• Title/Summary/Keyword: Group Signature

Search Result 137, Processing Time 0.031 seconds

Clinical Effects of an Improved Pump Reaction Rate and Automatic Occlusion Sensing System in Phacoemulsification (수정체유화장치의 초음파 출력속도 및 자동막힘감지 기능 향상의 술 후 임상결과 비교)

  • Kim, You Na;Lee, Jin Ah;Kim, Jae Yong;Kim, Myoung Joon;Tchah, Hung Won
    • Journal of The Korean Ophthalmological Society
    • /
    • v.59 no.11
    • /
    • pp.1017-1023
    • /
    • 2018
  • Purpose: A recently introduced phacoemulsification system, the WhiteStar $Signature^{(R)}$ PRO, has demonstrated improved nucleus followability and cutting efficiency via an improved pump regulator with a higher reaction response and an automatic occlusion sensing system. In this study, we compared various phacoemulsification parameters between the new system and an older version of the device. Methods: A total of 80 eyes of 68 patients with cataracts who had undergone phacoemulsification by a single surgeon were included in this study. Forty eyes of patients underwent phacoemulsification using the older $Signature^{(R)}$ system (WhiteStar); these patients were classified as the control group. Another 40 eyes of patients underwent phacoemulsification with the newer enhanced system, the WhiteStar $Signature^{(R)}$ PRO; these patients were assigned to the experimental group. During the operation, operative parameters, including the effective phaco time (parameter of effective phaco time with a specific coefficient for the transversal movement expressed in seconds, EFX), ultrasound time (seconds [s]), effective phacoemulsification time (EPT, s), average phacoemulsification power (AVG, %), and balanced salt solution usage, were measured to determine the performance enhancement offered by the updated system. Central corneal thickness was measured before and after surgery to compare corneal edema. The relationships between the two groups were analyzed using an independent t-test. Results: The Signature $PRO^{(R)}$ system showed a lower EFX (p < 0.001), a shorter EPT (p < 0.001), and a smaller AVG (p < 0.001). Postoperative corneal thickness did not differ significantly between the two groups. Conclusions: Comparing the efficacy of the improved reaction speed of the device and automatic occlusion sensing system in performing phacoemulsification, the updated Signature $PRO^{(R)}$ system demonstrated superior followability and cutting efficiency regardless of nuclear cataract hardness.

Anonymous Authentication Framework using Croup Signature (그룹서명을 이용한 익명 인증 구조)

  • Lee, Yun-Kyung;Chung, Byung-Ho;Kim, Jeong-Nyeo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.699-702
    • /
    • 2008
  • 인터넷 이용이 활성화되면서 각종 웹 서버에서의 개인정보 과다 수집 및 노출이 큰 이슈가 되고 있다. 인터넷이 우리 생활에 주는 편리함을 그대로 누리면서 개인정보를 보호할 수 있는 방안으로 익명인증 기술이 있을 수 있다. 익명인증은 익명성을 제공하는 디지털서명을 이용한 인증 방법이다. 익명성을 제공하는 디지털서명 방법은 전자화폐와 전자투표 시스템 등의 응용을 위해서 주로 연구되어 왔으나, 최근에는 인터넷 환경에서 개인정보 보호를 위한 익명인증 방법의 하나로써 연구되고 있다. 본 논문에서는 익명성을 제공하는 전자서명 방법 중 그룹서명 방식에 관하여 소개하고, 그룹서명을 이용한 익명인증 시스템의 구조를 제안하고자 한다.

  • PDF

Navier-Stokes Analysis of Pitching Delta Wings in a Wind Tunnel

  • Lee, Yung-Gyo
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.2 no.2
    • /
    • pp.28-38
    • /
    • 2001
  • A numerical method for the assessment and correction of tunnel wall interference effects on forced-oscillation testing is presented. The method is based on the wall pressure signature method using computed wall pressure distributions. The wall pressure field is computed using unsteady three-dimensional full Navier-Stokes solver for a 70-degree pitching delta wing in a wind tunnel. Approximately-factorized alternate direction implicit (AF-ADI) scheme is advanced in time by solving block tri-diagonal matrices. The algebraic Baldwin-Lomax turbulence, model is included to simulate the turbulent flow effect. Also, dual time sub-iteration with, local, time stepping is implemented to improve the convergence. The computed wall pressure field is then imposed as boundary conditions for Euler re-simulation to obtain the interference flow field. The static computation shows good agreement with experiments. The dynamic computation demonstrates reasonable physical phenomena with a good convergence history. The effects of the tunnel wall in upwash and blockage are analyzed using the computed interference flow field for several reduced frequencies and amplitudes. The corrected results by pressure signature method agree well with the results of free air conditions.

  • PDF

Threshold Proxy Signature Schemes allowing Repetitive Delegations in a Hierarchical Group (계층 그룹에서 반복적 권한 위임을 허용하는 임계 대리서명 프로토콜)

  • 박소영;이상호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.251-253
    • /
    • 2003
  • 권한 위임은 일상에서 흔히 발생하는 사건으로서, 특히, 군대, 기업, 은행 등의 계층 그룹에서는 계층간 권한 위임이 자연스럽고 빈번하게 발생한다. 대리서명(proxy signature)은 서명 권한을 위임받은 대리서명자가 원 서명자를 대신하여 유효한 전자서명을 생성하고 검증할 수 있는 전자서명 프로토콜이다. 계층 구조를 갖는 B2B 전자 거래 및 전자서명의 활용 범위가 다양화됨에 따라 이를 반영하는 보다 안전한 대리서명이 요구된다. 본 논문에서는 계층 그룹에서 반복적 권한 위임을 허용하는 새로운 임계 대리서명 프로토콜을 제안한다. 한 명의 대리서명자가 아닌 복수의 대리서명자가 모여 원 서명자를 대신해 하나의 유효한 대리서명을 생성할 수 있게 함으로써, 보다 강화된 안전성을 제공한다. 대리서명 생성을 위한 권한 위임은 위임티켓을 통해 계층 구조의 상위 계층에서 하위 계층으로 이루어지고, 위임받은 대리서명자들 중에서 서명에 참여할 수 없는 대리서명자는 다시 자신의 하위 계층 참가자들에게 개별 위임을 수행할 수 있도록 함으로써, 반복적 권한 위임을 허용한다.

  • PDF

A Study on Creating a Secure Private Signature Key in ID-based Group Signature (ID기반 그룹서명에서의 안전한 개인 서명키 생성기법에 관한 연구)

  • Kim, Su-Hyun;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1275-1278
    • /
    • 2010
  • 1984년 A.Shamir에 의해 처음 소개된 ID 기반 공개키 암호시스템은 ID나 메일, 주소, 소속 등 유일하게 특정할 수 있는 것을 사용자의 공개키로 사용함으로써 송신자의 공개키에 대한 정당성 확인 과정을 필요 없게 하는 방식으로 전자서명에 적용되어 다양한 방식으로 제안되었다. 하지만 ID 기반 그룹 서명에서는 그룹 관리자만이 사용자의 서명키를 생성하기 때문에 그룹 내 사용자로 위장이 가능한 문제점을 가지고 있다. 본 논문에서는 ID기반 서명에서의 문제점인 키 위탁 문제를 해결할 수 있고, 그룹 관리자만이 부담하고 있는 그룹 구성원들의 개인 서명키 생성 및 사용자 식별 연산을 소그룹 관리자를 이용하여 연산량을 분산시킬 수 있는 그룹 서명 방식을 제안한다.

TOTALLY REAL AND COMPLEX SUBSPACES OF A RIGHT QUATERNIONIC VECTOR SPACE WITH A HERMITIAN FORM OF SIGNATURE (n, 1)

  • Sungwoon Kim
    • Journal of the Korean Mathematical Society
    • /
    • v.61 no.3
    • /
    • pp.547-564
    • /
    • 2024
  • We study totally real and complex subsets of a right quarternionic vector space of dimension n + 1 with a Hermitian form of signature (n, 1) and extend these notions to right quaternionic projective space. Then we give a necessary and sufficient condition for a subset of a right quaternionic projective space to be totally real or complex in terms of the quaternionic Hermitian triple product. As an application, we show that the limit set of a non-elementary quaternionic Kleinian group 𝚪 is totally real (resp. commutative) with respect to the quaternionic Hermitian triple product if and only if 𝚪 leaves a real (resp. complex) hyperbolic subspace invariant.

A Study on Prediction Technique for Underwater Electric Field Signature Characteristic using Dipole Modelling Method (다이폴 모델링 기법을 이용한 수중 전기장 신호 특성 예측 기법 연구)

  • Yang, Chang-Seob;Chung, Hyun-Ju;Lee, Jong-Ju;Jeon, Jae-Jin
    • Journal of the Korean Magnetics Society
    • /
    • v.18 no.6
    • /
    • pp.221-224
    • /
    • 2008
  • This paper describes the equivalent dipole modeling method utilizing a singular value decomposition technique from analysis data by the FNREMUS Detailled Modeller software based on BEM which can predict the underwater electric field signal due to a galvanic corrosion phenomenon on a naval vessel. The proposed dipole modeling method was successfully verified in good agreement with predicted BEM data at 30 m depths through the comparison of average differences. The proposed dipole modelling method can be effectively used in the prediction and analysis of static electric field signature distributions generated from a naval vessel at any different depths.

Surface Topography Measurement and Analysis for Bullet and Casing Signature Identification (총기 인식을 위한 측정 시스템 구현 및 해석 알고리즘 개발)

  • Rhee, Hyug-Gyo;Lee, Yun-Woo;Vorburger Theodore Vincent;Reneger Tomas Brian
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.1
    • /
    • pp.47-53
    • /
    • 2006
  • The Integrated Ballistics Identification Systems (IBIS) is widely used for bullet and casing signature identification. The IBIS obtains a pair of ballistic signatures from two bullets (or casings) using optical microscopy, and estimates a correlation score which can represent the degree of signature match. However, this method largely depends on lighting and surface conditions because optical image contrast is primarily a function of test surface's slope, shadowing, multiple reflections, optical properties, and illumination direction. Moreover, it can be affected with surface height variation. To overcome these problems and improve the identification system, we used well known surface topographic techniques, such as confocal microscopy and white-light scanning interferometry. The measuring instruments were calibrated by a NIST step height standard and verified by a NIST sinusoidal profile roughness standard and a commercial roughness standard. We also suggest a new analysis method for the ballistic identification. In this method, the maximum cross-correlation function CCFmax is used to quantify the degree of signature match. If the compared signatures were exactly the same, CCFmax would be $100\%$.

An Efficient Group Key Management Scheme using Counting Bloom Filter in VANET (VANET에서 카운팅 블룸 필터를 사용한 효율적인 그룹 키 관리 기법)

  • Lee, SuYoun;Ahn, HyoBeom
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.47-52
    • /
    • 2013
  • VANET(Vehicular Ad-hoc Network) is a kind of ad hoc networks which is consist of intelligence vehicular ad nodes, and has become a hot emerging research project in many fields. It provides traffic safety, cooperative driving and etc. but has also some security problems that can be occurred in general ad hoc networks. In VANET, it has been studies that group signature method for user privacy. However, among a group of group key generation phase and group key update phase, RSU(Road-Side Unit) and the computational overhead of the vehicle occur. In this paper, we propose an efficient group key management techniques with CBF(Counting Bloom Filter). Our group key management method is reduced to the computational overhead of RSU and vehicles at the group key generation and renewal stage. In addition, our method is a technique to update group key itself.

Authority Delegation Scheme for Secure Social Community Creation in Community-Based Ubiquitous Networks (커뮤니티 기반의 유비쿼터스 네트워크 환경에서 안전한 커뮤니티 생성 권한 위임 방안)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.91-98
    • /
    • 2010
  • This paper proposes authority delegation for secure social community creation and mutual authentication scheme between the community members using proxy signature in community-based ubiquitous networks. In community-based ubiquitous network, User's context-awareness information is collected and used to provide context-awareness network service and application service for someone who need it. For the many reason, i.e. study, game, information sharing, business and conference, social community could be created by members of a social group. However, in community-based ubiquitous network, this kind of the context-awareness information could be abused and created by a malicious nodes for attack the community. Also, forgery community could be built up to attack the community members. The proposed scheme using the proxy signature provides a mutual authentication and secure secret key exchange between community members, and supports secure authority delegation that can creates social community. Also, when delegation of signing authority and mutual authentication, this scheme reduces total computation time compared to the RSA signature scheme.