• Title, Summary, Keyword: 회의키

Search Result 93, Processing Time 0.028 seconds

The Smart Contract based Conference Key Distribution Scheme (스마트계약 기반 회의용 키 분배 기법)

  • Yun, Sunghyun
    • Journal of The Korea Internet of Things Society
    • /
    • v.6 no.4
    • /
    • pp.1-6
    • /
    • 2020
  • Recently, epidemic of covid-19 causes rapid increase in demand for untact video conferences. In existing server-client based video conference systems such as Zoom, Google Meet, etc., the server generates the conference key and controls the access rights of meeting members and their contents with it. In this case, the server can fabricate or repudiate the meeting. So, the privacy of the meeting members is not guaranteed. It's necessary to make the conference key distribution scheme where all participants can verify the trustfulness without help of the server. The smart contract is the program stored to the blockchain. Its contents cannot be altered due to the property of the blockchain, and everybody can verify the execution results of it. In this study, we propose the smart contract based conference key distribution scheme. The proposed scheme is consisted of smart contract deployment, conference key generation and verification stages. The smart contract replaces the role of existing trustful server and the meeting members can generate the conference key according to the protocols implemented on it. The proposed scheme can be applied to the video conference systems and only the meeting members can access the conference key.

Application of Block Design for an Efficient Conference Key Distribution System (효율적인 회의용 키분배 시스템을 위한 Block Design의 응용)

  • Lee, Tae-Hun;Jeong, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.3
    • /
    • pp.271-276
    • /
    • 2001
  • 회의용 키분배 시스템은 회의용 키를 생성하여 키를 회의에 참석하고 있는 사람에게만 전달하여 서로간에 안전하게 통신하도록 한다. 본 논문에서는 Block Design의 한 분류인 symmetric balanced incomplete block design(SBIBD)를 적용한 효율적인 회의용 키분배시스템을 제안한다. 회의용 키를 생성하고 개인식별 정보를 근거로 하여 인증을 수행하는 통신 프로토콜이 설계된다. 제안된 프로토콜은 회의용 키를 생성하는 메시지의 복잡도를 최소화시키는데, SBIBD의 특별한 분류에서는 참석자의 수 v에 따라 메시지 복잡도는 O(v√v)가 된다. 보안시스템의 구현에서 중요한 요소인 프로토콜의 안전성은 factoring과 discrete logarithm을 계산할 정도로 난해하여 충분히 보장됨을 증명할 수 있다.

  • PDF

Efficient Fault-Tolerant Conference-Key Agreement using ID-based One Round Tripartite Key Agreement Protocol (아이디 기반의 일 라운드 삼자 간 키 합의 프로토콜을 이용한 효율적인 결함 허용 회의 키 합의 방법)

  • Lee, Sang-Ho;Kim, Jong;Hong, Sung-Je
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.5
    • /
    • pp.512-516
    • /
    • 2008
  • A conference-key agreement protocol is essential for computer network conferences that need secure communications. Especially, the fault-tolerant conference-key agreement can make a shared conference-key even if some make conferees disturb the key agreement processes. However, the performance of the previous fault-tolerant conference-key agreement protocols is decreasing significantly when the number of fake conferees is increasing. In this paper, we propose an efficient fault-tolerant conference key agreement protocol. Our scheme is based on the ID-based one round tripartite conference key agreement protocol. Simulation results show our scheme's efficiency against Yi's method especially when the number of fake conferees is large.

Design and Implementation of Public key-based Video Conference System for Authentication and Encryption (공개키기반 사용자인증과 암호화를 적용한 영상회의 시스템 설계 및 구현)

  • Jung Yong-Deug;Lee Sang-Hun;Jin Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7
    • /
    • pp.971-980
    • /
    • 2004
  • This paper describes the design and implementation of the video conferencing system using public key infrastructure which is used for user authentication and encryption. Public key infrastructure reinforces the authentication process for conference participant, and the symmetric key system blocks malicious access to information and protect conference control information. This paper shows the implementation of the trans portation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric encryption algorithm (DES, 3DES and AES) for media stream encryption. In this paper, we deal with two ways of protecting information : transportation layer secure protocol secures user authentication process and the conference control information; while public key-based authentication system protects personal information of users when they connect to the network. When distributing the session keys for encryption, Internet Key Exchange is used for P2P communication, and secure protocol is employed for 1 : N multi-user communication in the way of distributing the public key-based en-cryption key.

'규칙따르기 역설'에 대한 크립키 논증의 비판적 분석

  • Park, Man-Yeop
    • Korean Journal of Logic
    • /
    • v.9 no.1
    • /
    • pp.97-136
    • /
    • 2006
  • 비트겐슈타인의 규칙따르기 개념에 대한 올바른 이해는 그의 후기 철학의 궤적을 살피는데 있어서 중요하다. 비트겐슈타인의 규칙따르기 문제에 대해 회의적 해석으로 유명한 크립키는 "탐구"의 201절을 문제 삼으며 '역설'의 문제를 새로운 형식의 철학적 회의주의로 간주했다. 본 논문은 규칙의 역설에 대한 크립키의 논증이 비트겐슈타인의 관점과 무엇 때문에 충돌하는지를 밝히면서 그와 함께 비트겐슈타인이 '규칙의 역설'을 제시한 궁극적 이유를 규명하는데 있다. 규칙의 역설에 대한 크립키 논증의 의의와 한계를 비판적으로 다룸으로서 필자는 다음과 같은 점을 주장할 것이다. 비트겐슈타인에게 있어서 규칙은 우리들의 행동을 이끄는 지침의 역할을 하며, 규칙의 문제를 추론과 연관시켜 수학이 엄격한 규칙을 따르는 인간의 지적 활동이며, 규칙에 대한 비트겐슈타인의 관점은 귀납적 회의주의와 무관하다. 이런 맥락에서 비트겐슈타인을 회의주의자 혹은 상대주의자로 평가하는 것은 문제가 있다. 그런 점에서 비트겐슈타인은 오히려 어떤 이론이나 선입견에 사로잡히지 않은 봄의 방식을 강조한 철학자로 평가하는 것이 옳다.

  • PDF

The Design of Conference-based Authentication Mechanism Employing the Symmetric Balanced Incomplete Block Design on IMT-2000 Environment (IMT-2000환경에서 Symmetric Balanced Incomplete Block Design을 응용한 회의용 인증메커니즘의 설계)

  • 배용근;정일용
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.7
    • /
    • pp.1277-1285
    • /
    • 2003
  • In this paper, we present a conference key authentication mechanism by employing an algebraic method on IMT-2000 environment. To accomplish this, the symmetric balanced incomplete block design is applied for generating a conference key and then this key is distributed to participants. Through the technique for creation of a conference key and mutual authentications peformed based on identification information, a communication protocol is designed. The protocol proposed minimizes the communication complexity for generating a conference key. On a special case the complexity is O(equation omitted), where v is the number of participants. The security of the mechanism, which is a significant problem in construction of secure systems, can be assured since finding discrete logarithms is generally a hard problem.

  • PDF

Conference Key Agrement Protocol for Multilateral Remote Conference Employing a SBIBD Network (SBIBD 네트워크에서 다자간 원격회의를 위한 회의용 키 생성 프로토콜)

  • Kim, Seong-Yeol;Kim, Dong-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.4
    • /
    • pp.265-269
    • /
    • 2009
  • A conference key agreement system is a scheme to generate a session key in a contributory manner in order to communicate with each other securely among participants. In this paper an efficient conference key agreement system is proposed by employing symmetric balanced incomplete block design(SBIBD), one class of block designs. The protocol presented not only minimizes the message overhead and message exchanging rounds but also makes every participant contribute evenly for generating a conference key. Our protocol constructs a conference key which takes modified Diffe-Helman form of ${\prod}_{i=0}^{v-1}R_i$, where v is the number of participants and $R_i$ is a random number generated from member i. In a special class of SBIBD, it takes only 3 rounds message exchange and message overhead is $O(v{\sqrt{v}})$. Our protocol can be proved as computationally difficult to calculate as discrete logarithms.

  • PDF

Kripke vs. Wittgenstein on the Notion of Rule-Following and Semantic Contextualism (규칙 따르기에 관한 크립키와 비트겐슈타인의 상반된 견해와 맥락주의적 의미론)

  • Oh, Onyoung
    • Korean Journal of Logic
    • /
    • v.19 no.1
    • /
    • pp.49-82
    • /
    • 2016
  • In this paper, I argue that it is Kripke's Tractarian notion of rule-following that prevents him from giving a non-skeptical (straight) solution to Wittgenstein's paradox. I characterize the Tractarian notion of rule-following as the 'determinate/infinistic' notion of rule-following. The later Wittgenstein, however, advocates an opposite notion of rule-following: the 'indeterminate/finistic' notion. Considering the later Wittgenstein's context-sensitive, pragmatics-oriented approach to meaning and rule-following, the later Wittgenstein could not have endorsed the determinate/infinistic notion of rule-following. To the contrary, a motive behind Wittgenstein's skeptical paradox was to blame the Tractarian notion of rule-following as the major culprit giving rise to the paradox. At the end, I argue that Kripke's adherence to the Tractarian-correspondence theory of truth also contributes to his failure to offer a non-skeptical solution to the paradox. If Kripke had noticed that the later Wittgenstein was a deflationist about truth, he could have avoided his skeptical conclusion.

  • PDF

Identity-based key distribution system and conference key distribution system (ID-Based 키 분비방식 및 회의용 키 분배방식)

  • 손기욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.38-46
    • /
    • 1991
  • This paper pro poses a ley distribution system based on identification information. The system uses an indivdual user's identification instead of the public file used in the Diffie-Hellman sustem. It does not require any services of a center to distribute work keys and users to keep directory public file. We propose an identity-based key distribution system for generating a commom secret conference kdy for two or more users. We assume users are connected in a ring network. Message among users authenticated using each user's identification informa-tion. The security of the our proposed system is based on the difficulty of both factoring large numbers and computing discrete logarithms over large finite fields.

  • PDF

Implementation of Authentication and Encryption of Multimedia Conference based on H.235 (H.235에 기반한 영상회의 시스템의 인증 및 암호화 구현)

  • 심규복;이건배;성동수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • /
    • pp.718-720
    • /
    • 2001
  • 본 논문에서는 ITU-T 영상회의 프로토콜 표준안(H.323)에서 보안 프로토콜로 권고된 H.235를 기반으로 하여 사용자 인증, 비디오 및 오디오 데이터의 암호화, 암호키의 보호에 대하여 구현한다. 인증 방법으로는 패스워드 기반의 대칭키 암호 인증을 사용하고, 비디오 및 오디오 데이터의 암호화에 사용되는 암호키의 보호를 위해서는 DES와 Diffie-Hellman의 키 분배 방법을 사용한다. 또한, DES를 사용한 비디오 및 오디오 데이터의 암호화/복호화를 보여준다.

  • PDF