• Title/Summary/Keyword: key manager

Search Result 178, Processing Time 0.021 seconds

A Novel Authenticated Group Key Distribution Scheme

  • Shi, Run-hua;Zhong, Hong;Zhang, Shun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.935-949
    • /
    • 2016
  • In this paper, we present a novel authenticated group key distribution scheme for large and dynamic multicast groups without employing traditional symmetric and asymmetric cryptographic operations. The security of our scheme is mainly based on the basic theories for solving linear equations. In our scheme, a large group is divided into many subgroups, where each subgroup is managed by a subgroup key manager (SGKM) and a group key generation center (GKGC) further manages all SGKMs. The group key is generated by the GKGC and then propagated to all group members through the SGKMs, such that only authorized group members can recover the group key but unauthorized users cannot. In addition, all authorized group members can verify the authenticity of group keys by a public one-way function. The analysis results show that our scheme is secure and efficient, and especially it is very appropriate for secure multicast communications in large and dynamic client-server networks.

A New Efficient Private Key Reissuing Model for Identity-based Encryption Schemes Including Dynamic Information (동적 ID 정보가 포함된 신원기반 암호시스템에서 효율적인 키 재발급 모델)

  • Kim, Dong-Hyun;Kim, Sang-Jin;Koo, Bon-Seok;Ryu, Kwon-Ho;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.23-36
    • /
    • 2005
  • The main obstacle hindering the wide deployment of identity-based cryptosystem is that the entity responsible for creating the private key has too much power. As a result, private keys are no longer private. One obvious solution to this problem is to apply the threshold technique. However, this increases the authentication computation, and communication cost during the key issuing phase. In this paper, we propose a new effi ient model for issuing multiple private keys in identity-based encryption schemes based on the Weil pairing that also alleviates the key escrow problem. In our system, the private key of a user is divided into two components, KGK (Key Description Key) and KUD(Key Usage Desscriptor), which are issued separately by different parties. The KGK is issued in a threshold manner by KIC (Key Issuing Center), whereas the KW is issued by a single authority called KUM (Key Usage Manager). Changing KW results in a different private key. As a result, a user can efficiently obtain a new private key by interacting with KUM. We can also adapt Gentry's time-slot based private key revocation approach to our scheme more efficiently than others. We also show the security of the system and its efficiency by analyzing the existing systems.

Fuzzy-Based Object Manager for Multimedia Post-Office Box Construction (멀티미디어 사서함 구축을 위한 퍼지 기반의 객체 관리기)

  • Lee, Jong-Deuk;Jeong, Taek-Won
    • The KIPS Transactions:PartB
    • /
    • v.8B no.5
    • /
    • pp.501-506
    • /
    • 2001
  • According to the current increase of the usefulness of information by Internet and Communication network, several methods are proposed in which multimedia information may be efficiently managed and serviced. This paper proposes FBOM(Fuzzy-Based Object Manager) using $\alpha$-cut in Object manager for Fuzzy-Based Multimedia Post-Office Box construction. The proposed system utilizes object discrimination, fuzzy filtering, and class generation structure in order to manage object using Fuzzy filtering. To know how well the proposed system are able to work, this paper have tested against the methods with 1000 items of multimedia information, and our system are compared with Random-key method and FBOM method.

  • PDF

Design and Implementation of a Mapping Manager for a Logical Volume Manager (논리볼륨 관리자를 위한 매핑 관리자의 설계 및 구현)

  • 최영희;유재수;오재철
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2002.11a
    • /
    • pp.350-362
    • /
    • 2002
  • A new architecture called the Storage Area Network(SAN) was developed in response to the requirements of high availability of data, scalable growth and system performance In order to use SAN more efficiently, must SAN operating systems support storage virtualization concepts that allow users to view physical storage devices attached to SAN as a large volume virtually. A logical volume manager Days a key role in storage virtualization it realizes the storage virtualization by mapping logical addresses to physical addresses. In this paper, we design and implement an efficient and flexible mapping method for logical volume manager. The mapping method in this paper supports a snapshot that preserves a volume image at certain time and on-line reorganization to allow users to add or remove storage devices to SAN even while the system is running.

  • PDF

Design and Implementation of a Mapping Manager for a Logical Volume Manager (논리볼륨 관리자를 위한 매핑 관리자의 설계 및 구현)

  • 최영희;유재수;오재철
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.11a
    • /
    • pp.350-362
    • /
    • 2002
  • A new architecture called the Storage Area Network(SAN) was developed in response to the requirements of high availability of data scalable growth, and system performance. In order to use SAN more efficiently, most SAN operating systems support storage virtualization concepts that allow users to view physical storage devices attached to SAN as a large volume virtually. A logical volume manager plays a key role in storage virtualization. It realizes the storage virtualization by mapping logical addresses to physical addresses. In this paper, we design and implement an efficient and flexible mapping method for logical volume manager. The nin method in this paper supports a snapshot that preserves a volume image at certain time and on-line reorganization to allow users to add or remove storage devices to SAN even while the system is running.

  • PDF

The Effect of Management Forecast Precision on CEO Compensation-Accounting Performance (경영자 이익예측 정확성이 성과-보상에 미치는 영향)

  • Lee, Eun-Ju;Sim, Won-Mi;Kim, Jeong-Kyo
    • Journal of Digital Convergence
    • /
    • v.16 no.10
    • /
    • pp.125-132
    • /
    • 2018
  • The purpose of this study is to analyze the effect of managerial predictive accuracy on managerial performance-compensation. In this study, we compared managerial performance with managerial performance, And to analyze the relationship between manager compensation and manager compensation using managerial profit prediction accuracy. As a result of this study, there is a significant positive relationship between profit prediction accuracy and manager compensation, which can be interpreted as a result of manager's ability to compensate manager's ability to predict the future well. In this paper, we propose a new methodology that can be used to analyze the effects of managerial compensation on managerial compensation. This is because there is a difference in that it is proved to be a factor. Therefore, it is important to note that the prediction of the future of the company also identifies the additional determinants that affect manager compensation contracts with the key managerial capabilities.

Effects of revolutional leadership of manager at private security service organization members learning directivity and organizational innovation behavior (민간경비 경영자의 변혁적리더십이 구성원의 학습지향성 및 조직혁신 행동에 미치는 영향)

  • Kang, Minwan
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.264-273
    • /
    • 2014
  • The purpose of the study is to demonstrate the effects of revolutional leadership of manager at private security organization on members' learning directivity and organizational innovation behavior. The results attained from studying method and procedure as mentioned above are in the following. First, the revolutional leadership of manager at private security service organization influence learning directivity. That is, the more he or she shows revolutional leadership, the more enhanced the learning directivity of members. Second, the revolutional leadership of manager at private security service organization has effects on organizational innovation behavior. Thatis, the more he or she shows revolutional leadership the more enhanced organizational innovation behavior. Third, learning directivity of manager at private securitys service organization influences organizational innovation behavior. Thatis, the more he or she shows learning directivity, the more enhanced organizational innovation behavior. Taken all, revolutional leadership of manager at private security service organization affects organizational innovation behavior through learning directivity. It is shown that learning directivity is a key variable connecting revoultional leadership with organization al innovation behavior.

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud

  • Hong, Hanshu;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2394-2406
    • /
    • 2016
  • ABE has become an effective tool for data protection in cloud computing. However, since users possessing the same attributes share the same private keys, there exist some malicious users exposing their private keys deliberately for illegal data sharing without being detected, which will threaten the security of the cloud system. Such issues remain in many current ABE schemes since the private keys are rarely associated with any user specific identifiers. In order to achieve user accountability as well as provide key exposure protection, in this paper, we propose a key-insulated ciphertext policy attribute based encryption with key exposure accountability (KI-CPABE-KEA). In our scheme, data receiver can decrypt the ciphertext if the attributes he owns match with the self-centric policy which is set by the data owner. Besides, a unique identifier is embedded into each user's private key. If a malicious user exposes his private key for illegal data sharing, his identity can be exactly pinpointed by system manager. The key-insulation mechanism guarantees forward and backward security when key exposure happens as well as provides efficient key updating for users in the cloud system. The higher efficiency with proved security make our KI-CPABE-KEA more appropriate for secure data sharing in cloud computing.

A Group Key Management Architecture in Mobile Network Environments (이동네트워크 환경에서의 그룹키 관리구조)

  • 박영호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.89-100
    • /
    • 2002
  • In this paper, we propose a group key management architecture for the secure group communications in mobile netwowrks and authenticated key agreement protocol for this system. Most of existing group key management schemes un certificates based on the public key for the purpose of user authentication and key agreement in secure fashion however, we use the ICPK(Implicitly Certified Public key) to reduce the bandwidth for a certificate exchanging and to improve a computational efficiency. In this architecture, we use two-tier approach to deal with key management where the whole group is divided into two parts; the first is a cell groups consisted of mobile hosts and another is a control group consisted of cell group managers. This approach can provide flexibility of key management such that the affection for a membership change is locally restricted to the cell group which is an autonomous area of the CGM(Cell Group Manager).

1998 Future Directions (Engine Oil, Moter Oil)

  • Chai, Joseph
    • Proceedings of the Korean Society of Tribologists and Lubrication Engineers Conference
    • /
    • 1998.04a
    • /
    • pp.3-43
    • /
    • 1998
  • Technical and business transformations are reshaping the business of Diesel engine builders, Diesel lubricant marketers and additive companies. Key issues facing engine builders and end users under these transformations include: -Emission regulations -Vehicle operating costs -Evolving business environments With these challenges come opportunities. For equipment builders and lubricant marketers, these include: -Lubricants meeting global performance requirements -High value lubricant applications -Profitable new businesses

  • PDF