• Title/Summary/Keyword: A key technique

Search Result 1,740, Processing Time 0.025 seconds

Certificateless Public Key Encryption Revisited: Security Model and Construction (무인증서 공개키 암호 기법의 재고: 안전성 모델 및 설계)

  • Kim, Songyi;Park, Seunghwan;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1109-1122
    • /
    • 2016
  • Certificateless public key cryptography is a technique that can solve the certificate management problem of a public key cryptosystem and clear the key escrow issue of ID-based cryptography using the public key in user ID. Although the studies were actively in progress, many existing schemes have been designed without taking into account the safety of the secret value with the decryption key exposure attacks. If previous secret values and decryption keys are exposed after replacing public key, a valid private key can be calculated by obtaining the partial private key corresponding to user's ID. In this paper, we propose a new security model which ensures the security against the key exposure attacks and show that several certificateless public key encryption schemes are insecure in the proposed security model. In addition, we design a certificateless public key encryption scheme to be secure in the proposed security model and prove it based on the DBDH(Decisional Bilinear Diffie-Hellman) assumption.

An Individual Privacy Protection Design for Smart Tourism Service based on Location (위치 기반 스마트 관광 서비스를 위한 개인 프라이버시 보호 설계)

  • Cho, Cook-Chin;Jeong, Eun-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.439-444
    • /
    • 2016
  • This paper proposes the technique to protect the privacy of those who uses Smart Tourism Service based on location. The proposed privacy protection technique (1) generates a shared private key, OTK(One Time Key) without information exchanging Users with a Tourism Server and provides Users and a Tourism Server with message confidentiality by encrypting data with the key, (2) concatenates users' ID, login time(timestamp), and randomly-generated nonce, generates OTK by hashing with a hash function, encrypts users' location information and query by using the operation of OTK and XOR and provides Users and a Tourism Server with message confidentiality by sending the encrypted result. (3) protects a message replay attack by adding OTK and timestamp. Therefore, this paper not only provides data confidentiality and users' privacy protection but also guarantees the safety of location information and behavior pattern data.

Task failure resilience technique for improving the performance of MapReduce in Hadoop

  • Kavitha, C;Anita, X
    • ETRI Journal
    • /
    • v.42 no.5
    • /
    • pp.748-760
    • /
    • 2020
  • MapReduce is a framework that can process huge datasets in parallel and distributed computing environments. However, a single machine failure during the runtime of MapReduce tasks can increase completion time by 50%. MapReduce handles task failures by restarting the failed task and re-computing all input data from scratch, regardless of how much data had already been processed. To solve this issue, we need the computed key-value pairs to persist in a storage system to avoid re-computing them during the restarting process. In this paper, the task failure resilience (TFR) technique is proposed, which allows the execution of a failed task to continue from the point it was interrupted without having to redo all the work. Amazon ElastiCache for Redis is used as a non-volatile cache for the key-value pairs. We measured the performance of TFR by running different Hadoop benchmarking suites. TFR was implemented using the Hadoop software framework, and the experimental results showed significant performance improvements when compared with the performance of the default Hadoop implementation.

Efficient Session Management mechanism applied Key Recovery technique in IPSec (IPSec에서 키 복구 기술을 적용한 효율적인 연결 관리 메커니즘)

  • Kim, Jeong-Beom;Lee, Yun-Jeong;Park, Nam-Seop;Kim, Tae-Yun
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.775-782
    • /
    • 2001
  • Recently the use of Linux OS is increasing to tremendous figures. But due to the fact that Linux is distributed on an open-source policy, the need of security is an upcoming question which leads to widespread development of security on a Linux based environment. Cryptography, however, can cause various problems because of difficulty of key management. A lot of researchers have been concentrating on the key recovery technique to eliminate the reverse effect of using these kinds of security and to promote positive aspects of using it. In this thesis I am suggesting an mechanism based on the key recovery technique, as a method to save time in recovery and resetting a disconnection between two end-users through IPSec (IP Security) protocols in a VPN (Virtual Private Network) environment. The main idea of the newly suggested mechanism, KRFSH (Key Recovery Field Storage Header), is to store the information of the session in advance for the case of losing the session information essential to establish a tunnel connection between a SG and a host in the VPN environment, and so if necessary to use the pre-stored information for recovery. This mechanism is loaded on the IPSec based FreeS/WAN program (Linux environment), and so the VPN problem mentioned above is resolved.

  • PDF

A High Performance Interleaved Bridgeless PFC for Nano-grid Systems

  • Cao, Guoen;Lim, Jea-Woo;Kim, Hee-Jun;Wang, Huan;Wang, Yibo
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.3
    • /
    • pp.1156-1165
    • /
    • 2017
  • A high performance interleaved bridgeless boost power factor correction (PFC) rectifier operating under the critical current conduction mode (CrM) is proposed in this paper to improve the efficiency and system performance of various applications, such as nano-grid systems. By combining the interleaved technique with the bridgeless topology, the circuit contains two independent branches without rectifier diodes. The branches operate in interleaved mode for each respective half-line period. Moreover, when operating in CrM, all the power switches take on soft-switching, thereby reducing switching losses and raising system efficiency. In addition, the input current flows through a minimum amount of power devices. By employing a commercial PFC controller, an effective control scheme is used for the proposed circuit. The operating principle of the proposed circuit is presented, and the design considerations are also demonstrated. Simulations and experiments have been carried out to evaluate theoretical analysis and feasibility of the proposed circuit.

A Multi-Indexes Based Technique for Resolving Collision in a Hash Table

  • Yusuf, Ahmed Dalhatu;Abdullahi, Saleh;Boukar, Moussa Mahamat;Yusuf, Salisu Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.339-345
    • /
    • 2021
  • The rapid development of various applications in networking system, business, medical, education, and other domains that use basic data access operations such as insert, edit, delete and search makes data structure venerable and crucial in providing an efficient method for day to day operations of those numerous applications. One of the major problems of those applications is achieving constant time to search a key from a collection. A number of different methods which attempt to achieve that have been discovered by researchers over the years with different performance behaviors. This work evaluated these methods, and found out that almost all the existing methods have non-constant time for adding and searching a key. In this work, we designed a multi-indexes hashing algorithm that handles a collision in a hash table T efficiently and achieved constant time O(1) for searching and adding a key. Our method employed two-level of hashing which uses pattern extraction h1(key) and h2(key). The second hash function h2(key) is use for handling collision in T. Here, we eliminated the wasted slots in the search space T which is another problem associated with the existing methods.

A study of display technique and display organization system for experience display of science technique - Focused on experience display of up-to-date science technique(NT, MEMS, BT) - (첨단과학기술 체험전시를 위한 연출기법 및 전시구성체계에 관한 연구 - 첨단과학분야(NT, MEMS, BT)의 체험전시를 중심으로 -)

  • Song, Hyun-Mi;Choi, Jun-Hyuck;Lim, Che-Zinn
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2005.05a
    • /
    • pp.182-186
    • /
    • 2005
  • The purpose of this research is to develop subject of up-to-date scientific technology, according with science museum, and to deviate from the old style, simply-seeing display, and the passive display which simply support narrative styles by one-way action. In addition, for motivating audience to take part in the display, this study is to analyze displaying technique, key marks of an exhibit and then to create the way which science museum should follow in order to plan interactive scenario and display technique. By analysis and consideration of museums, which I took for a sample, this study will work out display scenario, based on interactive concept, and experience display technique. Moreover, this study will suggest alternatives and basis in order to develop display technique of up-to-date science in science museum.

  • PDF

A Study on the Evaluation Model of Government-funded Research Institutes Using AHP (AHP를 이용한 정부출연연구소 평가 모형 연구)

  • Son, Eun Il;Baek, Chang Hwa
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.4
    • /
    • pp.665-677
    • /
    • 2022
  • Purpose: The purpose of this study is to analyze the current status and investigate relevant indicators so that R&D performance evaluation suitable for government-funded research institutes can proceed. A suitable performance evaluation model was presented based on the surveyed indicators. Based on the presented performance evaluation model, the importance was analyzed to calculate the weight for each indicator of the performance evaluation model. Methods: The method applied in this study presented a performance evaluation model based on the organizational performance evaluation cases of advanced overseas countries. By using the AHP(Analytic Hierarchy Process) technique, the weight of each indicator of the performance evaluation model was studied. Results: As a result of examining the indicators necessary for the evaluation model, focusing on overseas cases, 13 evaluation items were derived. A weight was calculated for the importance of the study results. And the scientific/technical research results showed the highest excellence. Conclusion: Key indicators of performance evaluation suitable for government-funded research institutes were derived and presented through detailed modeling in three stages. A realistic model that can objectively evaluate the performance of government-funded research institutes was proposed using the AHP technique.

A Study on the Key Performance Factors of Passenger Airbag and Injury Risk Prediction Technique Development (동승석 에어백 핵심 성능 인자 및 상해위험도 예측 기법 개발에 대한 연구)

  • Park, Dongkyou
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.21 no.5
    • /
    • pp.130-135
    • /
    • 2013
  • Until now, passenger airbag design is based on the referred car design and many repetitive crash tests have been done to meet the crash performance. In this paper, it was suggested a new design process of passenger airbag. First, key performance factors were determined by analyzing the injury risk effectiveness of each performance factor. And it was made a relationship between injury risk and performance factor by using the response surface model. By using this one, it can be predicted the injury risk of head and neck. Predicted injury risk of optimal design was obtained through this injury risk prediction model and it was verified by FE analysis result within 18% error of head and 9% error of neck. It was shown that a target crash performance can be met by controlling the key performance factors only.

A study on motion capture animation process : Focusing on short animation film 'Drip' (모션 캡처 애니메이션 프로세스 연구 : 단편 애니메이션 'Drip'을 중심으로)

  • kim, Jisoo
    • Journal of Korea Game Society
    • /
    • v.16 no.4
    • /
    • pp.97-104
    • /
    • 2016
  • This study suggests a technique to implement the production of animation by blending between key frame animation and motion capture animation through short animation 'Drip.' It reduced the time taken to produce an animation by not only enabling efficient process management through mutual organic connection but also conducting a process of mutually making up for weak points of key frame animation and motion capture animation. Through this, it was intended to be helpful in efficient animation production by overcoming the limitation of key frame animation and motion capture animation and perceiving and applying a complex process.