• Title/Summary/Keyword: Anonymous

Search Result 431, Processing Time 0.022 seconds

An Anonymous asymmetric public key traitor tracing scheme (익명성을 보장하는 비대칭 공개키 공모자 추적 기법)

  • 최은영;이동훈;홍도원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.49-61
    • /
    • 2004
  • In broadcast encryption schemes, traceability is a useful property to trace authorized subscribers, called traitors, who collude for manufacturing a pirate decoder. Unfortunately, this is usually achieved with a sacrifice of a privacy. Most traitor tracing schemes in the literature have been developed without considering a subscriber's anonymity, which is one of important requirements for electronic marketplaces to offer similar privacy as current marketplace. It would be unsatisfactory for the subscriber to reveal his/her identity to purchase multimedia contents. In this paper we propose an anonymous broadcast encryption scheme, where a user can subscribe anonymously and one purchases multimedia contents without giving a lot of information about his lifestyle, habits, and etc, but anonymity control is provided, i.e., a data supplier can date traitors.

Efficient Anonymous Fingerprinting with Improved Automatic Identification of Redistributors (재분배자의 자동 식별기능을 갖는 효율적인 익명성을 제공하는 핑거프린팅)

  • 정찬주;오수현;양형규;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.47-57
    • /
    • 2000
  • This paper proposes efficient anonymous fingerprinting with improved automatic identification of redistributors in electronic commerce of digital contents. The proposed scheme by Domingos in Eletronic Letters is inefficient in electronic commerce, because of pass numbers in registration protocol and exponential computations in identification protocol. Our scheme is reduced 2-pass in registraton protocol and is required only 1 time exponential computation than his in identification protocol. According to electronic commerce of digital contents used in ordinary life, our schemes values are increased.

Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol (Yong-Lee의 익명 핑거프린팅 프로토콜의 안전성 취약점 및 개선 방안)

  • Sohn, Ki-Wook;Lee, Yun-Ho;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.151-155
    • /
    • 2006
  • In 2005, Yong and Lee proposed a buyer-seller fingerprinting protocol using symmetric and commutative encryptions. They claimed that their protocol was practical and anonymous since they used symmetric and commutative encryptions. However, an attacker can get the content embedded with one or more honest buyers' fingerprints using man-in-the-middle attack. In this letter, we point out the weakness and propose methods for improving to their protocol.

Associations of Spiritual Well-being, Attitude toward Death and Quality of Life among Alcoholics Anonymous (익명의 알코올 중독자의 영적 안녕, 죽음에 대한 태도와 삶의 질의 관련성)

  • Lee, Sangmin;Gang, Moonhee
    • Journal of Korean Academy of Psychiatric and Mental Health Nursing
    • /
    • v.28 no.2
    • /
    • pp.114-123
    • /
    • 2019
  • Purpose: The aim of the study was to investigate associations of spiritual well-being, attitude toward death, and quality of life among Alcoholics Anonymous (AA). Methods: This study was cross-sectional and descriptive in design. The data was collected from August to September 2018 with 133 AA members drawn from two provinces of South Korea. The data were analyzed using descriptive statistics, independent t-tests, one-way ANOVA with Turkey tests, Pearson's correlation coefficients, and hierarchical multiple linear regression analyses using SPSS/WIN 20.0 program. Results: The existential spiritual well-being (β=.52, p<.001), attitude toward death (β=.24, p<.001), dual diagnosis (β=-.17, p=.003), occupation (β=.12, p=.035) of the participants were significant factors, which explained 63.7% of the variance of quality of life. Conclusion: The study findings highlight the need to develop psychological nursing strategies to enhance the spiritual well-being and improve a positive attitude toward death based on the job and dual diagnosis among AA members to improve their better quality of life.

An Efficient Anonymous Authentication and Vehicle Tracing Protocol for Secure Vehicular Communications

  • Park, Young-Shin;Jung, Chae-Duk;Park, Young-Ho;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.6
    • /
    • pp.865-874
    • /
    • 2010
  • Recently, Hao et al. proposed a privacy preservation protocol based on group signature scheme for secure vehicular communications to overcome a well-recognized problems of secure VANETs based on PKI. However, although efficient group signature schemes have been proposed in cryptographic literatures, group signature itself is still a rather much time consuming operation. In this paper, we propose a more efficient privacy preservation protocol than that of Hao et al. In order to design a more efficient anonymous authentication protocol, we consider a key-insulated signature scheme as our cryptographic building block. We demonstrate experimental results to confirm that the proposed protocol is more efficient than the previous scheme.

A Study of the Expressions of the Silhouette in the Fashion Illustrations (패션 일러스트레이션에 나타난 실루엣 표현 연구)

  • Choi, Yoo-Jin;Choi, Jung-Hwa
    • Fashion & Textile Research Journal
    • /
    • v.14 no.2
    • /
    • pp.184-192
    • /
    • 2012
  • This study analyzed silhouette expressions in the fashion illustrations by theory based on results of studying the characteristics of the forms and meanings of the silhouette expressions in art historically. For the actual considering this study collected and categorized fashion illustrations from 1990 to the present limitedly, and clarified the meaning of the silhouette expressions. Those expressions in fashion illustrations were categorized to the 5 items; black & white silhouette, color silhoutte, pattern silhouette, paper silhouette, line silhouette. Silhouette expressions of the fashion illustrations were categorized to 3 items: metaphorical fantasy, essential minimization, anonymous representation.

Anonymous Authentication Framework using Croup Signature (그룹서명을 이용한 익명 인증 구조)

  • Lee, Yun-Kyung;Chung, Byung-Ho;Kim, Jeong-Nyeo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.699-702
    • /
    • 2008
  • 인터넷 이용이 활성화되면서 각종 웹 서버에서의 개인정보 과다 수집 및 노출이 큰 이슈가 되고 있다. 인터넷이 우리 생활에 주는 편리함을 그대로 누리면서 개인정보를 보호할 수 있는 방안으로 익명인증 기술이 있을 수 있다. 익명인증은 익명성을 제공하는 디지털서명을 이용한 인증 방법이다. 익명성을 제공하는 디지털서명 방법은 전자화폐와 전자투표 시스템 등의 응용을 위해서 주로 연구되어 왔으나, 최근에는 인터넷 환경에서 개인정보 보호를 위한 익명인증 방법의 하나로써 연구되고 있다. 본 논문에서는 익명성을 제공하는 전자서명 방법 중 그룹서명 방식에 관하여 소개하고, 그룹서명을 이용한 익명인증 시스템의 구조를 제안하고자 한다.

  • PDF

The TOR Data Communication System

  • Haraty, Ramzi A.;Zantout, Bassam
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.415-420
    • /
    • 2014
  • Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful - one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity - the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR.