• Title/Summary/Keyword: Delegation verification

Search Result 9, Processing Time 0.023 seconds

Study on the efficient consensus process of PBFT

  • Min, Youn-A
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.47-53
    • /
    • 2020
  • Blockchain is a distributed shared ledger that transparently manages information through verification and agreement between nodes connected to a distributed network. Recently, cases of data management among authorized agencies based on private blockchain are increasing. In this paper, we investigated the application cases and technical processes of PBFT, the representative consensus algorithm of private blockchain, and proposed a modified PBFT algorithm that enables efficient consensus by simplifying duplicate verification and consensus processes that occur during PBFT processing. The algorithm proposed in this paper goes through the process of selecting a delegation node through an authoritative node and can increase the safety of the delegation node selection process by considering an efficient re-election algorithm for candidate nodes. By utilizing this research, it is possible to reduce the burden on the network communication cost of the consensus process and effectively process the final consensus process between nodes.

A DDMPF(Distributed Data Management Protocol using FAT) Design of Self-organized Storage for Negotiation among a Client and Servers based on Clouding (클라우딩 기반에서 클라이언트와 서버간 협상을 위한 자가 조직 저장매체의 DDMPF(Distributed Data Management Protocol using FAT) 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee;Yang, Seung-Hae
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1048-1058
    • /
    • 2012
  • This paper proposes the DDMPF(Distributed Data Management Protocol using FAT) which prevents data loss and keeps the security of self-organized storages by comprising a client, a storage server, and a verification server in clouding environment. The DDMPF builds a self-organized storage server, solves data loss by decentralizing the partitioned data in it in contrast to the centralized problem and the data loss caused by the storage server problems of existing clouding storages, and improves the efficiency of distributed data management with FAT(File Allocation Table). And, the DDMPF improves the reliability of data by a verification server's verifying the data integrity of a storage server, and strengthens the security in double encryption with a client's private key and the system's master key using EC-DH algorithm. Additionally, the DDMPF limits the number of verification servers and detects the flooding attack by setting the TS(Time Stamp) for a verification request message and the replay attack by using the nonce value generated newly, whenever the verification is requested.

East Asian Journal of Business Economics and Development Strategy

  • KIM, Byoung-Goo;YOUN, Myoung-Kil
    • Journal of Research and Publication Ethics
    • /
    • v.2 no.2
    • /
    • pp.17-20
    • /
    • 2021
  • Purpose: This paper is to review and analyze development strategy of the East Asian Journal of Business Economics and to look at the previous and current changed publication system and process in order to step up the article quality of EAJBE. Research design, data and methodology: This study grasped the current status and strategy of this journal through literature review. In addition, through the case of EAJBE, the internationalization strategy and research ethics policy of this journal were analyzed. Results: EAJBE clarifies the copyright delegation procedure of the final publication paper. Regarding compliance with research ethics, Editor-in-Chief and Management Editor are completing research ethics training. From 2017 to the present, Editor-in-Chief and Management Editor have completed online ethics training and hold certificates of completion. Conclusions: EAJBE specifies the rules for exclusion of examination by the contributor and the examiner belonging to the same institution and actually operates in this way. Currently, by using the Jams system, the plagiarism verification procedure is operated using the thesis plagiarism prevention system. Finally, in order to strengthen research ethics standards, EAJBE is trying to establish and strengthen a verification system for each paper using the system of the Korea Research Foundation, not the previous foreign paid plagiarism system.

A Secure Digital Signature Delegation Scheme using CAs (CA를 이용한 안전한 서명 검증 위임 기법)

  • 최연희;박미옥;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.55-65
    • /
    • 2003
  • To perform the certificate validation processing on the user-side application induces the very considerable overhead because of the complex and time-consuming characteristic of the validation processing. Especially, the verification for digital signature over a certificate can be the major reason of the overhead, since the verification accompanies with the cryptographic calculation over each certificate on the certificate path. In this paper, we propose a new certificate validation scheme can reduce the overhead caused by user-side certificate validation processing and improve the utilization of CAs. As the result, our proposed scheme can not only reduces the overhead for the validation processing by decreasing the cryptographic calculation but also improves the utilization of CAs by employing them to the validation processing.

The Biometric Signature Delegation Method with Undeniable Property (부인봉쇄 성질을 갖는 바이오메트릭 서명 위임 기법)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.389-395
    • /
    • 2014
  • In a biometric signature scheme, a user's biometric key is used to sign the document. It also requires the user be authenticated with biometric recognition method, prior to signing the document. Because the biometric recognition is launched every time the signature session started, it is not suitable for electronic commerce applications such as shopping malls where large number of documents to sign are required. Therefore, to commercialize biometric based signature schemes, the new proxy signature scheme is needed to ease the burden of the signer. In the proxy signature scheme, the signer can delegate signing activities to trustful third parties. In this study, the biometric based signature delegation method is proposed. The proposed scheme is suitable for applications where a lot of signing are required. It is consisted of biometric key generation, PKI based mutual authentication, signature generation and verification protocols.

The Biometric Authentication based Dynamic Group Signature Scheme (바이오메트릭 인증 기반의 동적 그룹 서명 기법)

  • Yun, Sunghyun
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.1
    • /
    • pp.49-55
    • /
    • 2016
  • In a delegate authentication, a user can lend his/her own authentication data to the third parties to let them be authenticated instead of himself/herself. The user authentication schemes based on the memory of unique data such as password, are vulnerable to this type of attack. Biometric authentication could minimize the risk of delegate authentication since it uses the biometric data unique by each person. Group authentication scheme is used to prove that each group member belongs to the corresponding group. For applications such as an electronic voting or a mobile meeting where the number of group members is changing dynamically, a new group authentication method is needed to reflect the status of group in real time. In this paper, we propose biometric authentication based dynamic group signature scheme. The proposed scheme is composed of biometric key generation, group public key creation, group signature generation, group signature verification and member update protocols. The proposed member update protocol is secure against colluding attacks of existing members and could reflect group status in real time.

A Study on the Effect of Job Distribution on Quality of Life for Good Job Behavior

  • Kim, Yong-Min;Yong, Tae-Hee
    • Journal of Distribution Science
    • /
    • v.16 no.9
    • /
    • pp.25-33
    • /
    • 2018
  • Purpose - The purpose of the study is to analyze the empowerment intermediary role on the relationship between the job distribution and the quality of life. A research on empowerment and social service staffs' job distribution also should be conducted to improve the quality of their lives. Because empowerment, particularly, affects the quality of life, it should be taken a detail discussion for empowerment improvement. Research design, data, and methodology - This paper conducted a questionnaire survey. In total, 722 copies of the structural questionnaire were analyzed. Five parameter subsets were selected to measure the empowerment such as task significance, role performance capability, self-determination, task impact, then, the survey consists of 10 questions. For data analysis, confirmatory factor analysis, discriminant and concentration validity analysis, path coefficient significance, and mediation effectiveness verification were employed. Results - As evidenced from the data analysis, job distribution variables such as job impact, job autonomy, and feedback affect the quality of their lives. Empowerment also affects the quality of their lives. Next, the empowerment functions as meditating role in the relationships with job impact, job autonomy, feedback and the quality of their lives. On the other hand, the empowerment do not function as meditating role in the relationships with social service staffs' function diversity and the quality of their lives. Conclusions - It is necessary to conduct ways for various job performance and outside educational facilities to improve social service staffs' function diversity. The mission, vision, strategic purposes, detailed execution goals need to be set by all their organization members' participation. Empowerment also requires social welfare facilities' drastic delegation on their authority and responsibilities with their active decentralization in the organization.

A Study on the Trust Mechanism of Online Voting: Based on the Security Technologies and Current Status of Online Voting Systems (온라인투표의 신뢰 메커니즘에 대한 고찰: 온라인투표 보안기술 및 현황 분석을 중심으로)

  • Seonyoung Shim;Sangho Dong
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.47-65
    • /
    • 2023
  • In this paper, we investigate how the online voting system can be a trust-based system from a technical perspective. Under four principles of voting, we finely evaluate the existing belief that offline voting is safer and more reliable than online voting based on procedural processes, technical principles. Many studies have suggested the ideas for implementing online voting system, but they have not attempted to strictly examine the technologies of online voting system from the perspective of voting requirements, and usually verification has been insufficient in terms of practical acceptance. Therefore, this study aims to analyze how the technologies are utilized to meet the demanding requirements of voting based on the technologies proven in the field. In addition to general data encryption, online voting requires more technologies for preventing data manipulation and verifying voting results. Moreover, high degree of confidentiality is required because voting data should not be exposed not only to outsiders but also to managers or the system itself. To this end, the security techniques such as Blind Signature, Bit Delegation and Key Division are used. In the case of blockchain-based voting, Mixnet and Zero-Knowledge Proof are required to ensure anonymity. In this study, the current status of the online voting system is analyzed based on the field system that actually serves. This study will enhance our understanding on online voting security technologies and contribute to build a more trust-based voting mechanism.

The Private-Initiated Park Development Project in Terms of Securing Publicity Operation Characteristics Analysis - Busan Metropolitan City as a Case - (공공성 확보측면에서 민간공원특례사업 운영특성분석 - "부산광역시를 사례로" -)

  • Gweon, Young-Dal;Park, Hyun-Bin;Kim, Dong-Pil
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.51 no.1
    • /
    • pp.13-28
    • /
    • 2023
  • This study examines the process of project promotion in Busan, which introduced the private participation-type consultative body for the first time in the country in the promotion stage of the private-initiated park development project, and introduced flexible application of the system and differentiated policy elements in the implementation process, and examines the operational characteristics and we tried to analyze performance, etc. As a result of the analysis, first, the preferred bidder was selected by introducing a mixed method in the project method, which is an independent project method that cannot be seen in other local governments. Second, by specifying guidelines considering the characteristics of each park and detailed guidelines such as the location, area, and maximum height of non-park facilities, criteria for establishing a rational development plan utilizing regional identity and the basis of evaluation standards were laid. Third, in the project process, transparency was secured through the delegation-type roundtable, in which the private sector performs the functions and roles of key actors, thereby preventing disputes such as suspicion of preferential treatment. Fourth, in order to improve the quality of park facilities to be donated and to secure design adequacy, after approval of the implementation plan, a general planner was introduced and construction project management (design stage) services were performed to promote efficient implementation and specialization of luxury parks in the region. As a result, the city of Busan carried out the project efficiently by conserving 5 parks from sunset, a park area of 2.25km2, and reducing land compensation and park construction costs by KRW 740 billion. Reinforcement of the public nature of the private-initiated park development project was suggested. However, due to the application of these systems and verification procedures, the project period is prolonged, and park services are delayed along with the financial burden on private operators.