• Title/Summary/Keyword: Zero-Knowledge

Search Result 148, Processing Time 0.025 seconds

A study on DID metadata processing method according to distance learning data weight (원격교육 학습데이터 가중치에 따른 DID 메타데이터 처리방법 연구)

  • Youn-A Min
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.567-568
    • /
    • 2023
  • 본 논문에서는 블록체인 기반 DID기술을 이용하여 원격교육에서 발생하는 학습데이터를 효율적으로 관리하기 위한 방법으로, 학습데이터 가중치를 고려한 DID 메타데이터관리방법을 제안하였다. 메타데이터의 식별자에 대하여 특정위치로 데이터 가중치를 검색하도록 하고 해당 가중치에 따라 처리방법을 다양화 할 수 있다. 본문에서는 블록체인의 Zero Knowledge Proof 방식 처리에 차별화를 두어 메타데이터를 처리하였으며 데이터 처리속도 및 데이터관리에 효율성높일 수 있다.

  • PDF

A Review of Fixed-Complexity Vector Perturbation for MU-MIMO

  • Mohaisen, Manar
    • Journal of Information Processing Systems
    • /
    • v.11 no.3
    • /
    • pp.354-369
    • /
    • 2015
  • Recently, there has been an increasing demand of high data rates services, where several multiuser multiple-input multiple-output (MU-MIMO) techniques were introduced to meet these demands. Among these techniques, vector perturbation combined with linear precoding techniques, such as zero-forcing and minimum mean-square error, have been proven to be efficient in reducing the transmit power and hence, perform close to the optimum algorithm. In this paper, we review several fixed-complexity vector perturbation techniques and investigate their performance under both perfect and imperfect channel knowledge at the transmitter. Also, we investigate the combination of block diagonalization with vector perturbation outline its merits.

The Allocation of Inspection Efforts Using a Knowledge Based System

  • Kang, Kyong-sik;Stylianides, Christodoulos;La, Seung-houn
    • Journal of Korean Society for Quality Management
    • /
    • v.18 no.2
    • /
    • pp.18-24
    • /
    • 1990
  • The location of inspection stations is a significant component of production systems. In this paper, a prototype expert system is designed for deciding the optimal location of inspection stations. The production system is defined as a single channel of n serial operation stations. The potential inspection station can be located after any of the operation stations. Nonconforming units are generated from a compound binomial distribution with known parameters at any given operation station. Traditionally Dynamic programming, Zero-one integer programming, or Non-linear programming techniques are used to solve this problem. However a problem with these techniques is that the computation time becomes prohibitively large when t be number of potential inspection stations are fifteen or more. An expert system has the potential to solve this problem using a rule-based system to determine the near optimal location of inspection stations. This prototype expert system is divided into a static database, a dynamic database and a knowledge base. Based on defined production systems, the sophisticated rules are generated by the simulator as a part of the knowledge base. A generate-and-test inference mechanism is utilized to search the solution space by applying appropriate symbolic and quantitative rules based on input data. The goal of the system is to determine the location of inspection stations while minimizing total cost.

  • PDF

Local activation using traditional knowledge and ecological resources of Korean islands

  • Hong, Sun-Kee
    • Journal of Ecology and Environment
    • /
    • v.38 no.2
    • /
    • pp.263-269
    • /
    • 2015
  • When we consider changes in agro-fishery systems instigated by environmental changes in islands, rise in sea levels, and natural disasters such as tsunamis, there is an urgent need to carry out initiatives to enhance life standard and conserve ecosystem in island and coastal regions. To protect the region's landscape from the effects of climate change, it is necessary to develop an integrated management system for ecosystem conservation, human settlements, and the local economy. This paper discusses the outline of a preliminary national plan for a sustainable island management system for remote (inhabited and uninhabited) islands in Korea. Two main ideas to enhance life standard are adapting to the natural environment by applying traditional knowledge and utilizing ecological resources of islands, i.e., improving the quality of life and creating added value. As a technique for improving the quality of life, the establishment of eco-villages based on energy-efficient passive houses and ecological welfare is suggested. Another technique for creating added value, the development of sea-farming islands that utilize islands' new recyclable energy is also proposed. Finally, the suggested ideas are discussed in relation to island ecotourism and carbon zero islands.

Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment (NFC 모바일 환경에서 결제정보보호를 위한 NTRU 기반 인증 기법)

  • Park, Sung Wook;Lee, Im Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.3
    • /
    • pp.133-142
    • /
    • 2013
  • Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication (NFC) mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an mutual authentication scheme based on NTRU for secure channel in OTA and an zero-knowledge proof scheme NTRU based on for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

A Post-Quantum Multi-Signature Scheme (양자 컴퓨팅 환경에서 안전한 다중 서명 기법)

  • Ko, Chanyoung;Lee, Youngkyung;Lee, Kwangsu;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.517-526
    • /
    • 2021
  • Recently, the acceleration of the development of quantum computers has raised the issue of the safety of factorization and discrete logarithm based digital signature schemes used in existing Internet environments. To solve the issue, several digital signature schemes are presented that are safe in post-quantum computing environments, including standardization work by the National Institute of Standards and Technology(NIST). In this paper, we design and present a multi-signature scheme based on the TACHYON announced by Behnia et al. in 2018 CCS conference, and prove the security. Multi-signature schemes are key techniques that can distribute the dependence of cryptocurrency-wallet on private keys in the cryptocurrency field, which has recently received much attention as an digital signature application, and many researchers and developers have recently been interested. The multi-signature scheme presented in this paper enables public key aggregation in a plain public key model, which does not require additional zero-knowledge proof, and can construct an effective scheme with only an aggregated public key.

Security Analysis on 'Privacy-Preserving Contact Tracing Specifications by Apple and Google' and Improvement with Verifiable Computations ('애플과 구글의 코로나 접촉 추적 사양'에 대한 보안성 평가 및 검증 가능한 연산을 이용한 개선)

  • Kim, Byeong Yeon;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.291-307
    • /
    • 2021
  • There has been global efforts to prevent the further spread of the COVID-19 and get society back to normal. 'Contact tracing' is a crucial way to detect the infected person. However the contact tracing makes another concern about the privacy violation of the personal data of infected people, released by governments. Therefore Google and Apple are announcing a joint effort to enable the use of Bluetooth technology to help governments and health agencies reduce the spread of the virus, with user privacy and security central to the design. However, in order to provide the improved tracing application, it is necessary to identify potential security threats and investigate vulnerabilities for systematically. In this paper, we provide security analysis of Privacy-Preserving COVID-19 Contact Tracing App with STRIDE and LINDDUN threat models. Based on the analysis, we propose to adopt a verifiable computation scheme, Zero-knowledge Succinctness Non-interactive Arguments of Knowledges (zkSNARKs) and Public Key Infrastructure (PKI) to ensure both data integrity and privacy protection in a more practical way.

ON THE SCALED INVERSE OF (xi - xj) MODULO CYCLOTOMIC POLYNOMIAL OF THE FORM Φps (x) OR Φpsqt (x)

  • Cheon, Jung Hee;Kim, Dongwoo;Kim, Duhyeong;Lee, Keewoo
    • Journal of the Korean Mathematical Society
    • /
    • v.59 no.3
    • /
    • pp.621-634
    • /
    • 2022
  • The scaled inverse of a nonzero element a(x) ∈ ℤ[x]/f(x), where f(x) is an irreducible polynomial over ℤ, is the element b(x) ∈ ℤ[x]/f(x) such that a(x)b(x) = c (mod f(x)) for the smallest possible positive integer scale c. In this paper, we investigate the scaled inverse of (xi - xj) modulo cyclotomic polynomial of the form Φps (x) or Φpsqt (x), where p, q are primes with p < q and s, t are positive integers. Our main results are that the coefficient size of the scaled inverse of (xi - xj) is bounded by p - 1 with the scale p modulo Φps (x), and is bounded by q - 1 with the scale not greater than q modulo Φpsqt (x). Previously, the analogous result on cyclotomic polynomials of the form Φ2n (x) gave rise to many lattice-based cryptosystems, especially, zero-knowledge proofs. Our result provides more flexible choice of cyclotomic polynomials in such cryptosystems. Along the way of proving the theorems, we also prove several properties of {xk}k∈ℤ in ℤ[x]/Φpq(x) which might be of independent interest.

Study on the Application of a Decentralized Identity System within University Based on Zero-Knowledge Proof for Self-Sovereign Identity Assurance (자기주권 신원 보장을 위한 영지식증명 기반의 대학 내 DID 시스템 적용방안 연구)

  • Im Sung Sik;Kim Seo Yeon;Kim Dong Woo;Han Su Jin;Lee Ki Chan;Oh Soo Hyun
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.141-150
    • /
    • 2024
  • With the increasing frequency of incidents related to personal information leaks, there is a growing concern about personal information protection. Moreover, with the emergence of blockchain technology, there is a heightened interest in self-sovereign identity models applied through blockchain, with ongoing research on Decentralized Identifiers (DID) to achieve this. However, despite universities storing and utilizing significant information such as personal data, their computer systems are operated and managed based on centralized systems, leading to annual occurrences of personal data breaches. Therefore, this paper proposes and implements a DID-based computing system applicable within universities. Additionally, it establishes and executes prominent services within the university context. The proposed system ensures users' self-sovereign identities through verifiable credentials, enabling the establishment of a secure integrated information system within the university, departing from traditional centralized systems.

A function space approach to study rank deficiency and spurious modes in finite elements

  • Sangeeta, K.;Mukherjee, Somenath;Prathap, Gangan
    • Structural Engineering and Mechanics
    • /
    • v.21 no.5
    • /
    • pp.539-551
    • /
    • 2005
  • Finite elements based on isoparametric formulation are known to suffer spurious stiffness properties and corresponding stress oscillations, even when care is taken to ensure that completeness and continuity requirements are enforced. This occurs frequently when the physics of the problem requires multiple strain components to be defined. This kind of error, commonly known as locking, can be circumvented by using reduced integration techniques to evaluate the element stiffness matrices instead of the full integration that is mathematically prescribed. However, the reduced integration technique itself can have a further drawback - rank deficiency, which physically implies that spurious energy modes (e.g., hourglass modes) are introduced because of reduced integration. Such instability in an existing stiffness matrix is generally detected by means of an eigenvalue test. In this paper we show that a knowledge of the dimension of the solution space spanned by the column vectors of the strain-displacement matrix can be used to identify the instabilities arising in an element due to reduced/selective integration techniques a priori, without having to complete the element stiffness matrix formulation and then test for zero eigenvalues.