• 제목/요약/키워드: zero knowledge

검색결과 153건 처리시간 0.033초

효율적인 영지식 부인봉쇄 프로토콜 연구 (Study of Undeniable Signatures Schemes based on Zero-Knowledge Proof)

  • 계이기;최황규
    • 한국항행학회논문지
    • /
    • 제14권5호
    • /
    • pp.691-696
    • /
    • 2010
  • 본 논문은 부인봉쇄에서 영지식 검증을 위해 일방향 함수와 부분선택 방법을 사용하는 새로운 기법을 제한한다. 제안된 기법의 핵심은 서명자의 협조 없이 전달되는 문서에 대하여 서명자를 보호하는 것이다. 또한 본 논문은 확인과 부인 프로토콜 수행 과정에서 메시지 교환을 위한 통신비용을 최소화할 수 있음을 보이며, 이는 모바일 환경에 매우 유용하다. 한편 제안된 기법은 서명자가 원래 메시지와 서명을 모르는 상황에서 검증자의 비밀을 보호하면서 서명이 유효한지를 검사할 수 있는 검증자를 허용한다.

Zero-knowledge proof algorithm for Data Privacy

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권2호
    • /
    • pp.67-75
    • /
    • 2021
  • As pass the three revised bills, the Personal Information Protection Act was revised to have a larger application for personal information. For an industrial development through an efficient and secure usage of personal information, there is a need to revise the existing anonymity processing method. This paper modifies the Zero Knowledge Proofs algorithm among the anonymity processing methods to modify the anonymity process calculations by taking into account the reliability of the used service company. More detail, the formula of ZKP (Zero Knowledge Proof) used by ZK-SNAKE is used to modify the personal information for pseudonymization processing. The core function of the proposed algorithm is the addition of user variables and adjustment of the difficulty level according to the reliability of the data user organization and the scope of use. Through Setup_p, the additional variable γ can be selectively applied according to the reliability of the user institution, and the degree of agreement of Witness is adjusted according to the reliability of the institution entered through Prove_p. The difficulty of the verification process is adjusted by considering the reliability of the institution entered through Verify_p. SimProve, a simulator, also refers to the scope of use and the reliability of the input authority. With this suggestion, it is possible to increase reliability and security of anonymity processing and distribution of personal information.

Zero-Knowledge Realization of Software-Defined Gateway in Fog Computing

  • Lin, Te-Yuan;Fuh, Chiou-Shann
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.5654-5668
    • /
    • 2018
  • Driven by security and real-time demands of Internet of Things (IoT), the timing of fog computing and edge computing have gradually come into place. Gateways bear more nearby computing, storage, analysis and as an intelligent broker of the whole computing lifecycle in between local devices and the remote cloud. In fog computing, the edge broker requires X-aware capabilities that combines software programmability, stream processing, hardware optimization and various connectivity to deal with such as security, data abstraction, network latency, service classification and workload allocation strategy. The prosperous of Field Programmable Gate Array (FPGA) pushes the possibility of gateway capabilities further landed. In this paper, we propose a software-defined gateway (SDG) scheme for fog computing paradigm termed as Fog Computing Zero-Knowledge Gateway that strengthens data protection and resilience merits designed for industrial internet of things or highly privacy concerned hybrid cloud scenarios. It is a proxy for fog nodes and able to integrate with existing commodity gateways. The contribution is that it converts Privacy-Enhancing Technologies rules into provable statements without knowing original sensitive data and guarantees privacy rules applied to the sensitive data before being propagated while preventing potential leakage threats. Some logical functions can be offloaded to any programmable micro-controller embedded to achieve higher computing efficiency.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권2호
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

A Study on the Processing Method of pseudonym information considering the scope of data usage

  • Min, Youn-A
    • 한국컴퓨터정보학회논문지
    • /
    • 제26권5호
    • /
    • pp.17-22
    • /
    • 2021
  • 데이터3법의 적용과 더불어 가명정보 활용의 범위가 넓어졌다. 가명정보의 경우 다양한 데이터와의 연계 및 결합에 의하여 특정개인을 식별할 수 있으며 가명정보의 잘못된 활용으로 인하여 개인정보가 유출될 수 있다. 본 논문에서는 데이터의 사용범위를 세분화하고 해당범위에 따른 차별화된 가명정보 처리방법을 제안하였다. 연구를 위하여 가명정보 처리방법 중 영지식증명의 수식을 활용하여 해당 수식을 수정하였으며 제안한 수식을 적용한 경우 기존 영지식증명의 수식을 적용한 경우보다 Verification time 측면에서 평균 10%정도 성능 향상을 확인하였다.

Explaining the Impossibility of Division by Zero: Approaches of Chinese and Korean Middle School Mathematics Teachers

  • Kim, Young-Ok
    • 한국수학교육학회지시리즈D:수학교육연구
    • /
    • 제11권1호
    • /
    • pp.33-51
    • /
    • 2007
  • The present study explores mathematics teachers' understanding of division by zero and their approaches to explaining the impossibility of division by zero. This study analyzes Chinese and Korean middle school mathematics teachers' responses to the teaching task of explaining the impossibility of dividing 7 by zero, and examples of teachers' reasoned explanations for their answers are presented. The findings from this study suggest that most Korean teachers offer multiple types of mathematical explanations for justifying the impossibility of division by zero, while Chinese teachers' explanations were more uniform and based less on mathematical ideas than those of their Korean counterparts. Another finding from this study is that teachers' particular conceptions of zero were strongly associated with their justifications for the impossibility of division by zero, and the influence of the teachers' conceptions of zero was revealed as a barrier in composing a well-reasoned explanation for the impossibility of division by zero. One of the practical implications of this study is those teachers' basic attitudes toward always attempting to give explanations for mathematical facts or mathematical concepts do not seem to be derived solely from their sufficient knowledge of the facts or concepts of mathematics.

  • PDF

ZEB(Zero Emission Building) 디자인 프로세스에 관한 연구 (A Study on the Design Process of Zero Emission Buildings)

  • 강혜진;강수연;박진철;이언구
    • 한국태양에너지학회 논문집
    • /
    • 제30권2호
    • /
    • pp.39-45
    • /
    • 2010
  • Zero Emission Building is abuilding which emits virtually '0(zero)' carbon dioxide. Although simple in concept, ZEB requires totally different approach from conventional building in terms of design, engineering, construction and operation. There are few research on ZEB design process as ZEB design requires understanding and knowledge regarding energy and technology. The study aims to propose a design process of Zero Emission Building for architects. The study examined the concept of Zero Emission Building through intensive literature search. The examples of Zero Emission Buildings were investigated, and strategies and technologies applied to the buildings were analyzed. Various conventional design processes were identified and analyzed to examine the applicability to ZEB design, Finally, a new design process which effectively accommodate the requirement of Zero Emission Building was proposed.

Input Certification protocol for Secure Computation

  • Myoungin Jeong
    • 한국컴퓨터정보학회논문지
    • /
    • 제29권8호
    • /
    • pp.103-112
    • /
    • 2024
  • 본 연구는 계산에 참여하는 참가자가 다수의 입력값을 동일한 키를 사용하여 입력하는 계산의 경우 입력값을 공개하지 않으면서 입력값이 변형되지 않았다는 인증을 목적으로 시작하였다. 일반적으로 인증 단계에서는 입력값을 공개 후 인증을 실시하나 입력값을 끝까지 공개하지 않고자 하는 것이다. 이는 암호학에서 악의적인 참가자가 존재하는 전통적인 보안 모델을 벗어나는 경우이지만, 실제로 충분히 일어날 수 있는 악의적인 공격 방법이다. 악의적인 의도를 가진 입력값 조작으로 프라이버시 침해, 또는 계산 결과의 왜곡이 일어날 수 있다. 본 연구에서는 이를 방지하기 위해 서명 체계, 영지식증명, commitment scheme을 이용하여 메시지를 공개하지 않고 해당 메시지가 변조되지 않은 메시지임을 인증(input certification)하는 방법에 대해 연구하였다. 특히, ElGamal 서명 체계를 수정하여 commitment scheme과 영지식 증명과 결합하여 입력된 데이터가 변조되지 않은 데이터라는 인증이 가능한 프로토콜을 설계하여 증명하였고, 인증 간에 batch verification을 적용하여 효율성을 향상시켰다.

Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment

  • Park, Sung-Wook;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • 제9권3호
    • /
    • pp.461-476
    • /
    • 2013
  • Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an zero-knowledge proof scheme and ring signature based on NTRU for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

On the Length of Hash-values for Digital Signature Schemes

  • Lim, Chae-Hoon;Lee, Pil-Joong-
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 1994년도 종합학술발표회논문집
    • /
    • pp.29-31
    • /
    • 1994
  • In digital signature schemes derived from the zero-knowledge proof techniques, some authors often claims that the length of hash-values for their schemes could be as short as 64 or 72 bits for the security level of 2$^{-64}$ or 2$^{-72}$ . This letter shows that signature schemes with such short hash values cannot achieve the security levels as stated, due to the birthday attack by the signer.

  • PDF