• Title/Summary/Keyword: zero-knowledge

Search Result 148, Processing Time 0.022 seconds

Efficient and Secure Signature Scheme applicable to Secure multi-party Computation

  • Myoungin Jeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.7
    • /
    • pp.77-84
    • /
    • 2023
  • This research originated from the need to enhance the security of secure multiparty computation by ensuring that participants involved in multiparty computations provide truthful inputs that have not been manipulated. While malicious participants can be involved, which goes beyond the traditional security models, malicious behaviors through input manipulation often occur in real-world scenarios, leading to privacy infringements or situations where the accuracy of multiparty computation results cannot be guaranteed. Therefore, in this study, we propose a signature scheme applicable to secure multiparty technologies, combining it with secret sharing to strengthen the accuracy of inputs using authentication techniques. We also investigate methods to enhance the efficiency of authentication through the use of batch authentication techniques. To this end, a scheme capable of input certification was designed by applying a commitment scheme and zero-knowledge proof of knowledge to the CL signature scheme, which is a lightweight signature scheme, and batch verification was applied to improve efficiency during authentication.

A Study on Group Key Management based on Mobile Device ID in Ad-hoc network (Ad-hoc 네트워크에서 모바일 디바이스 아이디 기반의 그룹 키 관리에 대한 연구)

  • Kang, Seo-Il;Lee, Nam-Hoon;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.4
    • /
    • pp.540-549
    • /
    • 2009
  • An arbitrary mobile device configures Ad-hoc network to provide the transmission of a data and services using wireless communications. A mobile device requires authentication and encryption key management to securely communicate in the Ad-hoc network. This paper examines the trend of the authentication in the Ad-hoc network and the group key management and suggests the plan for ID-based mutual authentication and group key establishment. ID-based mutual authentication in proposed scheme uses zero knowledge in the absence of shared information and is applied to establish a session key and group key. In addition, the proposed scheme is applied to Ad-hoc network to increase the efficiency and the safety of security technology.

  • PDF

A Study on An Enhancement Scheme of Privacy and Anonymity through Convergence of Security Mechanisms in Blockchain Environments (블록체인 환경에서 보안 기법들의 융합을 통한 프라이버시 및 익명성 강화 기법에 대한 연구)

  • Kang, Yong-Hyeog
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.75-81
    • /
    • 2018
  • Anonymity and privacy issues are becoming important as all transactions in the blockchain are open to users. Public blockchains appear to guarantee anonymity by using public-key addresses on behalf of users, but they can weaken anonymity by tracking with various analytic techniques based on transaction graph. In this paper, we propose a scheme to protect anonymity and privacy by converging various security techniques such as k-anonymity, mixing, blind signature, multi-phase processing, random selection, and zero-knowledge proof techniques with incentive mechanism and contributor participation. Through performance analysis, our proposed scheme shows that it is difficult to invade privacy and anonymity through collusion attacks if the number of contributors is larger than that of conspirators.

Zero-Knowledge Nominative Signatures (영지식 수신자 지정 서명방식)

  • 김승주
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.1
    • /
    • pp.15-24
    • /
    • 1996
  • In this paper, we propose a new kind of signature scheme, called 'nominative signatures&, which is the dual scheme of undeniable signatures. Also we construct a zero-knowledge protocol that implements it. The new technique called 'nominative signatures' achieves these objectives: only nominee can verity the nominator(signer)'s signature and if necessary, only nominee can prove to the third party that the signature is issued to him(her) and is valid. Contraty to the undeniable signature scheme, nominative signatures are confirmed via a protocol between the nominee and the third party, so the cooperation of the nominee is necessary. That is, not a signer(nominator) but a verifier(nominee) can control the abuse of signatures - undeniable signature cannot be verified without the cooperation of the signer, so the signer controls the abuse of signatures. Our nominative signatures are very valuable for the case in which the content of signature is concerned with the verifier's privacy.

A Study on Privacy Protection Technology based on Blockchain and Zero Knowledge Proof (블록체인과 영지식 증명에 기반한 프라이버시 보호 기술 연구)

  • Kwang Kyu Lee
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.95-102
    • /
    • 2023
  • As the utilization value of personal information increases, discussions on how to provide personal information are active, but information required by institutions to utilize personal information is being exposed more than necessary. Therefore, personal privacy protection is essential to overcome the problems and limitations of personal information protection. In this study, a decentralized identity information management model that overcomes the problems and limitations of the centralized identity management method of personal information and manages and selectively provides personal information by the information owner himself and demonstrates the excellence of personal information by implementing the Smart Personal Information Provision System (SPIPS) in the PBFT consensus algorithm through experiments.

An Efficient PSI-CA Protocol Under the Malicious Model

  • Jingjie Liu;Suzhen Cao;Caifen Wang;Chenxu Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.720-737
    • /
    • 2024
  • Private set intersection cardinality (PSI-CA) is a typical problem in the field of secure multi-party computation, which enables two parties calculate the cardinality of intersection securely without revealing any information about their sets. And it is suitable for private data protection scenarios where only the cardinality of the set intersection needs to be calculated. However, most of the currently available PSI-CA protocols only meet the security under the semi-honest model and can't resist the malicious behaviors of participants. To solve the problems above, by the application of the variant of Elgamal cryptography and Bloom filter, we propose an efficient PSI-CA protocol with high security. We also present two new operations on Bloom filter called IBF and BIBF, which could further enhance the safety of private data. Using zero-knowledge proof to ensure the safety under malicious adversary model. Moreover, in order to minimize the error in the results caused by the false positive problem, we use Garbled Bloom Filter and key-value pair packing creatively and present an improved PSI-CA protocol. Through experimental comparison with several existing representative protocols, our protocol runs with linear time complexity and more excellent characters, which is more suitable for practical application scenarios.

A Construction Method of Expert Systems in an Integrated Environment

  • Chen, Hui
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.211-218
    • /
    • 2001
  • This paper introduces a method of constructing expert systems in an integrated environment for automatic software design. This integrated environment may be applicable from top-level system architecture design, data flow diagram design down to flow chart and coding. The system is integrated with three CASE tools, FSD (Functional Structure Diagram), DFD (Data Flow Diagram) and structured chart PAD (Problem Analysis Diagram), and respective expert systems with automatic design capability by reusing past design. The construction way of these expert systems is based on systematic acquisition of design knowledge stemmed from a systematic design work process of well-matured developers. The design knowledge is automatically acquired from respective documents and stored in the respective knowledge bases. By reusing it, a similar software system may be designed automatically. In order to develop these expert systems in a short period, these design knowledge is expressed by the unified frame structure, functions of th expert system units are partitioned mono-functions and then standardized components. As a result, the design cost of an expert system can be reduced to standard work procedures. Another feature of this paper is to introduce the integrated environment for automatic software design. This system features an essentially zero start-up cost for automatic design resulting in substantial saving of design man-hours in the resulting in substantial saving of design man-hours in the design life cycle, and the expected increase in software productivity after enough design experiences are accumulated.

  • PDF

Factors Influencing the Price Acceptability and Cognitive Dissonance for the Purchaser of Digital Knowledge Goods (디지털 지식상품의 가격수용도와 구매인지부조화 영향요인에 관한 연구)

  • Jeong, Dae-Yul
    • The Journal of Information Systems
    • /
    • v.22 no.4
    • /
    • pp.85-115
    • /
    • 2013
  • Digital knowledge and information goods as experience goods have some unique characteristics such as close to zero reproduction and distribution cost, high price volatility, and low price acceptability. For the reasons, the pricing policies of digital knowledge goods are very difficult and complicate. Also, most consumers of digital goods have experienced cognitive dissonance after buying decision. The purpose of this paper is to investigate what factors affect the price acceptability level and cognitive dissonance of digital knowledge goods buyers. This paper suggest a structural model that was established by the cognitive dissonance theory and S-O-R(Stimulus-Organization-Response) model. The model is consisted of four exogenous variables and three endogenous variables. The empirical test and statistical analysis suggest following results and practical implications. The variables such as product involvement and perception of price fairness that have positive roles to price acceptability have strong influence on the all the three endogenous variables. But the variables such as sale proneness and price mavenism that have negative roles to price acceptability have little influence on the all the three endogenous variables. In the model, the payment intention was very important mediating variable between exogenous variables and two dependent variables, ie. price acceptability and cognitive dissonance. These results imply that the digital knowledge portals must have some differentiated pricing policies to the customers who have price consciousness and price mavenism. Also, they need some special promotions to whom have positive attitude to the value of digital goods.

Thre Relationaship of Scientific Knowledge and Ethical Value in Environmental Education (환경교육에서 과학적 지식과 윤리적 가치의 관계)

  • 김정호
    • Hwankyungkyoyuk
    • /
    • v.10 no.2
    • /
    • pp.51-62
    • /
    • 1997
  • The objective of this study was to review the meaning and problems of Scientific Knowledge and Ethical Value in Environmental Education. The ultimate goal of environmental education is shaping proenvironmental human behavior. The factors of human behavioral decision making are ideology, value, attitude and behavioral intentions. Ideology is a kind of belief system used by social groups to interpret their social world. The main elements of belief system are knowledge and value. The traditional thinking in education has been that we can change behavior by making human beings more knowledgeable and more valuable. In environmental education, the aim of scientific inquiry is to analysis cause-effect relation of human beings behavior and environmental phenomenon, and ethical education is to change the mind of human beings from zero-sum to positive-sum about the relations between human beings and natural environments. But, there are many problems of knowledge education and value education in environmental education. For example scientific knowledge without ethical value is dangerous to environment protection, and ethical value without scientific knowledge is vague. Therefore, we must recognize that the relationship of ethical value and scientific knowledge is not substitutional but complementary. The teaching-learning methods which can integrate knowledge and value in environmental education are rational decision making model. For this model, we can construct teaching contents with inquiry materials. To earn the benefits of specialization among several subjects in environmental education, social studies can focus on social science knowledge and decision making, science education can focus on pure natural science knowledge and scientific investigation, moral education can focus on problems of ethical value system, home economics can focus on practical action and environmental education(Environments in middle school, Ecology and Environments in high school) can integrate social-national science knowledge and ethical value in broad perspective about human beings and ecosystem. That is the method to protect from law of diminishing marginal utility of learning in environmental education.

  • PDF