• Title/Summary/Keyword: authentication system

Search Result 1,661, Processing Time 0.04 seconds

ID-Based Proxy Re-encryption Scheme with Chosen-Ciphertext Security (CCA 안전성을 제공하는 ID기반 프락시 재암호화 기법)

  • Koo, Woo-Kwon;Hwang, Jung-Yeon;Kim, Hyoung-Joong;Lee, Dong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.64-77
    • /
    • 2009
  • A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a ciphertext for Alice into the ciphertext for Bob. Recently, ID-based proxy re-encryption schemes are receiving considerable attention for a variety of applications such as distributed storage, DRM, and email-forwarding system. And a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security by Green and Ateniese. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest users' private keys and thereby decrypt ciphertexts intended for only the honest user. To solve this problem, we propose two ID-based proxy re-encryption scheme schemes, which are proved secure under CPA and CCA in the random oracle model. For achieving CCA-security, we present self-authentication tag based on short signature. Important features of proposed scheme is that ciphertext structure is preserved after the ciphertext is re-encrypted. Therefore it does not lead to ciphertext expansion. And there is no limitation on the number of re-encryption.

Comparative Analysis of Local Green Tea in Korea by STS-RFLP (STS-RFLP법을 이용한 국내지역 재배녹차의 비교분석)

  • Cho, Kiu-Hyung;Jo, Aruna;Tsuge, Tomohiko;Kim, Jong-Cheol;Kim, Ru-Mi;Yoon, Ho-Sung;Kim, Gyung-Tae
    • Journal of Life Science
    • /
    • v.20 no.9
    • /
    • pp.1415-1419
    • /
    • 2010
  • Consumption of green tea has increased along with increasing concern regarding healthier lifestyles, and many brands of green tea are sold with a label indicating the region of Korea in which the tea was produced. However, there is little information on identifying the difference between the green tea cultivars according to the region they were grown. Here, 9 green tea cultivars collected from Hadong region, Bosung region, China and Japan were subjected to the STS-RFLP analysis. Using the coding and noncoding DNA regions of genes related to the phenylpropanoid pathway, such as phenylalanine ammonia-lyase, chalcone synthase and dihydroflavonol 4-reductase, we have identified the differences between green tea cultivars according to the region they were grown in. In this study, we showed a STS-RFLP method of green tea analysis which easily distinguished different kinds of tea using the primers as described. In addition, we identified that the green tea cultivars from Hadong and Bosung displayed a different profile when PAL intron was digested with Dde I, suggesting that a rapid authentication system for green tea cultivars grown in different regions in Korea is available.

A Study on the Automated Compatibility Standard Test System for eBook DRM (전자책 DRM을 위한 자동화된 표준정합성 검사 시스템에 관한 연구)

  • Kim, Tae-Hyun;Kang, Ho-Gap;Ahn, Chang-Ju;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.127-136
    • /
    • 2013
  • The study of the compatibility of EPUB DRM, granted by the Korea Copyright Commission, as a CT R & D project (Project Title: The Development of the standard reference software technology for International Standard EPUB-based eBook DRM) developed standards such as profile standards for encryption digital signature and authentication certificates and standards for technical terms of rights information. In 2012, these four standards have been established as the Korean Industrial Standards under the names of 'Encryption specification for EPUB DRM,' 'the Digital signature specification for EPUB DRM,' 'the Certificate specification for EPUB DRM,' and 'Definitions of Right Terms for EPUB DRM' through the ODPF(Open Digital Standardization Forum) and the TTA(Telecommunications Technology Association). The research project also proposed standards of ebook DRM license protocols in order for the four standards to practically apply to ebook DRM compatibility. It is necessary for technology standards to require a compatibility standard test process for testing whether implementations which were developed on the basis of the standard specification, comply with standards. This study suggests an automated compatible standard test method and a test model under the ebook DRM standard technical specification.

A study of using quality for Radial Basis Function based score-level fusion in multimodal biometrics (RBF 기반 유사도 단계 융합 다중 생체 인식에서의 품질 활용 방안 연구)

  • Choi, Hyun-Soek;Shin, Mi-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.192-200
    • /
    • 2008
  • Multimodal biometrics is a method for personal authentication and verification using more than two types of biometrics data. RBF based score-level fusion uses pattern recognition algorithm for multimodal biometrics, seeking the optimal decision boundary to classify score feature vectors each of which consists of matching scores obtained from several unimodal biometrics system for each sample. In this case, all matching scores are assumed to have the same reliability. However, in recent research it is reported that the quality of input sample affects the result of biometrics. Currently the matching scores having low reliability caused by low quality of samples are not currently considered for pattern recognition modelling in multimodal biometrics. To solve this problem, in this paper, we proposed the RBF based score-level fusion approach which employs quality information of input biometrics data to adjust decision boundary. As a result the proposed method with Qualify information showed better recognition performance than both the unimodal biometrics and the usual RBF based score-level fusion without using quality information.

Design of Small Space Convergence Locking device Using IoT (IOT를 이용한 소규모 공간의 융합 잠금 장치 제안)

  • Park, Hyun-Joo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.2
    • /
    • pp.45-50
    • /
    • 2021
  • In this paper, we propose the development of a smart space security device that can be opened and closed remotely using IoT. Existing space security devices can control opening and closing by breaking hardware or only using button devices or replicated keys. The recent COVID-19 crisis has created several applications for non-contact devices. In this study, we propose the development of a small space security device that has the function of unlocking through an app without touching the device. By transferring the control authority to a smartphone, device that cannot be opened or closed by only operating hardware at the user's option. It is convenient and hygienic because it can be opened and closed using an app without touching the locking device. Multiple security is possible because security can be released using an app after user authentication by fingerprint recognition and pattern input on a smartphone. If the user wishes, after using the app security, the security is released by directly touching a button installed in the safe or space or opening it with a key. In addition, by adding an inactive function to the app, it is designed so that the door of the safe cannot be opened when the key is lost or the small safe is lost. This study is expected to be able to effectively expand the security system by applying variously to objects that require security.

The Complete Chloroplast Genome Sequence and Intra-Species Diversity of Rhus chinensis

  • Kim, Inseo;Park, Jee Young;Lee, Yun Sun;Joh, Ho Jun;Kang, Shin Jae;Murukarthick, Jayakodi;Lee, Hyun Oh;Hur, Young-Jin;Kim, Yong;Kim, Kyung Hoon;Lee, Sang-Choon;Yang, Tae-Jin
    • Plant Breeding and Biotechnology
    • /
    • v.5 no.3
    • /
    • pp.243-251
    • /
    • 2017
  • Rhus chinensis is a shrub widely distributed in Asia. It has been used for traditional medicine and ecological restoration. Here, we report the complete chloroplast genome sequence of two R. chinensis genotypes collected from China and Korea. The assembled chloroplast genome of Chinese R. chinensis is 149,094 bp long, consisting of a large single copy (97,246 bp), a small single copy (18,644 bp) and a pair of inverted repeats (16,602 bp). Gene annotation revealed 77 protein coding genes, 30 tRNA genes, and 4 rRNA genes. A phylogenomic analysis of the chloroplast genomes with 11 known complete chloroplast genomes clarified the relationship of R. chinensis with the other plant species in the Sapindales order. A comparative chloroplast genome analysis identified 170 SNPs and 85 InDels at intra-species level of R. chinensis between Chinese and Korean collections. Based on the sequence diversity between Korea and Chinese R. chinensis plants, we developed three DNA markers useful for genetic diversity and authentication system. The chloroplast genome information obtained in this study will contribute to enriching genetic resources and conservation of endemic Rhus species.

Improved Security for Fuzzy Fingerprint Vault Using Secret Sharing over a Security Token and a Server (비밀분산 기법을 이용한 보안토큰 기반 지문 퍼지볼트의 보안성 향상 방법)

  • Choi, Han-Na;Lee, Sung-Ju;Moon, Dae-Sung;Choi, Woo-Yong;Chung, Yong-Wha;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.63-70
    • /
    • 2009
  • Recently, in the security token based authentication system, there is an increasing trend of using fingerprint for the token holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. In this paper, we propose an approach for secure fingerprint verification by distributing both the secret and the computation based on the fuzzy vault(a cryptographic construct which has been proposed for crypto-biometric systems). That is, a user fingerprint template which is applied to the fuzzy vault is divided into two parts, and each part is stored into a security token and a server, respectively. At distributing the fingerprint template, we consider both the security level and the verification accuracy. Then, the geometric hashing technique is applied to solve the fingerprint alignment problem, and this computation is also distributed over the combination of the security token and the server in the form of the challenge-response. Finally, the polynomial can be reconstructed from the accumulated real points from both the security token and the server. Based on the experimental results, we confirm that our proposed approach can perform the fuzzy vault-based fingerprint verification more securely on a combination of a security token and a server without significant degradation of the verification accuracy.

Cyber Threats Analysis of AI Voice Recognition-based Services with Automatic Speaker Verification (화자식별 기반의 AI 음성인식 서비스에 대한 사이버 위협 분석)

  • Hong, Chunho;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.33-40
    • /
    • 2021
  • Automatic Speech Recognition(ASR) is a technology that analyzes human speech sound into speech signals and then automatically converts them into character strings that can be understandable by human. Speech recognition technology has evolved from the basic level of recognizing a single word to the advanced level of recognizing sentences consisting of multiple words. In real-time voice conversation, the high recognition rate improves the convenience of natural information delivery and expands the scope of voice-based applications. On the other hand, with the active application of speech recognition technology, concerns about related cyber attacks and threats are also increasing. According to the existing studies, researches on the technology development itself, such as the design of the Automatic Speaker Verification(ASV) technique and improvement of accuracy, are being actively conducted. However, there are not many analysis studies of attacks and threats in depth and variety. In this study, we propose a cyber attack model that bypasses voice authentication by simply manipulating voice frequency and voice speed for AI voice recognition service equipped with automated identification technology and analyze cyber threats by conducting extensive experiments on the automated identification system of commercial smartphones. Through this, we intend to inform the seriousness of the related cyber threats and raise interests in research on effective countermeasures.

Proposal of Promotion Strategy of Mobile Easy Payment Service Using Topic Modeling and PEST-SWOT Analysis (모바일 간편 결제 서비스 활성화 전략 : 토픽 모델링과 PEST - SWOT 분석 방법론을 기반으로)

  • Park, Seongwoo;Kim, Sehyoung;Kang, Juyoung
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.4
    • /
    • pp.365-385
    • /
    • 2022
  • The easy payment service is a payment and remittance service that uses a simple authentication method. As online transactions have increased due to COVID-19, the use of an easy payment service is increasing. At the same time, electronic financial industries such as Naver Pay, Kakao Pay, and Toss are diversifying the competition structure of the easy payment market; meanwhile overseas fintech companies PayPal and Alibaba have a unique market share in their own countries, while competition is intensifying in the domestic easy payment market, as there is no unique market share. In this study, the participants in the easy payment market were classified as electronic financial companies, mobile phone manufacturers, and financial companies, and a SWOT analysis was conducted on the representative services in each industry. The analysis examined the user reviews of Google Play Store via a topic modeling analysis, and it employed positive topics as strengths and negative topics as weaknesses. In addition, topic modeling was conducted by dividing news articles into political, economic, social, and technology (PEST) articles to derive the opportunities and threats to easy payment services. Through this research, we intend to confirm the service capabilities of easy payment companies and propose a service activation strategy that allows gaining the upper hand in the market.

A Study on the Introduction of Library Services Based on Blockchain (블록체인 기반의 도서관 서비스 도입 및 활용방안에 관한 연구)

  • Ro, Ji-Yoon;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.371-401
    • /
    • 2022
  • If the blockchain means storing information in a distributed environment that cannot be forged or altered, it is mentioned that this is similar to what librarians collect, preserve, and share authoritative information. In this way, this study examined blockchain technology as a way to collect and provide reliable information, increase work efficiency inside and outside the library, and strengthen cooperative networks. This study attempted to propose various ways to utilize blockchain technology in book relations based on literature surveys and case studies in other fields. To this end, this study first analyzed the field and cases of blockchain application to confirm the possibility and value of blockchain application in the library field, and proposed 12 ways to utilize it based on this. The utilization model was proposed by dividing it into operation and service sectors. In the operation sector, it is a digital identity-based user record storage and authentication function, transparent management and traceable monitoring function, voting-based personnel and recruitment system, blockchain governance-based network efficiency function, and blockchain-based next-generation device management and information integration function. The service sector includes improved book purchase and sharing efficiency due to simplification of intermediaries, digital content copyright protection and management functions, customized service provision based on customer behavior analysis, blockchain-based online learning platforms, sharing platforms, and P2P-based reliable information sharing platforms.