• Title/Summary/Keyword: short group signature

Search Result 7, Processing Time 0.029 seconds

Study on the Use of Short Group Signature (BBS04) in Real Applications (실생활 응용을 위한 짧은 그룹 서명 기법(BBS04)에 대한 연구)

  • Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Sok-Joon;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.3-15
    • /
    • 2009
  • The short group signature introduced by Boneh et al. is one of famous anonymous signature schemes. However, for applying it to the real applications, several restrictions should be considered. The perfect anonymity of users, which is given by group signatures, prevents service providers to provide certain services or resources. For this reason, the local linkability which reduces the anonymity of users has to be provided to the service providers. In addition, the group signature keys, which are one-sidedly assigned from a group manager, cannot support the strong exculpability of users. Hence, the short group signature has to be modified for supporting the strong exculpability. In this paper, we perform a study on the use of the short group signature by proposing a few methods for supporting those two properties.

Pseudonym-based Anonymous PKI with Short Group Signature (Short Group Signature를 이용한 가명 기반 PKI)

  • Lee, Sok-Joon;Han, Seung-Wan;Lee, Yun-Kyung;Chung, Byung-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.703-707
    • /
    • 2008
  • Nowadays, Internet becomes an essential element in our life. We can make use of numerous on-line services through Internet such as information search, on-line shopping, e-mail service, etc. But, while getting the benefits of Internet service, invasion of our privacy frequently occurs because on-line service providers tend to request excessive or unnecessary personal information. So, there have been some researches on anonymous authentication, which means that user can authenticate herself, not revealing her identity or personal information. But, most of the researches are not somewhat applicable to current authentication infrastructure. In this paper, we propose a pseudonym-based anonymous PKI with short group signature. Using our proposed scheme, we can provide anonymity with conditional traceability to current PKI.

  • PDF

Lattice-based Threshold Ring Signature with Message Block Sharing

  • CHEN, Jiangshan;HU, Yupu;GAO, Wen;Liang, Hongmei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1003-1019
    • /
    • 2019
  • Threshold ring signature scheme enables any t entities from N ring members to spontaneously generate a publicly verifiable t-out-of-N signature anonymously. The verifier is convinced that the signature is indeed generated by at least t users from the claimed group, but he cannot tell them apart. Threshold ring signatures are significant for ad-hoc groups such as mobile ad-hoc networks. Based on the lattice-based ring signature proposed by Melchor et al. at AFRICRYPT'13, this work presents a lattice-based threshold ring signature scheme, employing the technique of message block sharing proposed by Choi and Kim. Besides, in order to avoid the system parameter setup problems, we proposed a message processing technique called "pad-then-permute", to pre-process the message before blocking the message, thus making the threshold ring signature scheme more flexible. Our threshold ring signature scheme has several advantages: inherits the quantum immunity from the lattice structure; has considerably short signature and almost no signature size increase with the threshold value; provable to be correct, efficient, indistinguishable source hiding, and unforgeable.

A Secure Bluetooth Piconet using Non-Anonymous Group Keys (비익명성 그룹키를 이용한 안전한 블루투스 피코넷)

  • 서대희;이임영
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.222-232
    • /
    • 2003
  • In accordance with the changes in the wireless communication environment, there has been a great need to satisfy the demand for diverse modes of information exchange. Various types of short-distance wireless communication technology have been developed and studied to meet this demand. Among them, Bluetooth which has recently been acclaimed as the standard for short-distance wireless communication, has been the focus of many such studies. However, Bluetooth has weaknesses in its suuity features when its in security services are applied to Home networks. The purpose of this study is to propose a safe Bluetooth scenario with an upgraded suity feature. This paper first reviews the general characteristics and security features of Bluetooth together with an analysis of its weaknesses, and presents the formation and maintenance process of Bluetooth piconet what is created by using ECDSA and group key in the ACL(Asynchronous Connection-less Link) connection through a safe Bluetooth inquiry process.

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.

A Study on the Damyang Area Restaurants in Bamboo food village (향토음식 특화 거리의 관광상품화와 활성화 방안 연구 - 담양 죽순 푸드빌리지를 중심으로 -)

  • Kim, Su In;Park, Yeon Jin;Kim, So Young;Chang, Hea Jin
    • Journal of the Korean Society of Food Culture
    • /
    • v.28 no.4
    • /
    • pp.348-355
    • /
    • 2013
  • This study intends to provide preliminary data for improving dining experience in the restaurants of Bamboo food village and help draw up guidelines for the improvement of these dining venues by surveying customer perception and satisfaction in 15-restaurants of the food village. The restaurants were surveyed mainly for satisfaction of the menu, especially, on the signature dishes of Damyang, "ddeokgalbi" (grilled short rib balls) and "daetongbab"-the grilled short rib balls and bamboo rice. The two dishes were more liked by people in the the 20- to 29-year age group with a score of 3.92 and 4.11, respectively. Although the 30-49 age group showed the highest satisfaction score on the fixed price menu, there was no statistically significant difference. The age group of 20-29 also showed the highest satisfaction on plating and table setting with a score of 4.09 and 4.04, respectively, and there was significant difference among age groups in this regard (p<0.05). All the age groups surveyed answered "time-honored taste" should be captured when working on menus, which suggests it should be the first choice for the restaurants in the food village when they develop their menus. When it comes to the restaurant environment, satisfaction on sanitary conditions was significantly different among the groups with a score of 4.21 given by 30-49 age group and 3.88 by the 50 and over group (p<0.05). In the category of service satisfaction, the two aforementioned age groups again showed significant difference in catering to customer needs with a score of 3.99 and 3.63, respectively (p<0.05), whereas welcoming customers and serving food was scored without statistical difference by age. Being asked what needs to be done to strengthen competitive advantage of the restaurants, all the age groups answered "taste" would matter the most while the 20 to 29 and 30 to 49 age groups picked "hygiene" and the 50 and over selected "table setting and ambience" next, which was statistically different with a p value of <0.05. Regarding the competitive advantage of the Korean restaurants in Damyang Bamboo food village, the first two younger groups (20 to 29 and 30 to 49) chose "table setting and ambience" and the eldest (50 and over) age group answered "location wise advantage," indicating significant difference by age. More than 80 percent of the people surveyed were willing to revisit the venues, which suggests improving restaurant environment in Bamboo food village and offering customers a better experience are very likely to build a image of culinary tourism for Damyang.

Relationship of ground level enhancements with solar erupted factors

  • Firoz, K.A.;Cho, Kyung-Suk;Dorotovic, Ivan;Pinter, Teodor;Kaushik, Subhash C.
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.35 no.1
    • /
    • pp.34.2-34.2
    • /
    • 2010
  • Cosmic rays registered by Neutron Monitors on the surface of the Earth are believed to be coming from outer space, and sometimes also from the exotic objects of the Sun. Ground level enhancement (GLE) is the sudden, sharp and short-lived increase in cosmic rays originated from the Sun. Since GLE is the signature in solar cosmic ray intensity, different solar factors erupted from the Sun can be responsible for causing it. In this context, an attempt has been made to determine quantitative relationships of GLEs > 5% with simultaneous solar, interplanetary and geophysical factors from 1997 through 2006 thereby searching the perpetrators which seem to be causing them. The study has revealed that solar flares are stronger ($0.71{\times}10-4$ w/m2) during GLE peaks than the solar flares ($1.10{\times}10-5$ w/m2) during GLE non-peaks and backgrounds. On the average, the solar wind plasma velocity and interplanetary magnetic field are found stronger during the GLE peaks than the GLE non-peaks and backgrounds indicating that the solar flares, in conjunction with interplanetary shocks, sometimes may cause GLE peaks. Direct proportionality of GLE peaks to simultaneous solar energetic particle (SEP) fluxes imply that the GLE peaks may often be caused by SEP fluxes. Although the high intensity of SEP fluxes are also seen extended few minutes even after GLE peaks, the mean (373.62 MeV) of the GLE associated SEP fluxes is much stronger than the mean (10.35 MeV) of the non-GLE associated SEP fluxes. Evidences are also supported by corresponding SEP fluences that the the mean fluence (${\sim}5.32{\times}107/cm2$) across GLE event was more intense than the mean fluence (${\sim}2.53{\times}106/cm2$) of SEP fluxes across non-GLE event.

  • PDF