• Title/Summary/Keyword: zero knowledge

Search Result 153, Processing Time 0.027 seconds

NTRU Based Zero Knowledge Proof Scheme For NFC Mobile Payment Information Protection (NFC 모바일 결제정보보호를 위한 NTRU기반 영지식 증명 기법)

  • Park, Sung-Wook;Lee, Hae-Kag;Lee, Im-Young
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.63-66
    • /
    • 2012
  • 최근 스마트 기기는 결제, 할인쿠폰 등 각종 기능을 제공하는 수단으로 진화되면서 통신과 금융이 융합된 모바일 NFC 서비스의 시장이 급성장할 것으로 전망되고 있다. 특히 모바일 NFC 결제 서비스 시장의 활성화가 예상됨에 따라 모바일 NFC 결제 서비스는 국내 외적으로 널리 주목받고 있다. 하지만 이에 따른 NFC 기술 활용 증가로 개인정보 이용이 늘면서 침해요소 또한 증가하고 있다. 최근 한국인터넷진흥원에서 발표한 "NFC 개인정보보호 대책 최종보고서"에 따르면 개인정보 암호화를 부분적으로 미지원하거나 불필요한 개인정보의 과도한 수집 및 저장 등이 문제점으로 제기되었으며 Google사의 Google Wallet 서비스의 개인정보 유출 사고 또한 이러한 문제점을 뒷받침하는 근거가 되고 있다. 본 논문에서는 기존의 NFC 모바일 결제 서비스 상에서 결제정보를 이용한 결제 기술의 위협을 분석하고 결제정보를 직접적으로 사용하지 않고 결제자를 증명할 수 있는 NTRU기반 영지식 증명 기법을 제안한다.

  • PDF

The Impact of Information-Centric Force Improvements on Deterrence of Invasion: A Game-Theoretic Analysis (정보중심 전력증강의 전쟁억제 효과: 게임이론적 분석)

  • Cho, Jea-Yeong;Kim, Seung-Kwon
    • Journal of the military operations research society of Korea
    • /
    • v.31 no.1
    • /
    • pp.1-13
    • /
    • 2005
  • Due to the rapid developments in information and computer technology, the warfare paradigm is being transformed into information-centric and knowledge-based warfare. This atmosphere may have significant impact on the ROK armed forces' Force Improvement Plans (FIP) which is documented in 'Defense White Paper 2004'. We focus here on the relationship of information-centric force and deterrence of invasion. Particularly, we are interested in understanding the level of information superiority that might be required to deter the invasion. In order to solve this problem, we employed two-sided, zero-sum strategic game to simulate the outcome with six hypothetical cases devised by varying the level of information superiority.

An Authentication Scheme using Polynomial Equation of GF($2^n$) In ZK-Proof Protocol (GF($2^n$)의 다항식을 이용한 영지식 증명의 인증 기법)

  • 이원희;전문석;이철희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.1
    • /
    • pp.150-156
    • /
    • 1993
  • This paper studies an Authentication sheme which is used polynomial equation over GF(2n)for reducing time to authenticate sender and his message in secret data communication. Also in order to maintain strong secrecy, this scheme use interactive Zero-knowledge proof protocol for generating information of sender's authentication via unprotected communication channel.

  • PDF

BLIND IDENTIFICATION USING BILINEAR PAIRINGS FOR SMART CARDS

  • Lee, Young-Whan
    • Journal of applied mathematics & informatics
    • /
    • v.26 no.5_6
    • /
    • pp.1139-1147
    • /
    • 2008
  • A. Saxena et al. first proposed a two-flow blind identification protocol in 2005. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. In this paper, we give a method of the active-intruder attack on their identification scheme and propose a new zero- knowledge blind identification protocol for Smart cards. Our protocol consists of only two message flows and does not rely on any underlying signature or encryption scheme. The prover using computationally limited devices such as smart cards has no need of computing the bilinear pairings. It needs only for the verifier. Our protocol is secure assuming the hardness of the Discrete-Logarithm Problem in bilinear groups.

  • PDF

A Study on Position Control of the Direct Drive Robot Using Neural Networks (신경회로망을 이용한 직접 구동형 로봇의 위치제어에 관한 연구)

  • 신춘식;황용연;노창주
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.21 no.3
    • /
    • pp.284-292
    • /
    • 1997
  • This paper is concerned with position control of direct drive robots. The proposed algorithm consists of the feedback controller and neural networks. Mter the completion of learning, the output of the feedback controller is nearly equal to zero, and the neural networks play an important role in the control system. Therefore, the optimum retuning of control parameters is unnecessary. In other words, the proposed algorithm does not need any knowledge of the con¬trolled system in advance. The effectiveness of the proposed algorithm is demonstrated by the experiment on the position control of a parallelogram link-type direct drive robot.

  • PDF

A Study on the Force Control of a Robot Manipulator Using Neural Networks (신경회로망을 이용한 로봇 매니퓰레이터의 힘 제어에 관한 연구)

  • 황용연
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.21 no.4
    • /
    • pp.404-413
    • /
    • 1997
  • Direct-drive robots are suitable to position and force control with high accuracy, but it is difficult to design a controller which gives satisfactory perfonnance because of the system's nonlinearity and link-interactions. This paper is concerned with the force control of direct-drive robots. The pro¬posed algorithm consists of feedback controllers and a neural network. Mter the completion of learning, the outputs of feedback controllers are nearly equal to zero, and the neural network con¬troller plays an important role in the control system. Therefore, the optimum adjustment of parameters of feedback controllers is unnecessary. In other words, the proposed algorithm does not need any knowledge of the controlled system in advance. The effectiveness of the proposed algo¬rithm is demonstrated by the experiment on the force control of a parallelogram link-type direct¬drive robot.

  • PDF

Nutritional Role of Dietary Fiber-Recent Knowledge on Dietary fiber (식이섬유의 주요기능)

  • Tsuji, Keisuke
    • Journal of Food Hygiene and Safety
    • /
    • v.7 no.4
    • /
    • pp.173-176
    • /
    • 1992
  • Non-absorbable substances in foods, for instance dietary fiber had been previously known as a non-nutritive part of foods. Recently , such a category has been gradually changed to as one of nutrients, As a main reason, dietary fibers includes many poly-or oligo-saccharides, which as resistant to alimentary hydrolyzing enzyme, However, parts of them are fermented by intestinal micro-organism to produce short chain fatty acids and so on. They are absorbed and utilized by human being. Now, it may be naturally accepted that dietary fiber is a kind of nutrients. Dietary fiber exerts many useful functions on body. They are classified into three large function , physicochemical function, physiological function and biological function. The last function of dietary fiber will be presented in the symphosium. Dietary fiber has several kinds of nutritional properties. One is energy source. Short chain fatty acids(SCFA) are oxidized and produced energy in body. Dietary fiber has not high energy, but not zero kilocalories. Another one is to be a constitutional component of higher animals' tissue. Last but most important one is physiological functions of dietary fiber.

  • PDF

Shape Finding of Unstable Link Structures (불안정(不安定) Link 구조물(構造物)의 형태해석(形態解析)에 관(關)한 연구(硏究))

  • Kim, Jae-Yeol
    • Journal of Korean Association for Spatial Structures
    • /
    • v.3 no.2 s.8
    • /
    • pp.101-107
    • /
    • 2003
  • There exists a structural problem for link structures in the unstable state. The primary characteristics of this problem are in the existence of rigid body displacements without strain, and in the possibility of the introduction of prestressing to change an unstable state into a stable state. When we make local linearized incremental equations in order to obtain knowledge about these unstable structures, the determinant of the coefficient matrices is zero, so that we face a numerically unstable situation. This is similar to the situation in the stability problem. To avoid such a difficult situation, in this paper a simple and straightforward method was presented by means of the generalized inverse for the numerical analysis of stability problem.

  • PDF

Analysis and Design of Mutual Authentication Schemes from Zero-Knowledge Technique (상호 신분인증프로토콜의 분석 및 설계)

  • 임채훈;이필중
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1992.11a
    • /
    • pp.99-125
    • /
    • 1992
  • 본 논문에서는 영지식 기술로부터 얻어진 신분인증 방식을 둔 사용자 쌍방에 그대로 적응시켜 얻은 상호 신분인증 프로토콜은 oracle session attack하에서 결코 안전하지 않음을 보인다. 그 예로서 참고문헌 (1)에 제시된 프로토콜은 신분인증 과정뿐만 아니라 키 분배 과정 역시 안전하지 않으며 또한 참고문헌 (2)의 프로토콜 역시 상호 신분인증 과정은 전혀 안전하지 않음을 보인다. 본 논문에서는 이러한 공격이 성공할 수 있었던 몇 가지 요인들을 분석하여 안전한 상호 신분인증 프로토콜을 설계하는 체계적인 방법을 제시하고 이를 바탕으로 기존의 신분인증 방식을 키 분배가 가능한 안전한 상호 신용인증 방식으로 재구성한 몇 가지 설계 예들을 제시하기로 한다.

  • PDF

Double-Blind Compact E-cash from Bilinear Map

  • Chen, Jiyang;Lian, Bin;Li, Yongjie;Cui, Jialin;Yu, Ping;Shu, Zhenyu;Tao, Jili
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1266-1285
    • /
    • 2022
  • Compact E-cash is the first scheme which can withdraw 2l coins within 𝒪(1) operations and then store them in 𝒪(𝑙) bits. Because of its high efficiency, a lot of research has been carried out on its basis, but no previous research pay attention to the privacy of payees and in some cases, payees have the same privacy requirement as payers. We propose a double-blind compact E-cash scheme, which means that both the payer and the payee can keep anonymous while spending. In our scheme, the payer and the bank cannot determine whether the payees of two different transactions are the same one and connect the payee with transactions related to him, in this way, the privacy of the payee is protected. And our protocols disconnect the received coin from previous transaction, then, the coin can be transferred into an unspent coin which belongs to the payee. The proposed e-cash scheme is secure within y-DDHI and LRSW assumption.