• Title/Summary/Keyword: identity problem

Search Result 438, Processing Time 0.028 seconds

A Fuzzy Identity-Based Signcryption Scheme from Lattices

  • Lu, Xiuhua;Wen, Qiaoyan;Li, Wenmin;Wang, Licheng;Zhang, Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.4203-4225
    • /
    • 2014
  • Fuzzy identity-based cryptography introduces the threshold structure into identity-based cryptography, changes the receiver of a ciphertext from exact one to dynamic many, makes a cryptographic scheme more efficient and flexible. In this paper, we propose the first fuzzy identity-based signcryption scheme in lattice-based cryptography. Firstly, we give a fuzzy identity-based signcryption scheme that is indistinguishable against chosen plaintext attack under selective identity model. Then we apply Fujisaki-Okamoto method to obtain a fuzzy identity-based signcryption scheme that is indistinguishable against adaptive chosen ciphertext attack under selective identity model. Thirdly, we prove our scheme is existentially unforgeable against chosen message attack under selective identity model. As far as we know, our scheme is the first fuzzy identity-based signcryption scheme that is secure even in the quantum environment.

Problem behaviors, Cultural Identity and Acculturation of North Korean Refugee Youth (북한이탈 청소년의 문제행동과 문화변용정체성에 관한 연구)

  • Park, Youngsuk
    • Research in Community and Public Health Nursing
    • /
    • v.23 no.2
    • /
    • pp.144-154
    • /
    • 2012
  • Purpose: The purpose of this study was to investigate the characteristics of problem behaviors, cultural identity and acculturation of North Korean (NK) refugee youth and to suggest an appropriate approach for helping them to adjust to our society based on these findings. Methods: The subjects were 117 NK adolescent refugees in Hanawon. Data were collected by a demographic questionnaire, Youth Self Report (YSR), the South-North Korean cultural identity. Results: Problem behaviors of NK refugee youth were the highest in anxiety/depression and withdrawal behavior and were followed by internalized behavior, aggressiveness, overall problem behavior, externalized behavior, delinquency and positive behavior in that order. Acculturation was the highest in 'separation' followed by 'integration', 'assimilation' and 'marginalization' in that order. No significant relationship was found between acculturation types and problem behaviors except positive behavior. Conclusion: This study provides some important information that we have to develop specific strategies and interventions primarily focused on withdrawal, anxiety/depression, and internalization for the adjustment and mental health of NK refugee youth. It is necessary to explore further research related to cultural identity, acculturation processes, and the correlation between acculturation types and problem behaviors.

An efficient ID-based authentication scheme based on the rth -residuosity problem in wireless environment (무선통신 환경에서 사용 가능한 고차잉여류 문제에 기반을 둔 자체 인증방식)

  • 이보영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.73-82
    • /
    • 1999
  • In an open network computing environment a host cannot to identity its users correctly to network services. In order to prevent this thing we present the design of a authentication scheme 솟 using the notion of rth -residuosity problem and discrete logarithm problem which is proposed by S. J. Park et al. The proposed scheme described here is efficient method for mutual authentication without leakage of users identity in mobile communication system that ensure user anonymity and untraceability.

SELF ESTEEM AND SEXUAL LIBERALITY OF ADOLESCENT WITH GENDER IDENTITY PROBLEM OR HOMOSEXUAL TENDENCY (성주체성 문제 혹은 동성애적 성향을 보이는 청소년들의 자아 존중감과 성 개방성)

  • Lee Young Sik;Jeon Chang Moo;Kim So Youn;Ko Bock Ja
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.16 no.2
    • /
    • pp.231-238
    • /
    • 2005
  • Objectives : This study was done to figure out the incidence of Korean adolescents with gender identity problem and homosexual tendency. Self esteem and sexual liberality were also checked to evaluate the relation with these problems. Method : Subjects were 1,748 adolescents (359 middle school boys, 452 middle school girls, 483 high school boys, and 454 high school girls). DSM-IV-TR gender identity disorder criteria, Kinsey's sexual orientation scale, Hudson's short form sexual liberality scale, and Halter's Self-perception profile for children were applied to them. Result : 1) $15\%$ of the middle school boys, $16.7\%$ of the high school boys, $39.4\%$ of the middle school girls, and $40.5\%$ high school girls showed gender identity problem. Incidence of mild problem was more frequent in girls, however severe problem that suggested gender identity disorder was more frequent in boys, especially in high school boys. 2) Gender identity problem group showed lower self esteem than no problem group, especially in the middle school boys (p=0.033) and high school girls (p=0.020). 3) $17\%$ of the middle school boys, $5.4\%$ of the high school boys, $17.7\%$ of the middle school girls, and $12\%$ of the high school girls showed homosexual tendency. The order of more vivid homosexual orientation incidence was as follows ; $3.3\%$ in the middle school girls, $3.1\%$ in the middle school boys, $2.1\%$ in the high school girls, and $1.7\%$ in the high school boys. 4) There was no difference in the score of sexual liberality according to homosexual tendency. In high school girl, self esteem score was lower in homosexual tendency group than that of heterosexual group (p=0.039). 5) Gender identity problem group showed higher incidence of homosexual tendency than that of gender identity formation group (p=0.001). 6) The incidence of sexual identity problem was not changed by age, but homosexual tendency was decreased with age, especially in boys. Conclusion : Adolescents with gender identity problem or homosexual tendency showed low self esteem. Therefore, more attention on systemic evaluation for early detection in school based mental health and psychiatric management for them are needed.

  • PDF

An Identity Authentication Sharing Architecture for Global Internet Environment (글로벌 인터넷 환경을 위한 신원 인증 공유 구조)

  • Park, Seungchul
    • Journal of Information Technology Services
    • /
    • v.12 no.1
    • /
    • pp.259-270
    • /
    • 2013
  • Identity authentication sharing technologies which allow many service providers to share the result of identity authentication of an identity provider receive high attention as alternatives for current problematic identity authentications in the next-generation Internet environment, since they can provide crucial advantages including high usability, cost effectiveness of service providers, and privacy protection. However, in order for the identity authentication sharing technologies to be widely deployed in global Internet scale, the interoperability problem among different identity authentication sharing protocols and the trustworthiness issue among the participating identity providers, service providers, and users should be resolved in advance. This paper firstly analyzes current status of the protocol interoperability issue and existing trust frameworks for identity authentication sharing. And then, based on the result of analysis, this paper proposes a next generation identity authentication sharing architecture for global Internet.

Boundaries and Differences in the Narrative of Passing: James W. Johnson and Nella Larsen (패싱, 경계와 차이의 서사 -제임스 W. 존슨과 넬라 라선)

  • Kang, Hee
    • Journal of English Language & Literature
    • /
    • v.53 no.2
    • /
    • pp.307-333
    • /
    • 2007
  • When W. E. B. Du Bois says that "the problem of the twentieth century is the problem of the color line," such a statement clearly recognizes the significance of the issue of racial identity, a cultural phenomenon called 'passing.' Both Johnson in The Autobiography of an Ex-Colored Man and Larsen in Passing confront this issue. Both novels, using the metaphor of passing, not only trace the racial anxiety and race politics of the time but also expose the unstable landscape of the established social and cultural boundaries of racial identity. Mapping out multiple meanings and various dimensions of passing, this paper argues how Johnson's and Larsen's narratives display the ambivalence of color line while they at the same time complicate, problematize, and destabilize the mainstream racial boundaries and differences. It furthers to delineate how the two writers, with difference, deal with the problem of passing, the significance of racial identity, and black middle class values along with its intraracial differences. Rather than draw a clear definition of and a definitive closure on passing narrative, this paper focuses on its complexities and undecidability, challenging every dimension of its established significations. It also explores the complex dynamic between passing act and individual identity, for passing here is not just a racially signified term but extends its significance to the other factors of identity, such as class and even sexuality. Johnson and Larsen open up a site for a newly emergent, modern racial identity for black middle class in the twentieth century American urban spaces. Both writers, illuminating the subversive and slippery nature of language in their passing narrative, clearly herald new, different forms of Afro-American writings and themes for the different century they face.

A Identity Escrow mechanism supporting key recovery (키 복구를 지원하는 향상된 신원위탁 메커니즘)

  • 이용호;이임영;김주한;문기영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.119-128
    • /
    • 2002
  • In case certification between user and service provider is achieved, problem that user's identity is revealed is occurring by social issue, so it was presented identity escrow scheme to solve these problem. In identity escrow scheme, the issuer who have correct user's identity transmits securely anonymity authentication information to user, and user achieves authentication phase with service provider keeping oneself anonymity using this. In this paper, we present requirement for security and trusty of identity escrow scheme and propose new mechanism that can security this. Also, propose method that service provider can deliver securely contents to user and propose mechanism that improve that support ky recovery at encryption communication that using secret key that it was generated by key agreement between users.

On Identity Between Truth Bearer and Fact (진리담지자와 사실 사이의 동일성에 대하여)

  • Kim, Donghyun
    • Korean Journal of Logic
    • /
    • v.21 no.2
    • /
    • pp.207-231
    • /
    • 2018
  • The identity theory of truth insists that a truth bearer is identical with a fact. First, I will consider how we can make the thesis intelligible. For this, I classify the identity relation which the identity theory discusses into two kind; trivial and non-trivial relation. And I show that the trivial one is not adequate to be qualified to be applied to the identity theory. The non-trivial relation can be adopted in robust or modest way. I argue that the robust kind of identity theory is incoherent itself. Then, I explain why we should compare the modest identity theory with the deflationism. From this comparing, I will draw the consequence that two choices are left to the modest theory. If they choose one way, there is no reason for us to prefer the identity theory to deflationism. On the other hand, in case that they choose the other way, I argue what kinds of interesting problem is left to be solved by the modest theorists. Finally, I will evaluate the limit and prospect of the result of the problem in case that the identity theorists achieve their goal.

A Study on the Necessity of Visual Identity in Apartments Remodeling (집합주거 리모델링에 있어 시각적 아이덴티티의 필요성에 관한 연구)

  • 서우석;윤재은
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2003.05a
    • /
    • pp.174-177
    • /
    • 2003
  • The progress of urbanization has been accelerated by the development of machinery after the Industrial Revolution and the speed of change has been increased after the invention of computers. However, the problem of residence, the space for human life in the city, is still not complete. Ever since apartments rose as a solution for the residential problem caused by urbanization after the 1970s and now after 30 years, remodelling is preferred among the 2 choices, reconstruction and remodelling of apartments, in respect of economy and efficiency. Especially, in remodelling collective residence, construction, equipment environment, sight, etc. are considered and only after testing these various aspects can remodelling succeed. Aiming at studying the need of visual identity among many considerations in remodelling, this study investigates and analyzes the remodelling cases of domestic and overseas common residence and suggests the need of visual identity. In Korea where construction design for common residence is monotonous, expressing visual identity can be even more important. The common residence area that symbolizes its unique characteristic will elevate not only its economic value but also the psychological value of its residents.

  • PDF

Transnational Identity and Regional Integration

  • Lamasheva, Yulia
    • Asia-Pacific Journal of Business
    • /
    • v.1 no.1
    • /
    • pp.73-95
    • /
    • 2010
  • European integration is characterized by the development of a transnational European identity, which is considered an integral part of the process. Northeast Asia has no similar projects to address the common identity issue, although cooperation is highly valued there as well. Identity and cooperation both require interdisciplinary approaches combining social psychology, international relations theory and international economics. This article considers the problems of applying existing studies on cooperation and identity as well as the European experience (with the Baltic Sea example) to the case of Northeast Asia. Transnational identities promote cooperation beyond the limits of rationalistic game theory, if countries of the region can define their identities and interests, commit to common goals, create shared discourses and reach a balance between nationalism and internationalism. In view of proposed negotiations on the free trade area between China, Korea and Japan and ongoing discussions about a possibility of introducing a common currency (ACU) it can be crucial to consider the importance of identity building as early as possible, before regional integration meets a stumbling block of egoistic rationality that is a problem in any model of cooperation.

  • PDF