• 제목/요약/키워드: Asymmetric Key

검색결과 171건 처리시간 0.034초

Spectrum Hole Utilization in Cognitive Two-way Relaying Networks

  • Gao, Yuan;Zhu, Changping;Tang, Yibin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권3호
    • /
    • pp.890-910
    • /
    • 2014
  • This paper investigates the spectrum hole utilization of cooperative schemes for the two-way relaying model in order to improve the utilization efficiency of limited spectrum holes in cognitive radio networks with imperfect spectrum sensing. We propose two specific bidirectional secondary data transmission (BSDT) schemes with two-step and three-step two-way relaying models, i.e., two-BSDT and three-BSDT schemes, where the spectrum sensing and the secondary data transmission are jointly designed. In the proposed cooperative schemes, the best two-way relay channel between two secondary users is selected from a group of secondary users serving as cognitive relays and assists the bi-directional communication between the two secondary users without a direct link. The closed-form asymptotic expressions for outage probabilities of the two schemes are derived with a primary user protection constraint over Rayleigh fading channels. Based on the derived outage probabilities, the spectrum hole utilization is calculated to evaluate the percentage of spectrum holes used by the two secondary users for their successful information exchange without channel outage. Numerical results show that the spectrum hole utilization depends on the spectrum sensing overhead and the channel gain from a primary user to secondary users. Additionally, we compare the spectrum hole utilization of the two schemes as the varying of secondary signal to noise ratio, the number of cognitive relays, and symmetric and asymmetric channels.

Seismic responses of transmission tower-line system under coupled horizontal and tilt ground motion

  • Wei, Wenhui;Hu, Ying;Wang, Hao;Pi, YongLin
    • Earthquakes and Structures
    • /
    • 제17권6호
    • /
    • pp.635-647
    • /
    • 2019
  • Tests and theoretical studies for seismic responses of a transmission tower-line system under coupled horizontal and tilt (CHT) ground motion were conducted. The method of obtaining the tilt component from seismic motion was based on comparisons from the Fourier spectrum of uncorrected seismic waves. The collected data were then applied in testing and theoretical analysis. Taking an actual transmission tower-line system as the prototype, shaking table tests of the scale model of a single transmission tower and towers-line systems under horizontal, tilt, and CHT ground motions were carried out. Dynamic equations under CHT ground motion were also derived. The additional P-∆ effect caused by tilt motion was considered as an equivalent horizontal lateral force, and it was added into the equations as the excitation. Test results were compared with the theoretical analysis and indicated some useful conclusions. First, the shaking table test results are consistent with the theoretical analysis from improved dynamic equations and proved its correctness. Second, the tilt component of ground motion has great influence on the seismic response of the transmission tower-line system, and the additional P-∆effect caused by the foundation tilt, not only increases the seismic response of the transmission tower-line system, but also leads to a remarkable asymmetric displacement effect. Third, for the tower-line system, transmission lines under ground motion weaken the horizontal displacement and acceleration responses of transmission towers. This weakening effect of transmission lines to the main structure, however, will be decreased with consideration of tilt component.

ElGarnal함수를 사용하는 디지털 이미지 워터마킹 기법 (A Digital Image Watermarking Scheme using ElGamal Function)

  • 이진호;김태윤
    • 정보처리학회논문지C
    • /
    • 제9C권1호
    • /
    • pp.1-8
    • /
    • 2002
  • 디지털 이미지 워터마킹(digital image watermarking)은 이미지 소유자의 정보를 디지털 이미지 속에 삽입시켜 이미지 소유자의 저작권을 보호하는 것을 목적으로 하는 기법이다. 저작권 보호를 위한 디지털 이미지 워터마킹 기법은 기존의 스테가노그라피(steganography)보다 워터마킹 공격에 대한 견고성과 육안적 비구별성을 동시에 추구해야 하고, 워터마킹 알고리즘의 은닉성 대신 키의 은닉성이 보장되어야 하며, 암호학과 마찬가지로 키의 사용으로 허가받지 않은 사용자의 워터마크 검출을 방지할 수 있어야 한다. 본 논문에서는 암호학 함수인 ElGamal함수를 사용하는 워터마킹 기법을 제안한다. 일방향 해쉬 함수를 구현하기 위해 ElGamal일방향 함수와 모듈라 연산을 사용한다. 제안하는 워터마킹 기법은 LSB(least significant bit)공격과 감마 보정 공격에 대해 견고하며 육안적 비구별성(perceptual invisibility)이 높다. 제안하는 워터마킹 기법의 실제 구현 및 실험을 통한 실험 결과를 분석하여 견고성과 육안적 비구별성의 특징을 확인한다 향후 과제로, 키생성을 위한 의사난수성과 비대칭키의 생성을 동시에 달성시키는 알고리즘 연구가 요구된다.

A Multi-Stage Encryption Technique to Enhance the Secrecy of Image

  • Mondal, Arindom;Alam, Kazi Md. Rokibul;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo;Morimoto, Yasuhiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권5호
    • /
    • pp.2698-2717
    • /
    • 2019
  • This paper proposes a multi-stage encryption technique to enhance the level of secrecy of image to facilitate its secured transmission through the public network. A great number of researches have been done on image secrecy. The existing image encryption techniques like visual cryptography (VC), steganography, watermarking etc. while are applied individually, usually they cannot provide unbreakable secrecy. In this paper, through combining several separate techniques, a hybrid multi-stage encryption technique is proposed which provides nearly unbreakable image secrecy, while the encryption/decryption time remains almost the same of the exiting techniques. The technique consecutively exploits VC, steganography and one time pad (OTP). At first it encrypts the input image using VC, i.e., splits the pixels of the input image into multiple shares to make it unpredictable. Then after the pixel to binary conversion within each share, the exploitation of steganography detects the least significant bits (LSBs) from each chunk within each share. At last, OTP encryption technique is applied on LSBs along with randomly generated OTP secret key to generate the ultimate cipher image. Besides, prior to sending the OTP key to the receiver, first it is converted from binary to integer and then an asymmetric cryptosystem is applied to encrypt it and thereby the key is delivered securely. Finally, the outcome, the time requirement of encryption and decryption, the security and statistical analyses of the proposed technique are evaluated and compared with existing techniques.

Aerodynamic performance evaluation of different cable-stayed bridges with composite decks

  • Zhou, Rui;Ge, Yaojun;Yang, Yongxin;Du, Yanliang;Zhang, Lihai
    • Steel and Composite Structures
    • /
    • 제34권5호
    • /
    • pp.699-713
    • /
    • 2020
  • The aerodynamic performance of long-span cable-stayed bridges is much dependent on its geometrical configuration and countermeasure strategies. In present study, the aerodynamic performance of three composite cable-stayed bridges with different tower configurations and passive aerodynamic countermeasure strategies is systematically investigated by conducting a series of wind tunnel tests in conjunction with theoretical analysis. The structural characteristics of three composite bridges were firstly introduced, and then their stationary aerodynamic performance and wind-vibration performance (i.e., flutter performance, VIV performance and buffeting responses) were analyzed, respectively. The results show that the bridge with three symmetric towers (i.e., Bridge I) has the lowest natural frequencies among the three bridges, while the bridge with two symmetric towers (i.e., Bridge II) has the highest natural frequencies. Furthermore, the Bridge II has better stationary aerodynamic performance compared to two other bridges due to its relatively large drag force and lift moment coefficients, and the improvement in stationary aerodynamic performance resulting from the application of different countermeasures is limited. In contrast, it demonstrates that the application of both downward vertical central stabilizers (UDVCS) and horizontal guide plates (HGP) could potentially significantly improve the flutter and vortex-induced vibration (VIV) performance of the bridge with two asymmetric towers (i.e., Bridge III), while the combination of vertical interquartile stabilizers (VIS) and airflow-depressing boards (ADB) has the capacity of improving the VIV performance of Bridge II.

무선 센서 네트워크에서 분산 클러스터링을 이용한 안전한 에너지 효율적인 라우팅 기술 (A Secure Energy-Efficient Routing Scheme Using Distributed Clustering in Wireless Sensor Networks)

  • 천은홍;이연식
    • 융합보안논문지
    • /
    • 제16권5호
    • /
    • pp.3-9
    • /
    • 2016
  • 무선 센서 네트워크은 폭넓은 다양한 응용에서 경제적으로 성공할 수 있는 모니터링 솔루션이다. 그러나 악의적이거나 감시하는 사람이 없는 환경에서 침입을 인식하고 방지하며 안전하고 에너지 효율적인 것을 보장하는 네트워크를 통한 정보의 안전한 전송은 주된 도전이다. 이에 따라, 이 논문은 집적된 데이터의 무결성, 인증성과 비밀성을 보장하기 위하여 안전한 무선 센서 네트워크에 필수적인 보호를 포함하는 분산 클러스터링 프로세스를 제안한다. 안전한 키 관리 스킴을 위하여 대칭형과 비대칭형 키의 전단계 분산의 개념을 사용하고, 클러스터 내에 있는 각 센서 노드가 배치되기 전에 암호화를 위한 전단계 분산 매개변수를 사용하는 센서 네트워크 토폴로지에 기초한 계층적 클러스터에 대한 상세한 스킴에 대하여 기술한다. 마지막으로 무선 센서 네트워크에서 제안된 스킴의 성능 시험 결과를 보인다.

A Color-Reaction-Based Biochip Detection Assay for RIF and INH Resistance of Clinical Mycobacterial Specimens

  • Xue, Wenfei;Peng, Jingfu;Yu, Xiaoli;Zhang, Shulin;Zhou, Boping;Jiang, Danqing;Chen, Jianbo;Ding, Bingbing;Zhu, Bin;Li, Yao
    • Journal of Microbiology and Biotechnology
    • /
    • 제26권1호
    • /
    • pp.180-189
    • /
    • 2016
  • The widespread occurrence of drug-resistant Mycobacterium tuberculosis places importance on the detection of TB (tuberculosis) drug susceptibility. Conventional drug susceptibility testing (DST) is a lengthy process. We developed a rapid enzymatic color-reaction-based biochip assay. The process included asymmetric multiplex PCR/templex PCR, biochip hybridization, and an enzymatic color reaction, with specific software for data operating. Templex PCR (tem-PCR) was applied to avoid interference between different primers in conventional multiplex-PCR. We applied this assay to 276 clinical specimens (including 27 sputum, 4 alveolar lavage fluid, 2 pleural effusion, and 243 culture isolate specimens; 40 of the 276 were non-tuberculosis mycobacteria specimens and 236 were M. tuberculosis specimens). The testing process took 4.5 h. A sensitivity of 50 copies per PCR was achieved, while the sensitivity was 500 copies per PCR when tem-PCR was used. Allele sequences could be detected in mixed samples at a proportion of 10%. Detection results showed a concordance rate of 97.46% (230/236) in rifampicin resistance detection (sensitivity 95.40%, specificity 98.66%) and 96.19% (227/236) in isoniazid (sensitivity 93.59%, specificity 97.47%) detection with those of DST assay. Concordance rates of testing results for sputum, alveolar lavage fluid, and pleural effusion specimens were 100%. The assay provides a potential choice for TB diagnosis and treatment.

프라이버시를 보호하는 접근제어가 가능한 키워드 검색 기법 (Privacy Preserving Keyword Search with Access Control based on DTLS)

  • 노건태;천지영;정익래;이동훈
    • 정보보호학회논문지
    • /
    • 제19권5호
    • /
    • pp.35-44
    • /
    • 2009
  • 민감한 개인정보를 보호하기 위해 데이터를 암호화하는 것은 필수적이다. 하지만 복호화 과정 없이 암호화된 데이터를 검색하기 위해서는 암호화된 데이터에서 검색이 가능한 효율적인 기법이 필요하다. 지금까지 수많은 검색 가능한 암호화 기법이 제안되었지만, 아직까지 이러한 기법들은 암호화된 데이터를 공유하기 위해 접근 권한을 갖고 있는 동적인 사용자(dynamic user)에 대해서 적합하지 않다. 기존의 검색 가능한 암호화 기법들에서는 특정 사용자(대칭키 환경에서의 데이터 제공자, 공개키 환경에서 데이터를 암호화한 공개키에 대응되는 비밀키를 갖고 있는 사용자)에 대해서만 암호화된 데이터에 접근이 가능하였다. 이러한 문제를 해결하기 위해 Stephen S. Yau 등은 데이터 공급자의 접근 정책에 따라서 사용자의 검색 능력을 제어할 수 있는 기법을 처음으로 제안하였다. 그러나 이 기법은 데이터 검색자의 프라이버시가 노출되는 문제점을 가진다. 따라서 본 논문에서는 이 기법의 문제점을 분석하고, 이러한 문제를 해결한 프라이버시를 보호하는 접근제어가 가능한 키워드 검색 기법을 제안한다.

RSA 암호시스템의 모듈러 승산기 처리속도 향상을 위한 연구 (A Study on the Modulus Multiplier Speed-up Throughput in the RSA Cryptosystem)

  • 이석근;정우열
    • 한국전자통신학회논문지
    • /
    • 제4권3호
    • /
    • pp.217-223
    • /
    • 2009
  • 최근, 다양한 네트워크의 발달은 심각한 사회문제를 발생시킨다. 그러므로 네트워크의 보안성을 통제할 수 있는 방법이 요구되어진다. 보안과 관련된 이러한 문제들은 해킹, 크래킹과 같은 비 보안분야에 직면해 있다. 새로운 암호알고리즘의 개발없이 해커나 크래커로부터 안전성을 보장받기 위한 방법은 확장된 키 길이를 통한 비 암호해석법을 유지시키는 것이다. 본 논문에서는 RSA 암호시스템에서 병목현상을 제거하기 위해서 가변길이 곱셈, 캐리 생성 부분을 하나의 어레이 방식을 사용하는 몽고메리 곱셈기 구조를 제안하였다. 그러므로 제안된 몽고메리 곱셈기는 크래킹으로부터 안전성을 제공하게 되며 실시간 처리가 가능해질 것이다.

  • PDF

A Fast and Secure Scheme for Data Outsourcing in the Cloud

  • Liu, Yanjun;Wu, Hsiao-Ling;Chang, Chin-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권8호
    • /
    • pp.2708-2721
    • /
    • 2014
  • Data outsourcing in the cloud (DOC) is a promising solution for data management at the present time, but it could result in the disclosure of outsourced data to unauthorized users. Therefore, protecting the confidentiality of such data has become a very challenging issue. The conventional way to achieve data confidentiality is to encrypt the data via asymmetric or symmetric encryptions before outsourcing. However, this is computationally inefficient because encryption/decryption operations are time-consuming. In recent years, a few DOC schemes based on secret sharing have emerged due to their low computational complexity. However, Dautrich and Ravishankar pointed out that most of them are insecure against certain kinds of collusion attacks. In this paper, we proposed a novel DOC scheme based on Shamir's secret sharing to overcome the security issues of these schemes. Our scheme can allow an authorized data user to recover all data files in a specified subset at once rather than one file at a time as required by other schemes that are based on secret sharing. Our thorough analyses showed that our proposed scheme is secure and that its performance is satisfactory.