • 2017
  • Stochasitc gravitational wave background (SGWB) is expected to be contributed by primordial sources (e.g. inflation signature) and astrophysical sources (e.g., incoherent superposition of a large numbers of compact binary inspirals throughout in the Universe). Theoretically, SGWB is predicted to span in a broad frequency range between less than nHz up to kHz. Many gravitational-wave (GW) detectors such as LIGO or LISA aim to detect or constrain SGWB in different frequency band that is most sensitive for each detector. In this talk, we focus on the prospectives of constraining the energy density of SGWB between 0.1-10 Hz. We introduce the characteristics of SGWB and representative models for primordial and astrophysical sources. Then, we propose a signal extraction scheme to detect SGWB using one or several omni-directional GW detectors such as SLGT(Superconducting Low-frequency Gravitational-wave Telescope). Considering SLGT sensitivity, we discuss how to observe SGWB in 0.1-10 Hz if we have SLGT network. Finally, we highlight interesting SGWB models that can be constrained in 0.1-10 Hz with SLGT.

  • PDF

Design and Implementation of Admission Control System in Smart Space (스마트 공간을 위한 참여 제어 시스템의 설계 및 구현)

  • Yang Jong-Phil;Shim Mi-Sun;Shin Weon;Rhee Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.3
    • /
    • pp.342-352
    • /
    • 2006
  • Nowadays, Computing environment is changing to ubiquitous. In such ubiquitous computing environments, entities expect to access resources and services at any time from anywhere. Therefore, tile wily how to establish trust relationship among previously unknown devices or resources is needed under such environments. In this paper, we firstly review a model to delegate the trust to communicating entities in ubiquitous environment and its security problems(e.g., malicious right-delegation and revocation of right-delegation). Then, we design a new model for secure delegation over communication entities which is based on two-party signature scheme, and implement it.

  • PDF

Multi-Sequence Signaling Based Asynchronous Trellis-Coded DS/CDMA System (다중 시퀀스 시그날링에 기초한 비동기 트레리스 부호화 DS/CDMA 시스템)

  • Sangho Choe
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3A
    • /
    • pp.248-256
    • /
    • 2004
  • Woerner had suggested an asynchronous trellis-coded DS/CDMA system based on a multi-sequence signaling, biorthogonal sequence, which is superior to single sequence signaling, such as M-ary PSK, due to their better cross-correlation properties. This paper analyzes and compares system performance between OPSM, a recently-presented multi-sequence signaling scheme, and biorthogonal sequence signaling. Interuser interference moments of the two schemes are derived and compared which verifies that OPSM, having smaller signature sequences per symbol than biorthogonal signaling, reduces cross-correlation. Numerical results compare the power and spectral efficiency of asynchronous trellis-coded DS/CDMA systems based on multi-sequence signaling.

Threats according to the Type of Software Updates and White-List Construction Scheme for Advanced Security (소프트웨어 업데이트 유형별 위협요소와 안전성 강화를 위한 화이트리스트 구성 방안)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1369-1374
    • /
    • 2014
  • In case of APT attacks, the update server is being used as a means of dissemination, the update program is running malicious code or data in applications such as anti-virus signature is vulnerable to manipulation, SW Update threat identification and prevention measures are urgently required. This paper presents a natiional and international SW update structure, update process exploits and response measures to examine, Through the extraction/analysis of a domestic famous SW update log, we are willing to select the necessary component of the normal program update to identify a white list.

Performance of Multi-rate Optical Wireless PPM-CDMA System over an Indoor Non-directed Diffuse Channel (실내 비방향성 분산채널에서 다중전송률 광무선 PPM-CDMA 시스템의 성능 분석)

  • 황성수;이재홍
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.7A
    • /
    • pp.943-950
    • /
    • 2000
  • In this paper, an asynchronous multi-rate optical wireless pulse position modulation-code division multiple access (PPM-CDMA) is proposed for an indoor non-directed diffuse channel. As a signature sequence for CDMA, an optical orthogonal code (OOC) is used and an interference cancellation scheme is applied to improve the bit error rate. It is known that the optical PPM-CDMA has advantages due to its power efficiency. Moreover, it provides multi-rate services by varying the modulation level with fixed pulse duration. In the proposed multi-rate PPM-CDMA system with fixed pulse duration, chip rate and sampling time do not change for each transmission rate and this simplifies overall system structure.

  • PDF

An Efficient Group Key Management Scheme using Counting Bloom Filter in VANET (VANET에서 카운팅 블룸 필터를 사용한 효율적인 그룹 키 관리 기법)

  • Lee, SuYoun;Ahn, HyoBeom
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.47-52
    • /
    • 2013
  • VANET(Vehicular Ad-hoc Network) is a kind of ad hoc networks which is consist of intelligence vehicular ad nodes, and has become a hot emerging research project in many fields. It provides traffic safety, cooperative driving and etc. but has also some security problems that can be occurred in general ad hoc networks. In VANET, it has been studies that group signature method for user privacy. However, among a group of group key generation phase and group key update phase, RSU(Road-Side Unit) and the computational overhead of the vehicle occur. In this paper, we propose an efficient group key management techniques with CBF(Counting Bloom Filter). Our group key management method is reduced to the computational overhead of RSU and vehicles at the group key generation and renewal stage. In addition, our method is a technique to update group key itself.

Proxy Signature Scheme based on Proxy-Register Protocol (위임등록 프로토콜을 이용한 대리서명 기법)

  • Lee, Yong-Jun;Park, Se-Joon;Oh, Hea-Suk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1949-1952
    • /
    • 2003
  • 실생황에서 권한의 위임을 동한 대리 서명 기법들이 최근 많이 연구되고 있다. 대리서명은 원서명자가 그의 서명 권한을 대리서명자에게 위임하여 대리서명자가 원서명자를 대신해서 서명을 생성하는 것을 말한다. 이러한 대리서명을 온라인 상에서 사용하기 위해서는 위임자의 권한 위임장이 위 변조와 오남용의 위험으로부터 안전하게 보호되어야 한다. 또한 대리서명의 수행을 위해서는 원서명자의 위임에 대한 정보가 명확해야 한다. 대리서명의 기본적인 방법은 원서명자가 위임 정보에 대한 서명을 생성하고 이를 위임자에게 전달하여 위임자가 위임키로서 사용하게 하는 것이다. 위임키쌍이 위임 정보에 기반한 원서명자의 서명으로부터 생성되기 때문에 어떠한 검증절차에서도 원서명자의 동의를 확인 할 수 있다. 본 논문에서는 원서명자와 대리서명자가 기존의 인증서를 발급 받은 환경에서 원서명자가 대리서명자에 대하여 검증자에게 위임정보를 등록하는 프로토콜을 제안한다. 위임내용에 대해 원서명자가 전자서명을 하고 검증자는 이에 해당하는 내용을 검증한 후 위임서명자에 대한 권한 기간 등의 제약사항을 설정한다. 이후 위임서명자는 위임내용에 대해 고지를 받고 허가된 범위 내에서 위임 서명을 한다. 마지막으로 본 논문에서는 기존의 방법들과 비교 분석하여 제안하는 위임 등륵 프로토콜에 대한 효율성을 제시한다.

  • PDF

Cavitation Noise Detection Method using Continuous Wavelet Transform and DEMON Signal Processing (연속 웨이브렛 변환 및 데몬 신호처리를 이용한 캐비테이션 소음 검출 방법)

  • Lee, Hee-chang;Kim, Tae-hyeong;Sohn, Kwon;Lee, Phil-ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.4
    • /
    • pp.505-513
    • /
    • 2017
  • Cavitation is a phenomenon caused by vapour cavities that is produced in rapid pressure changes. When the cavitation happened, the sound pressure level of a underwater radiated noise is increased rapidly. As a result, it can increase the probability of the identification or classification of a our warship's acoustic signature by an enemy ship. However, there is a problem that it is hard to precisely detect the occurrence of a cavitation noise. Therefore, this paper presents recent improvements in terms of the cavitation noise measurement by using continuous wavelet transform and DEMON(Detection of Envelope Modulation on Noise) signal processing. Then, we present that the suggested scheme is more suitable for detecting the cavitation than existing algorithms.