• 제목/요약/키워드: Efficient Proof

검색결과 131건 처리시간 0.033초

Efficient Proof of Vote Validity Without Honest-Verifier Assumption in Homomorphic E-Voting

  • Peng, Kun
    • Journal of Information Processing Systems
    • /
    • 제7권3호
    • /
    • pp.549-560
    • /
    • 2011
  • Vote validity proof and verification is an efficiency bottleneck and privacy drawback in homomorphic e-voting. The existing vote validity proof technique is inefficient and only achieves honest-verifier zero knowledge. In this paper, an efficient proof and verification technique is proposed to guarantee vote validity in homomorphic e-voting. The new proof technique is mainly based on hash function operations that only need a very small number of costly public key cryptographic operations. It can handle untrusted verifiers and achieve stronger zero knowledge privacy. As a result, the efficiency and privacy of homomorphic e-voting applications will be significantly improved.

Implementing a Verified Efficient RUP Checker

  • 어덕기
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2012년도 춘계학술발표대회
    • /
    • pp.1176-1179
    • /
    • 2012
  • To ensure the correctness of high performance satisfiability (SAT) solvers, several proof formats have been proposed. SAT solvers can report a formula being unsatisfiable with a proof, which can be independently verified by a trusted proof checker. Among the proof formats accepted at the SAT competition, the Reverse Unit Propagation (RUP) format is considered the most popular. However, the official proof checker was not efficient and failed to check many of the proofs at the competition. This inefficiency is one of the drawbacks of SAT proof checking. In this paper, I introduce a work-in-progress project, vercheck to implement an efficient RUP checker using modern SAT solving techniques. Even though my implementation is larger and more complex, the level of trust is preserved by statically verifying the correctness of the code. The vercheck program is written in GURU, a dependently typed functional programming language with a low-level resource management feature.

An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model

  • Tan, Syh-Yuan;Chin, Ji-Jian;Heng, Swee-Huay;Goi, Bok-Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권4호
    • /
    • pp.910-922
    • /
    • 2013
  • In 2008, Chin et al. proposed an efficient and provable secure identity-based identification scheme in the standard model. However, we discovered a subtle flaw in the security proof which renders the proof of security useless. While no weakness has been found in the scheme itself, a scheme that is desired would be one with an accompanying proof of security. In this paper, we provide a fix to the scheme to overcome the problem without affecting the efficiency as well as a new proof of security. In particular, we show that only one extra pre-computable pairing operation should be added into the commitment phase of the identification protocol to fix the proof of security under the same hard problems.

한국 소방복의 착용만족도 및 착용자 의견에 관한 조사연구 (A Survey on the Actual Wearing Conditions of Fire Fighter's Uniform)

  • 정정숙;이연순
    • 대한가정학회지
    • /
    • 제37권11호
    • /
    • pp.75-83
    • /
    • 1999
  • To develope an efficient fire fighter’s uniform for the fire fighting work and body protection, this study examined the regulations of fire lighter’s uniform and surveyed the actual wearing conditions, satisfaction degree, preferred color and design others. The results are as follows; 1. As for the satisfaction degree, the degree was normal in ordinary, low in working uniform and heat-proof uniform and very low in water-proof uniform about its design, size, color and materials. 2. As for the color, red was preferred for the working uniform and water-proof uniform. Blue, yellow and green was preferred next for corking uniform and yellow and blue for water-proof uniform. 3. As for the design, fire fighters wanted partial revision of the present uniform. They preferred stretchy training wear style and overact style in order. For the water-proof uniform, they preferred hip-length suit and pants and next to it they liked flee-length suit, waist belt and overact in order. 4. As for the regulations of the uniform, they wanted some addition in casual uniform, water-proof pants and water-proof gloves, and some deletion in the thermal barrier of water-proof uniform and ordinary uniform. 5. As for the distribution of the uniforms, the use of coupons was highly preferred.

  • PDF

오프라인 검증을 지원하는 안전한 요킹증명 프로토콜 (A Secure Yoking-Proof Protocol Providing Offline Verification)

  • 함형민
    • 한국콘텐츠학회논문지
    • /
    • 제21권2호
    • /
    • pp.113-120
    • /
    • 2021
  • RFID (Radio Frequency Identification) 요킹증명은 여러 객체의 물리적 근접성을 보장하기 위해 한 쌍의 RFID 태그를 하나의 리더 장치로 동시에 스캔하고 이를 검증하기 위한 방법을 제공한다. 최초 제안된 요킹증명 프로토콜들은 생성된 증명을 검증하기 위해 리더 장치와 온라인으로 연결된 온라인 검증자가 필수적이며, 이 조건은 요킹증명이 적용 가능한 환경을 제한한다. 이 같은 제한 조건을 완화하기 위해, 온라인 검증자가 필요하지 않은 오프라인 요킹증명에 대한 연구가 제안되었다. 그러나 이 프로토콜들은 안전한 요킹증명의 생성 및 검증을 보장하지 못하며, 최초 제안된 요킹증명 기법에 비해 상대적으로 더 많은 연산을 태그에게 요구한다. 본 논문에서는, 온라인 검증자가 필요 없는 안전하고 효율적인 오프라인 요킹증명 프로토콜을 제안한다. 제안하는 오프라인 요킹증명 프로토콜은 기존의 프로토콜들보다 상대적으로 적은 횟수의 연산으로 안전한 요킹증명의 생성 및 검증이 가능하며, 별도의 추가 장치 없이 한 쌍 이상의 태그에 대한 증명이 가능한 그룹증명으로의 확장도 지원한다. 분석 결과는 제안된 프로토콜이 안전하고 효과적으로 오프라인 검증을 제공한다는 것을 보인다.

An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model

  • Chin, Ji-Jian;Heng, Swee-Huay;Phan, Raphael C.W.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권7호
    • /
    • pp.2532-2553
    • /
    • 2014
  • In Asiacrypt 2003, Al-Riyami and Paterson proposed the notion of certificateless cryptography, a technique to remove key escrow from traditional identity-based cryptography as well as circumvent the certificate management problem of traditional public key cryptography. Subsequently much research has been done in the realm of certificateless encryption and signature schemes, but little to no work has been done for the identification primitive until 2013 when Chin et al. rigorously defined certificateless identification and proposed a concrete scheme. However Chin et al.'s scheme was proven in the random oracle model and Canetti et al. has shown that certain schemes provable secure in the random oracle model can be insecure when random oracles are replaced with actual hash functions. Therefore while having a proof in the random oracle model is better than having no proof at all, a scheme to be proven in the standard model would provide stronger security guarantees. In this paper, we propose the first certificateless identification scheme that is both efficient and show our proof of security in the standard model, that is without having to assume random oracles exist.

방음 터널 설치에 따른 소음 저감 효과 연구 (A Study on Noise Reduction of Railway Noise by Noise Barrier)

  • 김다래;김태민;김정태;손정곤;박광현;류래언
    • 한국소음진동공학회:학술대회논문집
    • /
    • 한국소음진동공학회 2014년도 추계학술대회 논문집
    • /
    • pp.125-130
    • /
    • 2014
  • High speed railroad car and high-rise apartment with development of railway technology cause different problems of noise contrary to the previous generation. It is the most efficient noise reduction countermeasure but we studied that is the way on noise propagation with sound proof wall or sound proof tunnel around railroad. But if it were railroad on bridge, additional cost which is more expensive than installing one on the ground is needed. So sound insulation material considering reducing weight of recent soundproof facilities must be selected. It is in this study that predicted and analyzed acoustical and structural effect for noise reduction by installing soundproof tunnel. If it were departmentalized into additional study, could be able to expect noise reduction effect of sound proof tunnel establishment on the bridge.

  • PDF

THE EXISTENCE OF THE RISK-EFFICIENT OPTIONS

  • Kim, Ju Hong
    • 한국수학교육학회지시리즈B:순수및응용수학
    • /
    • 제21권4호
    • /
    • pp.307-316
    • /
    • 2014
  • We prove the existence of the risk-efficient options proposed by Xu [7]. The proof is given by both indirect and direct ways. Schied [6] showed the existence of the optimal solution of equation (2.1). The one is to use the Schied's result. The other one is to find the sequences converging to the risk-efficient option.

Efficient Method to Implement Max-Log-MAP Algorithm: Parallel SOVA

  • 이창우
    • 한국통신학회논문지
    • /
    • 제33권6C호
    • /
    • pp.438-443
    • /
    • 2008
  • The efficient method to implement the Max-Log-MAP algorithm is proposed by modifying the conventional algorithm. It is called a parallel soft output Viterbi algorithm (SOVA) and the rigorous proof is given for the equivalence between the Max-Log-MAP algorithm and the parallel SOVA. The parallel SOVA is compared with the conventional algorithms and we show that it is an efficient algorithm implementing the modified SOVA in parallel.

현장계측 및 시뮬레이션 조합에 의한 철도지반진동예측기법 개발 (Ground vibration predictions based on the combination of measurements and simulations)

  • 양신추;황성호;장승엽;김은
    • 한국소음진동공학회:학술대회논문집
    • /
    • 한국소음진동공학회 2014년도 춘계학술대회 논문집
    • /
    • pp.366-370
    • /
    • 2014
  • Considering a countermeasure against vibration along the existing line, in many cases, it may be the most efficient method to replace existing fasteners with high resilient fasteners because of the restriction of the construction of a new track type. There are many types of high resilient fasteners which are different in price and performance. Therefore it is important to choose the high resilient fastener which has best vibration-proof performance per price. In this study, a prediction method which can exactly evaluate the performance of a fastener in the reduction the ground borne noise in the existing line is presented, which is constructed based on the combination of the measurement and the simulation. A numerical example using the presented method is introduced to evaluate the vibration-proof performance for the solution of the vibration problem in the existing line.

  • PDF