• 제목/요약/키워드: computational primitive

검색결과 57건 처리시간 0.025초

Identity-Based Ring Signature Schemes for Multiple Domains

  • Ki, JuHee;Hwang, Jung Yeon;Lee, Dong Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권10호
    • /
    • pp.2692-2707
    • /
    • 2012
  • A separable identity-based ring signature scheme has been constructed as a fundamental cryptographic primitive for protecting user privacy. Using the separability property, ring members can be selected from arbitrary domains, thereby, giving a signer a wide range of ways to control privacy. In this paper we propose a generic method to construct efficient identity-based ring signature schemes with various levels of separability. We first describe a method to efficiently construct an identity-based ring signature scheme for a single domain, in which a signer can select ring identities by choosing from identities defined only for the domain. Next, we present a generic method for linking ring signatures constructed for a single domain. Using this method, an identity-based ring signature scheme with a compact structure, supporting multiple arbitrary domains can be designed. We show that our method outperforms the best known schemes in terms of signature size and computational costs, and that the security model based on the separability of identity-based ring signatures, presented in this paper, is highly refined and effective by demonstrating the security of all of the proposed schemes, using a model with random oracles.

Real Time Related Key Attack on Hummingbird-2

  • Zhang, Kai;Ding, Lin;Li, Junzhi;Guan, Jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권8호
    • /
    • pp.1946-1963
    • /
    • 2012
  • Hummingbird is a lightweight encryption and message authentication primitive published in RISC'09 and WLC'10. In FSE'11, Markku-Juhani O.Saarinen presented a differential divide-and-conquer method which has complexity upper bounded by $2^{64}$ operations and requires processing of few megabytes of chosen messages under two related nonces (IVs). The improved version, Hummingbird-2, was presented in RFIDSec 2011. Based on the idea of differential collision, this paper discovers some weaknesses of the round function WD16. Combining with the simple key loading algorithm, a related-key chosen-IV attack which can recover the full secret key is proposed. Under 15 pairs of related keys, the 128 bit initial key can be recovered, requiring $2^{27}$ chosen IV and the computational complexity is $O(2^{27})$. In average, the attack needs several minutes to recover the full 128-bit secret key on a PC. The experimental result corroborates our attack. The result shows that the Hummingbird-2 cipher can't resist related key attack.

객체지향 데이타베이스를 이용한 주식데이타 관리에 관한 연구 (A Study on the Management of Stock Data with an Object Oriented Database Management System)

  • 허순영;김형민
    • 한국경영과학회지
    • /
    • 제21권3호
    • /
    • pp.197-214
    • /
    • 1996
  • Financial analysis of stock data usually involves extensive computation of large amount of time series data sets. To handle the large size of the data sets and complexity of the analyses, database management systems have been increasingly adaopted for efficient management of stock data. Specially, relational database management system is employed more widely due to its simplistic data management approach. However, the normalized two-dimensional tables and the structured query language of the relational system turn out to be less effective than expected in accommodating time series stock data as well as the various computational operations. This paper explores a new data management approach to stock data management on the basis of an object-oriented database management system (ODBMS), and proposes a data model supporting times series data storage and incorporating a set of financial analysis functions. In terms of functional stock data analysis, it specially focuses on a primitive set of operations such as variance of stock data. In accomplishing this, we first point out the problems of a relational approach to the management of stock data and show the strength of the ODBMS. We secondly propose an object model delineating the structural relationships among objects used in the stock data management and behavioral operations involved in the financial analysis. A prototype system is developed using a commercial ODBMS.

  • PDF

인간형 로봇 손 시스템과 실시간 파지 동작 제어에 관한 연구 (A Study on Humanoid Robot Hand System and Real-Time Grasp Motion Control)

  • 임미섭;오상록;손재범;이병주;유범재;홍예선
    • 제어로봇시스템학회논문지
    • /
    • 제6권5호
    • /
    • pp.404-414
    • /
    • 2000
  • This paper addresses the development of a 3-fingered humanoid robot hand system and a real-time grasp synthesis of multifingered robot hands to find grasp configurations which satisfy the force closure condition of arbitrary shaped objects. We propose a fast and efficient grasp synthesis algorithm for planar polygonal objects, which yields the contact locations on a given polygonal object to obtain a force closure grasp by the multifingered robot hand. For an optimum grasp and real-time computation, we develop the preference and the hibernation process and assign physical constraints of the humanoid hand to the motion of each finger. The preferences consist of each sublayer reflecting the primitive preference similar to the conditional behaviors of humans for given objectives and their arrangements are adjusted by the heuristics inspired from human's grasping behaviors. The proposed method reduces the computational time significantly at the sacrifice of global optimality, and enables the grasp posture to be changable within two-finger and three-finger grasps. The performance of the presented algorithm is evaluated via simulation studies to obtain the force-closure grasps of polygonal objects with fingertip grasps. The architecture suggested is verified through experimental implementation to our robot hand system by solving the 2- or 3-finger grasp synthesis.

  • PDF

Development of Simple Articulated Human Models using Superquadrics for Dynamic Analysis

  • Lee, Hyun-Min;Kim, Jay-Jung;Chae, Je-Wook
    • 대한인간공학회지
    • /
    • 제30권6호
    • /
    • pp.715-725
    • /
    • 2011
  • Objective: This study is aimed at developing Articulated Human Models(AHM) using superquadrics to improve the geometric accuracy of the body shape. Background: The previous work presents the AHM with geometrical simplification such as ellipsoids to improve analysis efficiency. However, because of the simplicity, their physical properties such as a center of mass and moment of inertia are computed with errors compared to their actual values. Method: This paper introduces a three steps method to present the AHM with superquadrics. First, a 3D whole body scan data are divided into 17 body segments according to body joints. Second, superquadric fitting is employed to minimize the Euclidean distance between body segments and superquadrics. Finally, Fee-Form Deformation is used to improve accuracy over superquadric fitting. Results: Our computational experiment shows that the superquadric models give better accuracy of dynamic analysis than that of ellipsoid ones. Conclusion: We generate the AHM composed of 17 superquadrics and 16 joints using superquadric fitting. Application: The AHM using superquadrics can be used as the base model for dynamics and ergonomics applications with better accuracy because it presents the human motion effectively.

$GF(2^m)$ 상에서의 효율적인 지수제곱 연산을 위한 VLSI Architecture 설계 (Design of VLSI Architecture for Efficient Exponentiation on $GF(2^m)$)

  • 한영모
    • 전자공학회논문지SC
    • /
    • 제41권6호
    • /
    • pp.27-35
    • /
    • 2004
  • 유한 필드, 즉 Galois 필드는 에러 정정 코드, 디지털 신호처리, 암호법(cryptography)와 같은 광범위한 응용 분야에 사용되고 있다. 이 응용들은 종종 GF(2/sup m/)에서 지수제곱 연산을 필요로 한다. 기존에 제안되었던 방법들은 지수제곱 연산을 반복, 순환적인 곱셈으로 구현하여 계산시간이 많이 걸리거나, 또는 구현 시 하드웨어 구조가 복잡하여 하드웨어 비용이 큰 경우가 많았다. 본 논문에서는 지수제곱 연산을 하는 효과적인 방법을 제안하고 이를 VHDL로 구현하였다. 이 회로는 지수의 각 비트에 해당하는 곱셈 항들을 계산하고 이 들을 곱함으로써 지수제곱 연산을 계산한다. 과거에는 이 알고리즘이 원시 다항식의 근의 지수제곱 연산을 계산하는 데 사용되는 것으로 국한되어 있었으나, 본 논문에서는 이 알고리즘을 GF(2/sup m/)의 임의의 원소의 지수제곱 연산으로 확장하였다.

-건설현장에서의 시공 자동화를 위한 Laser Sensor기반의 Workspace Modeling 방법에 관한 연구- (Human Assisted Fitting and Matching Primitive Objects to Sparse Point Clouds for Rapid Workspace Modeling in Construction Automation)

  • 권순욱
    • 한국건설관리학회논문집
    • /
    • 제5권5호
    • /
    • pp.151-162
    • /
    • 2004
  • Current methods for construction site modeling employ large, expensive laser range scanners that produce dense range point clouds of a scene from different perspectives. Days of skilled interpretation and of automatic segmentation may be required to convert the clouds to a finished CAD model. The dynamic nature of the construction environment requires that a real-time local area modeling system be capable of handling a rapidly changing and uncertain work environment. However, in practice, large, simple, and reasonably accurate embodying volumes are adequate feedback to an operator who, for instance, is attempting to place materials in the midst of obstacles with an occluded view. For real-time obstacle avoidance and automated equipment control functions, such volumes also facilitate computational tractability. In this research, a human operator's ability to quickly evaluate and associate objects in a scene is exploited. The operator directs a laser range finder mounted on a pan and tilt unit to collect range points on objects throughout the workspace. These groups of points form sparse range point clouds. These sparse clouds are then used to create geometric primitives for visualization and modeling purposes. Experimental results indicate that these models can be created rapidly and with sufficient accuracy for automated obstacle avoidance and equipment control functions.

Gap Diffie-Hellman 군에 기반한 전방향 안전성을 갖는 서명 기법 (A New Forward-Secure Signature Scheme based on GDH groups)

  • 강보경;박제홍;한상근
    • 정보보호학회논문지
    • /
    • 제13권5호
    • /
    • pp.147-157
    • /
    • 2003
  • 보통의 공개 열쇠 암호 시스템에서 비밀 열쇠가 노출되면 그 비밀 열쇠로 생성된 암호문이나 서명 등의 해독, 위조가 가능하다. 이런 비밀 열쇠 노출의 위험성은 상대적으로 물리적인 보안이 이루어지지 않은 핸드폰, 스마트카드 등과 같은 열쇠 저장 장치에 가장 큰 위협이 되고 있다. 따라서 현재 비밀 정보가 노출되어도 과거의 비밀 열쇠에 의해 생성된 정보는 안전하게 유지되어야 한다는 전방향 안전성 개념(forward security)은 열쇠교환 프로토콜 및 여러 암호 요소(primitive)들이 필수적으로 만족해야 할 조건이다. 본 논문에서는 Cap Diffie-Hellman 군을 사용하여 전방향 안전성을 만족하는 서명 기법을 제안한다. 제안된 서명 기법은 계산적 Diffie-Hellman 문제의 어려움을 기반으로 선택 메시지 공격 모델에 대한 증명가능한 안전성을 가진다.

Signcryption을 이용한 안전한 인증된 키 교환 프로토콜 연구 (Secure Authenticated key Exchange Protocol using Signcryption Scheme)

  • 김락현;염흥열
    • 정보보호학회논문지
    • /
    • 제16권4호
    • /
    • pp.139-146
    • /
    • 2006
  • 1997년 Yuliang Zheng에 의해 제안된 Signcryption은 서명과 암호 기법을 결합한 하이브리드 공개키 프리미티브로서 서명 기법 후 암호 기법을 각각 적용한 기법보다 계산 및 통신비용 측면에서 높은 효율성을 갖는 기법이다. 또한 PAK(Pass-word-Authenticated Key Exchange) 프로토콜은 사용자가 암기하거나 휴대하기 쉬운 짧은 길이의 패스워드를 기반으로 통신주체를 상호 인증하고, 결과적으로 안전한 통신을 위하여 충분히 큰 길이의 세션키를 분배하는 프로토콜이다. 본 논문에서는 PAK와 Signcryption의 특징을 이용하여 참여자의 비밀 정보를 이용한 상호 인증 및 안전한 통신을 위한 키 분배 프로토콜을 제안한다. 그리고 제안 프로토콜의 보안성을 증명하고 효율성을 비교한다.

GNSS NLOS Signal Classifier with Successive Correlation Outputs using CNN

  • Sangjae, Cho;Jeong-Hoon, Kim
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제12권1호
    • /
    • pp.1-9
    • /
    • 2023
  • The problem of classifying a non-line-of-sight (NLOS) signal in a multipath channel is important to improve global navigation satellite system (GNSS) positioning accuracy in urban areas. Conventional deep learning-based NLOS signal classifiers use GNSS satellite measurements such as the carrier-to-noise-density ratio (CN_0), pseudorange, and elevation angle as inputs. However, there is a computational inefficiency with use of these measurements and the NLOS signal features expressed by the measurements are limited. In this paper, we propose a Convolutional Neural Network (CNN)-based NLOS signal classifier that receives successive Auto-correlation function (ACF) outputs according to a time-series, which is the most primitive output of GNSS signal processing. We compared the proposed classifier to other DL-based NLOS signal classifiers such as a multi-layer perceptron (MLP) and Gated Recurrent Unit (GRU) to show the superiority of the proposed classifier. The results show the proposed classifier does not require the navigation data extraction stage to classify the NLOS signals, and it has been verified that it has the best detection performance among all compared classifiers, with an accuracy of up to 97%.