• Title/Summary/Keyword: Symmetric Scheme

Search Result 235, Processing Time 0.022 seconds

VERIFICATION OF A PAILLIER BASED SHUFFLE USING REPRESENTATIONS OF THE SYMMETRIC GROUP

  • Cho, Soo-Jin;Hong, Man-Pyo
    • Bulletin of the Korean Mathematical Society
    • /
    • v.46 no.4
    • /
    • pp.771-787
    • /
    • 2009
  • We use an idea of linear representations of the symmetric group to reduce the number of communication rounds in the verification protocol, proposed in Crypto 2005 by Peng et al., of a shuffling. We assume Paillier encryption scheme with which we can apply some known zero-knowledge proofs following the same line of approaches of Peng et al. Incidence matrices of 1-subsets and 2-subsets of a finite set is intensively used for the implementation, and the idea of $\lambda$-designs is employed for the improvement of the computational complexity.

BTS Based Improved BER for Stronger Channel User in Non-Uniform Source SSC NOMA

  • Chung, Kyuhyuk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.78-84
    • /
    • 2022
  • In this paper, to improve further the bit-error rate (BER) performance of the stronger channel user in non-uniform source non-orthogonal multiple access (NOMA) with symmetric superposition coding (SSC), we propose a smart bit-to-symbol (BTS) mapping of SSC. First, the analytical expression for the total allocated power of the proposed BTS mapping scheme is derived, and then we show that the BER of the proposed BTS mapping scheme improves further, compared to that of the existing BTS mapping scheme. Moreover, based on the simulations, the signal-to-noise (SNR) gain of the proposed BTS mapping scheme over the existing BTS mapping scheme is calculated. In result, the proposed BTS mapping could be a candidate scheme for non-uniform source SSC NOMA with the SNR gain.

AN ACCELERATED DEFLATION TECHNIQUE FOR LARGE SYMMETRIC GENERALIZED EIGENPROBLEMS

  • HYON, YUN-KYONG;JANG, HO-JONG
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.3 no.1
    • /
    • pp.99-106
    • /
    • 1999
  • An accelerated optimization technique combined with a stepwise deflation procedure is presented for the efficient evaluation of a few of the smallest eigenvalues and their corresponding eigenvectors of the generalized eigenproblems. The optimization is performed on the Rayleigh quotient of the deflated matrices by the aid of a preconditioned conjugate gradient scheme with the incomplete Cholesky factorization.

  • PDF

Protecting Security Policies in Ubiquitous Environments

  • Lee, Wan-Soo;Lee, Sung-Woon;Kim, Hyun-Sung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.297-300
    • /
    • 2005
  • Especially, system security is very important in the ubiquitous environment. This paper proposes a protecting scheme for security policies in Firewall and intrusion detection system (IDS). The one-way hash function and the symmetric cryptosystem are used to make the protected rules for Firewalls and IDSs. The proposed scheme could be applied in diverse kind of defense systems which use rules.

  • PDF

WEAK METRIC AND WEAK COMETRIC SCHEMES

  • Kim, Dae-San;Kim, Gil-Chun
    • Journal of the Korean Mathematical Society
    • /
    • v.46 no.4
    • /
    • pp.785-812
    • /
    • 2009
  • The notion of weak metric and weak cometric schemes are introduced as a generalization of metric and cometric schemes. They are given as the wreath product of a finite number of symmetric association schemes satisfying certain equivalent conditions which are analogous to the ones for metric or cometric schemes. We characterize those schemes and determine some of their parameters.

A Novel Authenticated Group Key Distribution Scheme

  • Shi, Run-hua;Zhong, Hong;Zhang, Shun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.935-949
    • /
    • 2016
  • In this paper, we present a novel authenticated group key distribution scheme for large and dynamic multicast groups without employing traditional symmetric and asymmetric cryptographic operations. The security of our scheme is mainly based on the basic theories for solving linear equations. In our scheme, a large group is divided into many subgroups, where each subgroup is managed by a subgroup key manager (SGKM) and a group key generation center (GKGC) further manages all SGKMs. The group key is generated by the GKGC and then propagated to all group members through the SGKMs, such that only authorized group members can recover the group key but unauthorized users cannot. In addition, all authorized group members can verify the authenticity of group keys by a public one-way function. The analysis results show that our scheme is secure and efficient, and especially it is very appropriate for secure multicast communications in large and dynamic client-server networks.

Dynamic Session Key based Pairwise Key Management Scheme for Wireless Sensor Networks

  • Premamayudu, B;Rao, Koduganti Venkata;Varma, P. Suresh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5596-5615
    • /
    • 2016
  • Security is one of the major challenges in the Wireless Sensor Networks (WSNs). WSNs are more vulnerable to adversarial activities. All cryptographic security services indirectly depend on key management. Symmetric key management is the best key establishment process for WSNs due to the resource constraints of the sensors. In this paper, we proposed dynamic session key establishment scheme based on randomly generated nonce value and sensor node identity, in which each sensor node is equipped with session key on expire basis. The proposed scheme is compare with five popular existing key management systems. Our scheme is simulated in OMNET++ with MixiM and presented experimental results. The analytical study and experimental results show the superiority of the proposed scheme over the existing schemes in terms of energy, storage, resilience and communication overhead.

Study on Threshold Scheme based Secure Secret Sharing P2P System (임계 방식 기반 안전 비밀조각 공유 P2P 시스템 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.21-33
    • /
    • 2022
  • This paper is to suggest the secure secret sharing system in order to outstandingly reduce the damage caused by the leakage of the corporate secret. This research system is suggested as efficient P2P distributed system kept from the centrally controlled server scheme. Even the bitcoin circulation system is also based on P2P distribution scheme recenly. This research has designed the secure circulation of the secret shares produced by Threshold Shamir Secret Sharing scheme instead of the shares specified in the torrent file using the simple, highly scalable and fast transferring torrent P2P distribution structure and its protocol. In addition, this research has studied to apply both Shamir Threshold Secret Sharing scheme and the securely strong multiple user authentication based on Collaborative Threshold Autentication scheme. The secure transmission of secret data is protected as using the efficient symmetric encryption with the session secret key which is safely exchanged by the public key encryption. Also it is safer against the leakage because the secret key is effectively alive only for short lifetime like a session. Especially the characteristics of this proposed system is effectively to apply the threshold secret sharing scheme into efficient torrent P2P distributed system without modifying its architecture of the torrent system. In addition, this system guaranttes the confidentiality in distributing the secret file using the efficient symmetric encryption scheme, which the session key is securely exchanged using the public key encryption scheme. In this system, the devices to be taken out can be dynamically registered as an user. This scalability allows to apply the confidentiality and the authentication even to dynamically registerred users.

Ensuring Data Confidentiality and Privacy in the Cloud using Non-Deterministic Cryptographic Scheme

  • John Kwao Dawson;Frimpong Twum;James Benjamin Hayfron Acquah;Yaw Missah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.49-60
    • /
    • 2023
  • The amount of data generated by electronic systems through e-commerce, social networks, and data computation has risen. However, the security of data has always been a challenge. The problem is not with the quantity of data but how to secure the data by ensuring its confidentiality and privacy. Though there are several research on cloud data security, this study proposes a security scheme with the lowest execution time. The approach employs a non-linear time complexity to achieve data confidentiality and privacy. A symmetric algorithm dubbed the Non-Deterministic Cryptographic Scheme (NCS) is proposed to address the increased execution time of existing cryptographic schemes. NCS has linear time complexity with a low and unpredicted trend of execution times. It achieves confidentiality and privacy of data on the cloud by converting the plaintext into Ciphertext with a small number of iterations thereby decreasing the execution time but with high security. The algorithm is based on Good Prime Numbers, Linear Congruential Generator (LGC), Sliding Window Algorithm (SWA), and XOR gate. For the implementation in C, thirty different execution times were performed and their average was taken. A comparative analysis of the NCS was performed against AES, DES, and RSA algorithms based on key sizes of 128kb, 256kb, and 512kb using the dataset from Kaggle. The results showed the proposed NCS execution times were lower in comparison to AES, which had better execution time than DES with RSA having the longest. Contrary, to existing knowledge that execution time is relative to data size, the results obtained from the experiment indicated otherwise for the proposed NCS algorithm. With data sizes of 128kb, 256kb, and 512kb, the execution times in milliseconds were 38, 711, and 378 respectively. This validates the NCS as a Non-Deterministic Cryptographic Algorithm. The study findings hence are in support of the argument that data size does not determine the execution.

TWO-PHASE WAVE PROPAGATIONS PREDICTED BY HLL SCHEME WITH INTERFACIAL FRICTION TERMS (계면마찰항을 고려한 이상유동에서 파동전파에 대한 수치적 연구)

  • Yeom, G.S.;Chang, K.S.;Chung, M.S.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.115-119
    • /
    • 2009
  • We numerically investigated propagation of various waves in the two-phase flows such as sound wave, shock wave, rarefaction wave, and contact discontinuity in terms of pressure, void fraction, velocity and density of the two phases. The waves have been generated by a hydrodynamic shock tube, a pair of symmetric impulsive expansion, impulsive pressure and impulsive void waves. The six compressible two-fluid two-phase conservation laws with interfacial friction terms have been solved in two fractional steps. The first PDE Operator is solved by the HLL scheme and the second Source Operator by the semi-implicit stiff ODE solver. In the HLL scheme, the fastest wave speeds were estimated by the analytic eigenvalues of an approximate Jacobian matrix. We have discussed how the interfacial friction terms affect the wave structures in the numerical solution.

  • PDF