• Title/Summary/Keyword: scheme

Search Result 29,291, Processing Time 0.043 seconds

A New Diversity Combining Scheme Based on Interleaving Method for Time-of-arrival Estimation of Chirp Signal

  • Jang, Seong-Hyun;Chong, Jong-Wha
    • Journal of IKEEE
    • /
    • v.16 no.2
    • /
    • pp.153-158
    • /
    • 2012
  • A new diversity combining scheme is proposed for time-of-arrival (TOA) estimation of chirp signal in dense multipath channel. In the multipath channel, the performance of TOA estimation using conventional correlation matrix-based diversity combining scheme is degraded due to the lack of de-correlation effect. To increase the de-correlation effect, the proposed diversity scheme employs interleaving method based on the property of de-chirped signal. As a result, the proposed scheme increases de-correlation effect and also reduces the noise of TOA estimation. Finally, the diversity achieved from the proposed scheme improves TOA estimation performance. The de-correlation effect is analyzed mathematically. The estimation accuracy of the proposed diversity scheme is superior to that of conventional diversity scheme in multipath channel.

A Strong Designated Verifiable DL Based Signcryption Scheme

  • Mohanty, Sujata;Majhi, Banshidhar
    • Journal of Information Processing Systems
    • /
    • v.8 no.4
    • /
    • pp.567-574
    • /
    • 2012
  • This paper presents a strong designated verifiable signcryption scheme, in which a message is signcrypted by a signcryptor and only a specific receiver, who called a "designated verifier", verifies it using his own secret key. The scheme is secure, as an adversary can not verify the signature even if the secret key of the signer is compromised or leaked. The security of the proposed scheme lies in the complexity of solving two computationally hard problems, namely, the Discrete Logarithm Problem (DLP) and the Integer Factorization Problem (IFP). The security analysis of the scheme has been done and it is proved that, the proposed scheme can withstand an adaptive chosen ciphertext attack. This scheme can be very useful in organizations where there is a need to send confidential documents to a specific recipient. This scheme can also be applicable to real life scenarios, such as, e-commerce applications, e-banking and e-voting.

An Analysis of Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting (안전한 브로드 캐스팅을 위한 Time-Bound Hierarchical Key Management 스킴 비교 분석)

  • Kim, Hyun-Cheol;Goo, Woo-Guen;Lee, Jun-Ho;Lee, Dong-Hoon
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.556-558
    • /
    • 2008
  • Secure broadcasting is requirement for payment of TV systems, government or company. Hierarchical key management for access control provides efficient key management in those environment. Also, time-bound hierarchical key management technique generates different keys in each time period. In 2004, Tzeng proposed a time-bound cryptgraphic key assignment scheme for access control in a hierarchy and in 2008, Bertino et al proposed an efficient time-bound hierarchical key management scheme for secure broadcasting. Tzeng's scheme and Bertino et al's scheme are organized in different environment and primitive. In this paper, we analysis above two time-bound hierarchical key management scheme.

  • PDF

Dual Image Reversible Data Hiding Scheme Based on Secret Sharing to Increase Secret Data Embedding Capacity (비밀자료 삽입용량을 증가시키기 위한 비밀 공유 기반의 이중 이미지 가역 정보은닉 기법)

  • Kim, Pyung Han;Ryu, Kwan-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.9
    • /
    • pp.1291-1306
    • /
    • 2022
  • The dual image-based reversible data hiding scheme embeds secret data into two images to increase the embedding capacity of secret data. The dual image-based reversible data hiding scheme can transmit a lot of secret data. Therefore, various schemes have been proposed until recently. In 2021, Chen and Hong proposed a dual image-based reversible data hiding scheme that embeds a large amount of secret data using a reference matrix, secret data, and bit values. However, in this paper, more secret data can be embedded than Chen and Hong's scheme. To achieve this goal, the proposed scheme generates polynomials and shared values using secret sharing scheme, and embeds secret data using reference matrix and septenary number, and random value. Experimental results show that the proposed scheme can transmit more secret data to the receiver while maintaining the image quality similar to other dual image-based reversible data hiding schemes.

Ring Signature Scheme Based on Lattice and Its Application on Anonymous Electronic Voting

  • Zhou, Yihua;Dong, Songshou;Yang, Yuguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.287-304
    • /
    • 2022
  • With the development of quantum computers, ring signature schemes based on large integer prime factorization, discrete logarithm problem, and bilinear pairing are under threat. For this reason, we design a ring signature scheme based on lattice with a fixed verification key. Compared with the previous ring signature scheme based on lattice, our design has a fixed verification key and does not disclose the signer's identity. Meanwhile, we propose an anonymous electronic voting scheme by using our ring signature scheme based on lattice and (t, n) threshold scheme, which makes up for the lack of current anonymous electronic voting that cannot resist attacks of the quantum computer. Finally, under standard model (SM), we prove that our ring signature scheme based on lattice is anonymous against the full-key exposure, and existentially non-forgeable against insider corruption. Furthermore, we also briefly analyze the security of our anonymous electronic voting scheme.

Signature-based Indexing Scheme for Similar Sub-Trajectory Retrieval of Moving Objects (이동 객체의 유사 부분궤적 검색을 위한 시그니쳐-기반 색인 기법)

  • Shim, Choon-Bo;Chang, Jae-Woo
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.247-258
    • /
    • 2004
  • Recently, there have been researches on storage and retrieval technique of moving objects, which are highly concerned by user in database application area such as video databases, spatio-temporal databases, and mobile databases. In this paper, we propose a new signature-based indexing scheme which supports similar sub-trajectory retrieval at well as good retrieval performance on moving objects trajectories. Our signature-based indexing scheme is classified into concatenated signature-based indexing scheme for similar sub-trajectory retrieval, entitled CISR scheme and superimposed signature-based indexing scheme for similar sub-trajectory retrieval, entitled SISR scheme according to generation method of trajectory signature based on trajectory data of moving object. Our indexing scheme can improve retrieval performance by reducing a large number of disk access on data file because it first scans all signatures and does filtering before accessing the data file. In addition, we can encourage retrieval efficiency by appling k-warping algorithm to measure the similarity between query trajectory and data trajectory. Final]y, we evaluate the performance on sequential scan method(SeqScan), CISR scheme, and SISR scheme in terms of data insertion time, retrieval time, and storage overhead. We show from our experimental results that both CISR scheme and SISR scheme are better than sequential scan in terms of retrieval performance and SISR scheme is especially superior to the CISR scheme.

A Throughput Analysis of the D-STTD Communication System with AMC Scheme (AMC기법을 적용한 D-STTD 통신 시스템의 성능 분석)

  • Lee, Jeong-Hwan;Yoon, Gil-Sang;You, Cheol-Woo;Hwang, In-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.9
    • /
    • pp.8-12
    • /
    • 2008
  • In this paper, we proposes a D-STTD(Double-Space Time Transmit Diversity) communication system with AMC scheme and analyzes its performance using simulation experiments. The AMC scheme selects an optimal channel coding rate and modulation scheme based on the channel response data for signal transmission, creating a balance between error rate and throughput to improve the overall system throughput and transmission quality. The D-STTD scheme complements the conventional STTD(Space Time Transmit Diversity) scheme, yielding about twice the throughput. The simulation results show that the probability of selecting a high MCS(Modulation and Coding Scheme) level increased as the SNR(Signal to Noise Ratio) improved. Furthermore, the D-STTD communication system with AMC scheme provided a more uniform throughput distribution throughout the entire SNR range compared to its counterpart which did not apply AMC scheme. Also, the maximum throughput of the D-STTD communication system with AMC scheme was twice that of a conventional AMC communication system or a STTD communication system with AMC scheme.

Cryptanalysis and Enhancement of a Remote User Authentication Scheme Using Smart Cards (스마트카드를 이용한 사용자 인증 스킴의 안전성 분석 및 개선)

  • Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.139-147
    • /
    • 2010
  • A remote user authentication scheme is a two-party protocol whereby an authentication server in a distributed system confirms the identity of a remote individual logging on to the server over an untrusted, open network. In 2005, Liao et al. proposed a remote user authentication scheme using a smart card, in which users can be authenticated anonymously. Recently, Yoon et al. have discovered some security flaws in Liao et al.'s authentication scheme and proposed an improved version of this scheme to fix the security flaws. In this article, we review the improved authentication scheme by Yoon et al. and provide a security analysis on the scheme. Our analysis shows that Yoon et al.'s scheme does not guarantee not only any kind of authentication, either server-to-user authentication or user-to-server authentication but also password security. The contribution of the current work is to demonstrate these by mounting two attacks, a server impersonation attack and a user impersonation attack, and an off-line dictionary attack on Yoon et al.'s scheme. In addition, we propose the enhanced authentication scheme that eliminates the security vulnerabilities of Yoon et al.'s scheme.

Construction of Knowledge Classification Scheme for Sharing and Usage of Knowledge : a Case Study in KAERI (지식의 공유 및 활용을 위한 지식분류체계 설계방안 - 한국원자력연구소를 중심으로)

  • Yoo, Jae-Bok
    • Journal of Information Management
    • /
    • v.35 no.1
    • /
    • pp.1-27
    • /
    • 2004
  • To share knowledge efficiently among our members on the basis of knowledge management system, first of all, we need to systematically design the knowledge classification scheme that we can classify these knowledge well. The objective of this study is to construct the most suitable knowledge classification scheme that all of us can share them in Korea Atomic Energy Research Institute (KAERI). To construct the knowledge classification scheme all over the our organization, we established a few principles to design it and examined related many classification schemes. And I carried out 3 steps to complete the best desirable KAERI's knowledge classification scheme, that is, (1) the step to design a draft of the knowledge classification scheme, (2) the step to revise a draft of the knowledge classification scheme, (3) the step to verify the revised scheme and to decide its scheme. The scheme completed as a results of this study is consisted of total 218 items : sections of 8 items, classes of 43 items and sub-classes of 167 items. I expect that the knowledge classification scheme designed as the results of this study can be played an important role as the frame to efficiently share knowledge among our members when we introduce knowledge management system in our organization. In addition, I expect that steps to design its scheme as well as this scheme itself can be applied when design a knowledge classification scheme at the other R&D institutes and enterprises.

Adaptive Transmission Scheme According to the User Location (사용자의 위치에 따른 적응적 전송 기법)

  • Kang, Sung-jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2148-2150
    • /
    • 2015
  • This paper proposes an adaptive cooperative scheme in the cell boundary. The user location and the suitable cooperative transmission scheme are considered in the proposed scheme. If the user is located in the cell boundary, the quality of communication is degraded. Two base stations are used to obtain diversity in the conventional schemes. But the quality of communication is not sufficiently improved because the user is still distant from the base stations. So, the scheme is proposed that the relays and the adaptive cooperative scheme are used considering the location of the user. By the simulation, it is proved that the proposed scheme is better than the conventional scheme.