• Title, Summary, Keyword: 비밀분산

Search Result 114, Processing Time 0.05 seconds

A New Universally Verifiable and Receipt-free Electronic Voting Scheme Using Only One-way Untappable Channels (일방향 도청 불가능한 채널만을 이용하여 전체검증과 매표방지를 제공하는 새로운 전자선거 기법)

  • 조진현;김상진;오희국
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.49-61
    • /
    • 2003
  • Electronic voting schemes must provide universal verifiability and receipt-freeness, as well as basic properties such as privacy, eligibility, to make the election fair and transparent. But it is difficult to provide both universal verifiability and receipt-freeness because they are mutually contradictory in their objective. To date, most electronic voting schemes provide only one of these properties and those few that provide both properties are not practical due to heavy computational load. In this paper, we present an efficient electronic voting scheme that provides both properties. The proposed scheme uses a trusted third party called HR(Honest Randomizer) and requires only one-way untappable channels from HRs to voters. Among the schemes that assume only one-way untappable channel this scheme requires the least amount of computation. Among the schemes that provide both properties, this scheme uses the weakest physical assumption. We also discuss the security of the system and compare our scheme with other related schemes.

품질관리표본(Quality Control Sample)의 리인터뷰에 의한 사업체조사의 응답오차 측정

  • Kim, Seol-Hui;Park, Hyeon-Yeong
    • Proceedings of the Korean Statistical Society Conference
    • /
    • /
    • pp.53-58
    • /
    • 2003
  • 최근 경제 사회의 급속한 발전에 따라 개인의 활동분야가 다양해지고 개인비밀보호 인식이 커지면서 응답자들이 통계조사에 잘 협조하지 않는 경우가 늘어나고 있다. 따라서 대부분의 통계를 현장조사에 의존하여 생산하고 있는 통계청에서는 현장조사 결과물의 품질상태에 좀 더 관심을 가져야만 하게 되었다. 이러한 현장조사에 대한 풀질관리의 일환으로 현재 통계청에서는 통계별 조사대상으로부터 품질관리표본(Quality Control Sample)을 추출하고 이를 대상으로 리인터뷰를 실시함으로써 응답오차측정, 조사현장의 실터파악, 응답자 의견수렴 등에 활용하고 있다. 리인터뷰는 조사직원의 고의적인 자료조작 또는 보충교육 필요성 등 현장조사업무를 평가하거나 응답분산(simple response variation), 응답편의(response bias) 등을 산출하고, 이를 분석하는 모델을 이용하여 응답결과의 신뢰도를 분석하는데 목적을 두고 있다. 본 연구에서는 품질관리표본(QC Sample) 설계 및 추출, 리인터뷰 시나리오개발, CATI(Computer Assisted Telephone Interviewing)를 이용한 리인터뷰 기법 등을 통계청 사업체조사 모니터링 사례를 중심으로 설명하고 조사직원 특성별 응답오차 측정 및 비교, 정확성 항목에 대한 차이분석 등 격과에 대하여 논하고자 한다.

  • PDF

Security Interoperation of Network Management Systems using Role Lattices (역할 격자구조를 이용한 망관리 시스템들의 보안 상호운용)

  • Seo, Jae-Hyeon;Kim, Tae-Yeon;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.7
    • /
    • pp.1822-1833
    • /
    • 1996
  • As the size and complexity of networks increase, it is difficult to manage the whole network using single network manager, thus it is more resonable to manage the network using several network managers distributed on the network. Security interoperability should be supported among network management systems (NMSs)that use different management policies. In this paper, an algorithm that makes it posible to take a role into a role lattices is suggested to provide security interoperability among NMSs that have their own role lattices. In addition, security constraints are proposed to maintain the confidentiality and integrity of information by dynamically modifying the access rights of roles as the state of a system changes. Also, the security constraints are expressed using ECA rules in this paper.

  • PDF

A Study on the Sustainable Measures and the Full Use of the SIHWA-LAKE Development Project (SLDP) (지속가능한 시화호의 대책과 활용방안들에 관한 고찰)

  • Kim, Hee-Sam;Cho, Jai-Rip
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • /
    • pp.367-374
    • /
    • 2006
  • 시화호 개발 시점은 1975년 농업진흥공사가 시화호 유역을 간척농지로 개발한다는 계획을 수립한 시점부터 잡을 수 있으나 건설교통부가 이 지역을 반월특수지역 개발구역으로 지정한 1986년 9월 27일로 보는 것이 타당할 것으로 본다. 1986년에 정부가 그렇게 지정한 목적은 이 지역을 방조제로 막아서 담수호를 만들어 농업용수를 공급하고 농지 조성과 수자원 확보를 기한다는 목적 및 그에 따른 수도권 인구 분산 및 도서 지역 균형 개발을 이루겠다는 것이었다. 그러나 1995년 4월 2억4천백85만 톤의 썩은 시화호 물을 서해로 당류하고 바닷물을 유입한 이래 2001년 2월 정부가 다시 해수호로 인정하기까지 이 호수는 숟한 우여 곡절과 정부의 잦은 정책 변경으로 자연 환경이 파괴되었으며 생태계 변화에 따른 인근 지역과 농작물에 많은 피해를 보았고 염색 공단에서 흘러나온 폐수로 인해 악취를 풍기는 등 오염이 심각해 완전히 실패로 돌아간 '환경실패대작'이라고 할 수 있다. 이렇게 된 데는 정책 집행 과정에서 환경오염 저해 요인에 대한 무사 안일한 대처, 비밀주의, 철저하지 못한 오폐수의 단속 등 정부 폭의 실책을 우선해서 말할 수 있다. 본 논문에서는 이런 것을 포함해서 시화호가 실패하게 된 여타 중요 요인에 대해서 알아보고 또 지속 가능한 활용방안 및 대책에 대해서 간략히 알아보고자 한다.

  • PDF

ID-Based Group Key Management Protocols for Dynamic Peer Groups (피어 그룹을 위한 ID 기반의 그룹키 관리 프로토콜)

  • Park, Young-Ho;Lee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.922-933
    • /
    • 2004
  • In recent years, peer-to-peer network have a greate deal of attention for distributed computing or collaborative application, and work of ID-based public key systems have been focusing on the area of cryptography. In this paper, we propose ID-based group key management protocols for secure communication in autonomous peer group. Each member obtains his public/private key pair derived from his identification string from Private Key Generator. No central server participates in group key management protocol instead, all group members share the burden of group key management by the collaboration of themselves, so that our scheme avoids the single point of failure problem. In addition, our scheme considers the nature of dynamic peer group such as frequent joining and leaving of a member.

  • PDF

A Design of Certificate Password Recovery Using Decentralized Identifier (DID를 사용한 인증서 암호 복구)

  • Kim, Hyeong-uk;Kim, Sang-jin;Kim, Tae-jin;Yu, Hyeong-geun
    • Journal of Venture Innovation
    • /
    • v.2 no.2
    • /
    • pp.21-29
    • /
    • 2019
  • In the public certificate technology commonly used in Korea, users have a cumbersome problem of always resetting when they forget their password. In this paper, as a solution to this problem, we propose a secure authentication certificate password recovery protocol using blockchain, PKI, and DID for distributed storage. DID is a schema for protecting block ID in blockchain system. The private key used in the PKI is configured as a user's biometric, for example, a fingerprint, so that it can completely replace the memory of the complex private key. To this end, based on the FIDO authentication technology that most users currently use on their smartphones, the process of authenticating a user to access data inside the block minimizes the risk of an attacker taking over the data.

Privacy Amplification of Correlated Key Decryption over Public Channels (공개 채널을 통한 상관 키 분산 암호화의 프라이버시 증폭)

  • Lee, Sun-Yui;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.73-78
    • /
    • 2018
  • In this paper, we consider a system where multiple sources are encrypted in separated nodes and sent through their respective public communication channels into a joint sink node. We are interested at the problem on protecting the security of an already existing system such above, which is found out to have correlated encryption keys. In particular, we focus on finding a solution without introducing additional secret keys and with minimal modification to minimize the cost and the risk of bringing down an already running system. We propose a solution under a security model where an eavesdropper obtains all ciphertexts, i.e., encrypted sources, by accessing available public communication channels. Our main technique is to use encoders of universal function to encode the ciphertexts before sending them to public communication channels.

A Study on Schemes to Case Analysis and Cope with Online Game Crimes (온라인 게임범죄의 사례분석과 대응방안)

  • Yoo Yong-Bong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.9
    • /
    • pp.85-97
    • /
    • 2006
  • Schemes to case analysis and cope with on-line game crimes net supervision system, a real name confirmation process, and a self-examination system to check by themselves if they are addicted to on-line games with a view to prevent the addiction. In addition, this study found that general precuations should comprise measures to change the awareness of the users of the internet and to establish their ethical senses because most on-line garners are not aware that their actions are a crime and believe their crimes are not disclosed to the outsiders.

  • PDF

An Embodiment of High Energy Physics Data Grid System (고에너지물리 데이타 그리드 시스템의 구현)

  • Cho Ki-Hyeon;Han Dae-Hee;Kwon Ki-Hwan;Kim Jin-Cheol;Yang Yu-Chul;Oh Young-Do;Kong Dae-Jung;Suh Jun-Suhk;Kim Dong-Hee;Son Dong-Chul
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.7
    • /
    • pp.390-398
    • /
    • 2006
  • The objective of the High Energy Physics(HEP) is to understand the basic properties of elementary particles and their interactions. The CMS(Compact Muon Solenoid) experiment at CERN which will produce a few PetaByte of data and the size of collaboration is around 2000 physicists. We cannot process the amount of data by current concept of computing. Therefore, an area of High Energy Physics uses a concept of Tier and Data Grid. We also apply Data Grid to current High Energy Physics experiments. In this paper, we report High Energy Physics Data Grid System as an application of Grid.

A Statistical Approach for Improving the Embedding Capacity of Block Matching based Image Steganography (블록 매칭 기반 영상 스테가노그래피의 삽입 용량 개선을 위한 통계적 접근 방법)

  • Kim, Jaeyoung;Park, Hanhoon;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.22 no.5
    • /
    • pp.643-651
    • /
    • 2017
  • Steganography is one of information hiding technologies and discriminated from cryptography in that it focuses on avoiding the existence the hidden information from being detected by third parties, rather than protecting it from being decoded. In this paper, as an image steganography method which uses images as media, we propose a new block matching method that embeds information into the discrete wavelet transform (DWT) domain. The proposed method, based on a statistical analysis, reduces loss of embedding capacity due to inequable use of candidate blocks. It works in such a way that computes the variance of each candidate block, preserves candidate blocks with high frequency components while reducing candidate blocks with low frequency components by compressing them exploiting the k-means clustering algorithm. Compared with the previous block matching method, the proposed method can reconstruct secret images with similar PSNRs while embedding higher-capacity information.