• Title/Summary/Keyword: deniable

Search Result 9, Processing Time 0.021 seconds

A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption

  • Barakat, Tamer Mohamed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3231-3249
    • /
    • 2014
  • Deniable encryption, introduced in 1997 by Canetti, Dwork, Naor, and Ostrovsky, guarantees that the sender or the receiver of a secret message is able to "fake" the message encrypted in a specific ciphertext in the presence of a coercing adversary, without the adversary detecting that he was not given the real message. Sender - side deniable encryption scheme is considered to be one of the classification of deniable encryption technique which defined as resilient against coercing the sender. M. H. Ibrahim presented a sender - side deniable encryption scheme which based on public key and uncertainty of Jacobi Symbol [6]. This scheme has several problems; (1) it can't be able to derive the fake message $M_f$ that belongs to a valid message set, (2) it is not secure against Quadratic Residue Problem (QRP), and (3) the decryption process is very slow because it is based dramatically on square root computation until reach the message as a Quadratic Non Residue (QNR). The first problem is solved by J. Howlader and S. Basu's scheme [7]; they presented a sender side encryption scheme that allows the sender to present a fake message $M_f$ from a valid message set, but it still suffers from the last two mentioned problems. In this paper we present a new sender-side deniable public-key encryption scheme with fast decryption by which the sender is able to lie about the encrypted message to a coercer and hence escape coercion. While the receiver is able to decrypt for the true message, the sender has the ability to open a fake message of his choice to the coercer which, when verified, gives the same ciphertext as the true message. Compared with both Ibrahim's scheme and J. Howlader and S. Basu's scheme, our scheme enjoys nice two features which solved the mentioned problems: (1) It is semantically secure against Quadratic Residue Problem; (2) It is as fast, in the decryption process, as other schemes. Finally, applying the proposed deniable encryption, we originally give a coercion resistant internet voting model without physical assumptions.

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

  • Wu, Weifeng;Li, Fagen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1904-1919
    • /
    • 2015
  • Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.

Identity-based Deniable Authenticated Encryption for E-voting Systems

  • Jin, Chunhua;Chen, Guanhua;Zhao, Jianyang;Gao, Shangbing;Yu, Changhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3299-3315
    • /
    • 2019
  • Deniable authentication (DA) is a protocol in which a receiver can generate an authenticator that is probabilistically indistinguishable from a sender. DA can be applied in many scenarios that require user privacy protection. To enhance the security of DA, in this paper, we construct a new deniable authenticated encryption (DAE) scheme that realizes deniable authentication and confidentiality in a logical single step. Compared with existing approaches, our approach provides proof of security and is efficient in terms of performance analysis. Our scheme is in an identity-based environment; thus, it avoids the public key certificate-based public key infrastructure (PKI). Moreover, we provide an example that shows that our protocol is applicable for e-voting systems.

A Self-Authentication and Deniable Efficient Group Key Agreement Protocol for VANET

  • Han, Mu;Hua, Lei;Ma, Shidian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3678-3698
    • /
    • 2017
  • With the rapid development of vehicular ad hoc Network (VANET), it has gained significant popularity and received increasing attentions from both academics and industry communities in aspects of security and efficiency. To address the security and efficiency issues, a self-authentication and deniable efficient group key agreement protocol is proposed in this paper. The scheme establishes a group between road side units (RSUs) and vehicles by using self-authentication without certification authority, and improves certification efficiency by using group key (GK) transmission method. At the same time, to avoid the attacker attacking the legal vehicle by RSUs, we adopt deniable group key agreement method to negotiation session key (sk) and use it to transmit GK between RSUs. In addition, vehicles not only broadcast messages to other vehicles, but also communicate with other members in the same group. Therefore, group communication is necessary in VANET. Finally, the performance analysis shows superiority of our scheme in security problems, meanwhile the verification delay, transmission overheard and message delay get significant improvement than other related schemes.

Generic Constructions for Strong Designated Verifier Signature

  • Feng, Deng-Guo;Xu, Jing;Chen, Wei-Dong
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.159-172
    • /
    • 2011
  • A designated verifier signature is a special type of digital signature, which convinces a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party. A strong designated verifier signature scheme enhances the privacy of the signer such that no one but the designated verifier can verify the signer's signatures. In this paper we present two generic frame works for constructing strong designated verifier signature schemes from any secure ring signature scheme and any deniable one-pass authenticated key exchange protocol, respectively. Compared with similar protocols, the instantiations of our construction achieve improved efficiency.

State of The Art in Semiconductor Package for Mobile Devices

  • Kim, Jin Young;Lee, Seung Jae
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.2
    • /
    • pp.23-34
    • /
    • 2013
  • Over the past several decades in the microelectronics industry, devices have gotten smaller, thinner, and lighter, without any accompanying degradation in quality, performance, and reliability. One permanent and deniable trend in packaging as well as wafer fabrication industry is system integration. The proliferating options for system integration, recently, are driving change across the overall semiconductor industry, requiring more investment in developing, ramping and supporting new die-, wafer- and board-level solution. The trend toward 3D system integration and miniaturization in a small form factor has accelerated even more with the introduction of smartphones and tablets. In this paper, the key issues and state of the art for system integration in the packaging process are introduced, especially, focusing on ease transition to next generation packaging technologies like through silicon via (TSV), 3D wafer-level fan-out (WLFO), and chip-on-chip interconnection. In addition, effective solutions like fine pitch copper pillar and MEMS packaing of both advanced and legacy products are described with several examples.

Deniable Authentication with Verifiable Evidence based on Ring Signature (환 서명에 기반한 부인가능 인증 프로토콜)

  • Shin, Ki-Eun;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1397-1399
    • /
    • 2009
  • 부인가능 인증은 수신자가 전송된 메시지에 대한 출처를 확인할 수 있지만, 제 3 자에게는 전송된 메시지의 출처를 증명할 수 없는 인증 메커니즘이다. 이러한 부인가능 인증을 통하여 프라이버시 노출 가능한 전자투표와 전자상거래에서 메시지 전송에 대한 익명성을 보장할 수 있다. 본 논문에서는 그룹 멤버의 익명성을 보장하기 위한 환 서명을 이용하여 부인 가능한 서명을 제안함으로써 서명자의 프라이버시를 보호한다. 또한 추후에 서명에 대한 출처 확인이 필요할 경우, 서명자가 서명 생성을 위한 지식을 증명함으로써 서명에 대한 출처를 제 3 자에게 증명할 수 있다.

Design of Lateral Fuzzy-PI Controller for Unmanned Quadrotor Robot (무인 쿼드로터 로봇 횡 방향 제어를 위한 Fuzzy-PI 제어기 설계)

  • Baek, Seung-Jun;Lee, Deok-Jin;Park, Jong-Ho;Chong, Kil-To
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.2
    • /
    • pp.164-170
    • /
    • 2013
  • Quadrotor UAV (Unmanned Aerial Vehicle) is a flying robotic platform which has drawn lots of attention in the recent years. The attraction comes from the fact that it is able to perform agile VTOL (Vertical Take-Off Landing) and hovering functions. In addition, the efficient modular structure composed of four electric rotors makes its design easier compared to other single-rotor type helicopters. In many cases, a quadrotor often utilizes vision systems in order to obtain altitude control and navigation solution in hostile environments where GPS receivers are not working or deniable. For carrying out their successful missions, it is essential for flight control systems to have fast and stable control responses of heading angle outputs. This paper presents a Fuzzy Logic based lateral PI controller to stabilize and control the quadrotor vehicle equipped with vision systems. The advantage of using the fuzzy based PI controller lies in the fact that it could acquire a desired output response of a heading angle even in presence of disturbances and uncertainties. The performance comparison of the newly proposed Fuzzy-PI controller and the conventional PI controller was carried out with various simulation results.

현대여성(現代女性)의 의복의식(衣服意識)에 관한 조사(調査) 연구(硏究) - 서울 지역(地域)의 양복(洋服) 착용자(着用者)를 중심(中心)으로 -

  • Lee, Hee-Myung
    • Journal of the Korean Society of Costume
    • /
    • v.2
    • /
    • pp.73-88
    • /
    • 1978
  • This article is an attempt to explain, at least in part, the contemporary Korean women's consciousness of Western Dreasses. As time changes, the role of clothing undergoes varisous transitions, while values and ways of life are constantly in change. It is, therefore, proper and appropriate to recognize as among the major aspects of social psychology such phenomenon as interests, understanding of clothing, the choice of a dress, and attitudes toward clothing, etc. The purpose of this study is to discover problems concerning and their clothing and their solutions, by means of a surveying approach. The method of research used is based upon questionares distributed to parents of first-year pupils in elementary schools and to female clerks working in offices, covering the period from August through October, 1976. The number of the questionares distrubuted totalled 600, and 526 were returned to the research to be utilized for analysis. The contents of the survey included such things as values concerning clothing, kinds of clothing and their practical use, the selection of clothing and the method of purchase, fashions, etc. The classification of aquisition are self-made clothing, clothing made to order and ready-made materials. It is composed of 25 items, including affirmative reasons as well as negative ones. The processing of the material returned was made by using the computer, and based upon classifications such as ages, monthly income, occupations; thus diagraming the result in percentages. The conclusion made and the improvements proposed are as follows: 1. The values of clothing were placed on the expression of the wearer's personality (32.7) and on eauty(28. 6%). The lower age group places is stress upon the expression of personality, while the higher age group stresses beauty. About 50% of wearers are contented with their clothing, their clothing, the rest of whom them indicating their dissatisfaction with what they wear. As to designs at the time of selection, about 46% indicated their preference of personal expression, 31.8% on usefulness. In selecting material, practicality is emphasized; in selecting patterns, single color is preferred. In short, personal expression and esthetic values are primary, with consideration of practicality in mind. 2. The classification of clothing according to their uses indicates the highest numbers in normal wear (home wears) and clothings to be worn outside home. As to evening dresses, (party dress) only one or two articles were checked by many, and no such article was clamed to be possessed by most. The highest ratio of wearing was shown in the case of home wear (47.3%) and clothing to be worn outside the home, which is 55.8%. The budget for one article of clothing was greatest in the case of home wear, and clothing worn outside the home. Many used both kinds of articles for the same purpose. It is desirable, therefore, that the kinds of clothing should be varied according to the purpose for which they are worn, and that clothing appropriate for that purpose should be worn. 3. The motivation for purchasing clothing was highly chosen in the item of seasonal change, which was 55.7%; Clothing deliberately made was indicated by 45.2%. In the mothods of purchasing clothing, clothing made to order and ready-made was indicated by 44.4%, which is the highest; Clothing made to order was 25.4%, and self-sewing was 1.1%, which is the lowest. (1) In the case of self-sewing, "I like it but it is very hard," was checked by 43.6%; "It is so difficult that I cannot wear such clothing" was checked by 13.3%. From these, we can conclude that the questionees are willing to make clothing by themselves, but techniques involved in sewing and at her problems involved in the skill are complicated but when those problems are eliminated there is a possibility for practice. The response checked by questionees concerning the self-sewing was, "It's economical", which is a clear indication that many questionees are positive for self-sewing. It is generally believed that ready-made clothing is cheaper, but it is not necessarily so. In consideration of the quality of clothing, self-sewing is a necessity, and it is desirable that it should be encouraged. (3) Problems involved in ready-made clothing, such as designs, skills, size (fitting) should be eliminated. When these problems are scientifically gotten rid of, it is possible that affirmative returns will be expected. Affirmative responses such as "Ready-made clothing is economical," "You can select there on the spot," are good signs that many women expect to wear ready-made clothing. It is in this sense that the prospect for ready-made clothing is brighter when much development for ready-made clothing is on the way. 4. Much concern for fashion are checked in such item of questions as "Fashionable clothing in the show window," "Clothes worn by women." The first item was checked by 50.1 %, and the second was checked by 48.6%. The reason for following fashion is "Because many people wear them," which was indicated by 30.4%. The reason for not following fashion is "It is too expensive," which was checked by 29.6%. The 26.2% of the answers indicated that "Fashionable clothing is devoid of personality," The influences of fashion over the development of fashion over the development of clothing are two-fold: Esthetic and active. It is not to be deniable that people follow fashion more or less. 1978.9>

  • PDF