• Title/Summary/Keyword: Digital ID

Search Result 212, Processing Time 0.028 seconds

Security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks (무선 센서 네트워크 환경을 위한 보안성이 향상된 프라이버시 보호형 two-factor 인증 프로토콜)

  • Choi, Younsung;Chang, Beom-Hwan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.71-84
    • /
    • 2019
  • Various researchers conducted the research on two-factor authentication suitable for wireless sensor networks (WSNs) after Das first proposed two-factor authentication combining the smart card and password. After then, To improve the security of user authentication, elliptic curve cryptography(ECC)-based authentication protocols have been proposed. Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSM for resolving various problems of ECC-based authentication protocols. However, Jiang et al.'s protocol has the vulnerabilities on a lack of mutual authentication, a risk of SID modification and a lack of sensor anonymity, and user's ID exposed on sensor node Therefore, this paper proposed security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks to solve the problem of Jiang et al.'s protocol, and security analysis was conducted for the proposed protocol.

A Blind Signature Scheme for Customer Anonymity in Contents Purchase (컨텐츠 구입 시 고객의 익명성을 위한 은닉 서명 기법)

  • Lee Hyun-ju;Rhee Chung-Sei
    • Journal of Digital Contents Society
    • /
    • v.5 no.1
    • /
    • pp.1-6
    • /
    • 2004
  • Electronic cash is used as a payment tool for contents purchase in mobile electronic commerce environment. In order to protect customer`s privacy, we use blind signature. Blind signature has an anonymity property since it does not allow connection between customer`s ID and customer`s message. In this paper, we propose an blind signature scheme using elliptic curve algorithm based on Cap Diffie-Hellman Problem. Proposed scheme efficiently improved against existing blind signature scheme by reducing communication and computation time of the process.

  • PDF

Trends of Blockchain-based Digital Identity (블록체인 기반의 디지털 신원증명 동향)

  • Lee, Jeong-Hyeon;Seo, Hwa-Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.218-221
    • /
    • 2020
  • 개인 정보의 유출은 유출된 당사자에게 단순 정보 유출을 넘어서 2차적인 피해를 주기 때문에 개인 정보 보호에 대한 중요성은 높아지고 있지만 오늘날까지 개인 정보 유출 사고는 끊임없이 발생하고 있다. 현재 널리 사용되고 있는 디지털 신원인 중앙 집중형 ID(Centralized Identity)는 사용자가 스스로 신원을 생성, 제어, 관리할 수 없어 개인 정보 유출 및 오남용이 쉬운 구조이다. 이러한 문제를 해결하기 위해 개인이 스스로 자신의 신원을 관리 및 통제할 수 있는 블록체인 기반의 디지털 신원의 필요성이 제기되었다. 본 논문에서는 디지털 신원(Digital Identity)의 종류와 현재 국내외에서 연구하고 있는 블록체인 기반의 신원증명 기술에 대한 동향을 살펴본다.

Additional Data Transmission Technology for T-DMB Systems using MOK-SS mapping (MOK-SS매핑 기반의 T-DMB 부가데이터 전송기법)

  • Cha, Jae-Sang;Lee, Min-Ho;Kim, Gun;Park, So-Ra;Lee, Yong-Tae;Kim, Jin-Young;Bae, Jung-Nam
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.123-127
    • /
    • 2009
  • In this paper, we suggested new additional data transmission technology for T-DMB system using MOK-SS(Mary Orthogonal Keying- Spread Spectrum)mapping method. We applied revised watermarking method of TxID(Transmitter Identification) technology mainly had been used for conventional ATSC-DTV(Advanced Television Systems Committee - Digital TV). And proposed schemes enhanced additional data rate using MOK-SS mapping method. We certified availability of our proposed technology by using various simulation and error rate performance analysis.

  • PDF

A Study on Utilization of ORCID based Author Identifier at National Level (국가 차원의 ORCID 기반 저자 식별자 활용에 관한 연구)

  • Kim, Eun-Jeong;Noh, Kyung-Ran
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.28 no.3
    • /
    • pp.151-174
    • /
    • 2017
  • The diffusion of the internet, the advancement of ICT technology, and digital diffusion have facilitated the streamlining and acceleration of scholarly communication and speeding up research, and the paradigm of scholarly information dissemination is changing. This study introduces the ORCID, a unique author identifier, and examines the ORCID organization's activities, the advantages given to researchers and research institutes, and the membership status. In addition, this paper examines adoptions and utilizations of ORCID in major countries including USA, UK, Italy, and China. Based on this, this paper suggests the necessary considerations for utilizing ORCID in terms of governance, system elements, policy and institutional aspects in an effort to identify authors at national level.

A License Administration Protocol Providing User Privacy in Digital Rights Management (디지털 저작권 관리에서 사용자의 프라이버시 보호를 제공하는 라이센스 관리 프로토콜)

  • 박복녕;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.189-198
    • /
    • 2003
  • As people are damaged increasingly by personal information leakage, awareness about user privacy infringement is increasing. However, the existing DRM system does not support the protection of user's personal information because it is not necessary for the protection of copyrights. This paper is suggesting a license administration protocol which is more powerful to protect personal information in DRM. To protect the exposure of users identifier, this protocol uses temporary ID and token to guarantee anonymity and it uses a session key by ECDH to cryptography and Public-Key Cryptosystem for a message so that it can protect the exposure of personal information and user's privacy.

Design of Accident Situation ID Recording System using JPMP-SID Security Tag (보안 JPMP-SID Tag를 활용한 사고 상황 ID 기록 시스템 설계)

  • Choi, Jang-Sik;Choi, Sung-Yeol;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.85-90
    • /
    • 2011
  • JPMP SID Tag is the security senor tag to provides physical information protective function using sensor module, has impossible feature to copy and fake the data which is stored in the tag. So data which is stored in the JPMP SID Tag has authenticity, integrity, originality. Therefore JPMP SID Tag could be applied in the place where the security of data is demanded. This paper propose the system using the JPMP SID Tag to acquire and protect digital evidence where cause investigation of accident is necessary. Also, proposed systems is complement of software security with composition secondary control logic for JPMP SID tag access control.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

An Architecture for Securing Digital Documents Using Radio Frequency Identification(RFID) (RFID를 이용한 디지털 문서 보안 아키텍처)

  • Choi, Jae-Hyun;Lee, Woo-Jin;Chon, Ki-Won
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.965-972
    • /
    • 2005
  • Digital documents have become the mainstay of the paperless office. This is due to the increased usage of computer networks and the widespread digital culture. Along with the increased usage of digital documents comes the problem of securing them. The documents nay have very important information such as confidential business policies and intellectual Property statements. Generally, most of users protect them by using a password or secured flash memory or security software, but it has several weaknesses. Accordingly, we propose a new architecture for securing digital documents. The proposed architecture bases on RFID and several encrypting techniques. It makes up for the weakness of traditional securing architectures, and supports various Policies for digital documents of users.

A Design of Content Delivery System with Analysis of the Web Object Reference Characteristics (웹 객체 참조 특성 분석을 통한 웹 기반 디지털콘텐트 전송시스템의 설계)

  • Na Yun ji;Ko Il seok;Cho Dong uk;Yu Won jong;Kwak Jong min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4C
    • /
    • pp.262-268
    • /
    • 2005
  • The unit of the digital content delivery is the web object. For the improvement of the content delivery based on the web, it id required analysis of reference characteristics of the web object. In this study, we analyze reference characteristics of the web object and evaluate the performance. Using these analysis results, we propose the digital content delivery system which is improved delivery efficiency. The goal of the proposed system are the improvement of the processing time through enhancement of the caching efficiency with reflect reference characteristics of the web object. And the experiment result, we verify the performance enhancement.