• 제목/요약/키워드: proof scheme

검색결과 133건 처리시간 0.027초

Research on Identity-based Batch Anonymous Authentication Scheme for VANET

  • Song, Cheng;Gu, Xinan;Wang, Lei;Liu, Zhizhong;Ping, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.6175-6189
    • /
    • 2019
  • To slove the security and efficiency problem of anonymous authentication in vehicular ad-hoc network (VANET), we adopt the bilinear pairing theory to propose an identity-based batch anonymous authentication scheme for VANET. The tamper-proof device in the on-board unit and the trusted authority jointly realize the anonymity of vehicle identity and the signature of messages, which further enhances the security of this scheme, as well as reduces the overhead of trusted authority. Batch authentication can improve the efficiency of anonymous authentication for VANET. Security and efficiency analyses demonstrate that this scheme not only satisfies such security properties as anonymity, non-forgeability and non-repudiation, but also has advantage in time and space complexity. Simulation results show that this scheme can achieve good performance in real-time VANET communication.

쏠더를 이용한 웨이퍼 레벨 실장 기술 (A novel wafer-level-packaging scheme using solder)

  • 이은성;김운배;송인상;문창렬;김현철;전국진
    • 반도체디스플레이기술학회지
    • /
    • 제3권3호
    • /
    • pp.5-9
    • /
    • 2004
  • A new wafer level packaging scheme is presented as an alternative to MEMS package. The proof-of-concept structure is fabricated and evaluated to confirm the feasibility of the idea for MEMS wafer level packaging. The scheme of this work is developed using an electroplated tin (Sn) solder. The critical difference over conventional ones is that wafers are laterally bonded by solder reflow after LEGO-like assembly. This lateral bonding scheme has merits basically in morphological insensitivity and its better bonding strength over conventional ones and also enables not only the hermetic sealing but also its electrical interconnection solving an open-circuit problem by notching through via-hole. The bonding strength of the lateral bonding is over 30 Mpa as evaluated under shear and the hermeticity of the encapsulation is 2.0$\times10^{-9}$mbar.$l$/sec as examined by pressurized Helium leak rate. Results show that the new scheme is feasible and could be an alternative method for high yield wafer level packaging.

  • PDF

Universal Composability Notion for Functional Encryption Schemes

  • Sadikin, Rifki;Park, YoungHo;Park, KilHoum;Moon, SangJae
    • 한국산업정보학회논문지
    • /
    • 제18권3호
    • /
    • pp.17-26
    • /
    • 2013
  • We have developed an ideal functionality for security requirement of functional encryption schemes. The functionality is needed when we want to show the security of a functional encryption scheme in universal composable (UC) framework. A functionality $F_{fe}$ was developed to represent ideal respond of a functional encryption scheme against any polynomial time active attacker. We show that UC security notion of functional encryption scheme $F_{fe}$ is as strong as fully secure functional encryption in an indistinguishable game with chosen cipher text attack. The proof used a method that showing for any environment algorithm, it can not distinguish ideal world where the attacker play with ideal functionality $F_{fe}$ and real world where the attacker play a fully secure functional encryption scheme.

양자 컴퓨팅 환경에서 안전한 다중 서명 기법 (A Post-Quantum Multi-Signature Scheme)

  • 고찬영;이영경;이광수;박종환
    • 정보보호학회논문지
    • /
    • 제31권3호
    • /
    • pp.517-526
    • /
    • 2021
  • 최근 양자 컴퓨터의 개발이 가속화되면서 기존 인터넷 환경에서 사용되고 있는 인수분해 및 이산대수 기반의 전자서명 기법들의 안전성에 대한 문제가 제기되고 있다. 이에 대응하기 위해 미국 국립표준기술연구원(NIST)의 표준화 작업을 비롯하여 양자 컴퓨팅 환경에서 안전한 여러 가지 전자서명 기법들이 제시되고 있다. 본 논문에서는 2018년 Behnia 등이 CCS 컨퍼런스에서 발표한 TACHYON 전자서명 기법을 이용한 다중 서명 기법을 설계하여 제시하고, 안전성을 증명하고자 한다. 다중 서명 기법은 최근 많은 관심을 받고 있는 암호화폐 분야에서 전자지갑의 개인키 의존도를 분산하여 보다 안전한 전자지갑 시스템을 구성할 수 있는 핵심 기술로, 최근 많은 연구자들과 개발자들이 관심을 갖고 있는 전자서명 응용 분야이다. 본 논문에서 제시하는 다중 서명 기법은 일반 공개키 모델(plain public key model)에서 공개키 결합(public key aggregation)이 가능한 기법으로, 부가적인 영지식 증명(zero-knowledge proof) 기법이 필요하지 않으며, 결합 된 단일 공개키만으로 효율적인 시스템을 구성할 수 있는 기법이다.

Attack-Proof Cooperative Spectrum Sensing Based on Consensus Algorithm in Cognitive Radio Networks

  • Liu, Quan;Gao, Jun;Guo, Yunwei;Liu, Siyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권6호
    • /
    • pp.1042-1062
    • /
    • 2010
  • Cooperative spectrum sensing (CSS) is an effective technology for alleviating the unreliability of local spectrum sensing due to fading/shadowing effects. Unlike most existing solutions, this paper considers the use of CSS technology in decentralized networks where a fusion center is not available. In such a decentralized network, some attackers may sneak into the ranks of cooperative users. On the basis of recent advances in bio-inspired consensus algorithms, an attack-proof, decentralized CSS scheme is proposed in which all secondary users can maintain cooperative sensing by exchanging information locally instead of requiring centralized control or data fusion. Users no longer need any prior knowledge of the network. To counter three potential categories of spectrum sensing data falsification (SSDF) attacks, some anti-attack strategies are applied to the iterative process of information exchange. This enables most authentic users to exclude potentially malicious users from their neighborhood. As represented by simulation results, the proposed scheme can generally ensure that most authentic users reach a consensus within the given number of iterations, and it also demonstrates much better robustness against different SSDF attacks than several existing schemes.

Provably-Secure Public Auditing with Deduplication

  • Kim, Dongmin;Jeong, Ik Rae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권4호
    • /
    • pp.2219-2236
    • /
    • 2017
  • With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu's scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.

Secure Mobile Agents in eCommerce with Forward-Secure Undetachable Digital Signatures

  • Shi, Yang;Zhao, Qinpei;Liu, Qin
    • ETRI Journal
    • /
    • 제37권3호
    • /
    • pp.573-583
    • /
    • 2015
  • We introduce the idea of a forward-secure undetachable digital signature (FS-UDS) in this paper, which enables mobile agents to generate undetachable digital signatures with forward security of the original signer's signing key. The definition and security notion of an FS-UDS scheme are given. Then, the construction of a concrete FS-UDS scheme is proposed; and the proof of security for the proposed scheme is also provided. In the proposed scheme, mobile agents need not carry the signing key when they generate digital signatures on behalf of the original signer, so the signing key will not be compromised. At the same time, the encrypted function is combined with the original signer's requirement; therefore, misuse of the signing algorithm can be prevented. Furthermore, in the case where a hacker has accessed the signing key of the original signer, he/she is not able to forge a signature for any time period prior to when the key was obtained.

Collusion-Resistant Unidirectional Proxy Re-Encryption Scheme from Lattices

  • Kim, Kee Sung;Jeong, Ik Rae
    • Journal of Communications and Networks
    • /
    • 제18권1호
    • /
    • pp.1-7
    • /
    • 2016
  • Most of the previous proxy re-encryption schemes rely on the average-case hardness problems such as the integer factorization problems and the discrete logarithm problems. Therefore, they cannot guarantee its security under quantum analysis, since there exist quantum algorithms efficiently solving the factorization and logarithm problems. In the paper, we propose the first proxy re-encryption scheme based on the hard worst-case lattice problems. Our scheme has many useful properties as follows: Unidirectional, collusion-resistant, noninteractive, proxy invisible, key optimal, and nontransitive.We also provided the formal security proof of the proposed scheme in the random oracle model.

Schnorr 전자서명을 이용한 효율적인 Threshold 서명 기법 (Efficient Threshold Schnorr's Signature Scheme)

  • 양대헌;권태경
    • 정보보호학회논문지
    • /
    • 제14권2호
    • /
    • pp.69-74
    • /
    • 2004
  • Threshold 전자 서명은 ad hoc network 등 인프라가 없는 곳에서 유용하게 사용될 수 있고, 이에 대한 연구가 최근 증가하고 있다. 현재까지 알려진 threshold 전자 서명 기법은 주로 RSA, DSA 등에 국한되어 왔다. Schnorr 서명은 계산량 및 통신량의 측면에서 매우 효율적이지만 비대화식 증명을 이용하는 구조고 인해 threshold 기법으로 응용하는데 어려움이 있다. 이 논문에서는 이를 해결하여 Schnorr의 전자 서명의 효율적인 threshold 방법을 제안한다. 제안하는 threshold 전자 서명 기법은 매우 확장성이 좋으며, 선처리에 의해 실행시간의 계산량을 줄일 수 있는 구조를 가진다.

Double-Blind Compact E-cash from Bilinear Map

  • Chen, Jiyang;Lian, Bin;Li, Yongjie;Cui, Jialin;Yu, Ping;Shu, Zhenyu;Tao, Jili
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권4호
    • /
    • pp.1266-1285
    • /
    • 2022
  • Compact E-cash is the first scheme which can withdraw 2l coins within 𝒪(1) operations and then store them in 𝒪(𝑙) bits. Because of its high efficiency, a lot of research has been carried out on its basis, but no previous research pay attention to the privacy of payees and in some cases, payees have the same privacy requirement as payers. We propose a double-blind compact E-cash scheme, which means that both the payer and the payee can keep anonymous while spending. In our scheme, the payer and the bank cannot determine whether the payees of two different transactions are the same one and connect the payee with transactions related to him, in this way, the privacy of the payee is protected. And our protocols disconnect the received coin from previous transaction, then, the coin can be transferred into an unspent coin which belongs to the payee. The proposed e-cash scheme is secure within y-DDHI and LRSW assumption.