• Title/Summary/Keyword: Identity-based Message

Search Result 73, Processing Time 0.023 seconds

Preferences for Specific Identity-based Message Type under A Chinese Cultural Background

  • CHEN, Chang;TENG, Zhuoqi;CHOI, Nak-Hwan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.2
    • /
    • pp.513-522
    • /
    • 2021
  • The current research aims to explore which type of identity-based message can be more persuasive for Chinese consumers to form positive restaurant brand attitude based on their cultural orientation, and to examine the roles of brand objective relevance and psychological power state in the persuasive process. The study employs a 2(identity expression focus: warmth vs. competence) × 2(message description manner: identity-defining vs. identity-referencing) × 2(experienced power state: high vs. low) between-subjects design, and conducts an online survey where 240 Chinese participants in total has responded to the questionnaires. SPSS and AMOS programs have been used to examine the hypotheses. The findings suggest that, first, the warmth-focused messages (identity-defining messages) more positively affected Chinese consumers' object relevance than the competence-focused messages (identity-referencing messages); Second, high power-experienced Chinese consumers rather than low power consumers tend to perceive more object relevance at the warmth self-defining messages; Third, brand object relevance revealed a mediation effect in the process of the warmth-focused messages (identity-defining messages) affecting brand attitude. This research offers new insight into the relationships between consumers' cultural orientation, understandings of power, and identity-based consumer behavior, suggesting marketers should take those social influences and consumer diversities into account when developing the message to persuade consumers.

An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network

  • Hsu, Chien-Lung;Lin, Han-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2928-2940
    • /
    • 2013
  • Key exposure is a major threat to secure cryptosystems. To mitigate the impact caused by key-compromise attacks, a key-insulated cryptographic mechanism is a better alternative. For securing the large message communication in peer-to-peer networks, in this paper, we propose the first novel identity-based key-insulated encryption (IB-KIE) scheme with message linkages. Our scheme has the properties of unbounded time periods and random-access key-updates. In the proposed scheme, each client can periodically update his private key while the corresponding public one remains unchanged. The essential security assumption of our proposed scheme is based on the well-known bilinear Diffie-Hellman problem (BDHP). To ensure the practical feasibility, we also formally prove that the proposed scheme achieves the security requirement of confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) in the random oracle model.

The Impact of Senders' Identity to the Acceptance of Electronic Word-of-Mouth of Consumers in Vietnam

  • DINH, Hung;DOAN, Thanh Ha
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.2
    • /
    • pp.213-219
    • /
    • 2020
  • Studies related to Electronic Word-of-Mouth (eWOM) show that the acceptance of eWOM information is an important factor in customer purchase decisions. When consumers accept eWOM information, they tend to use that information in considering before making purchase decisions. In Viet Nam, there are few studies about eWOM information, especially on the acceptance of eWOM information. Research is conducted to test the influence of consumers on the perception of the senders' identity to the acceptance of online reviews (a kind of eWOM) in Viet Nam - a case study in Ho Chi Minh City. Using adjustment techniques, inspecting the scales and a theoretical model represent the relationship among the influential factors. The research is based on a sample of 522 consumers who use the Internet to search for product reviews before buying and used Structural Equation Modeling (SEM) to test the relationships among the variables. The research results show that the scales of the variables: Message Quality, Source Credibility, Perceived Message Usefulness, Perceived Senders' Identity, Perceived Message Credibility, Message Acceptance attain the validity and reliability in the research. The research contributes to the understanding of the determinants that influence the acceptance of eWOM information, which are informational factors, and factors related to consumer skepticism.

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

  • Wu, Weifeng;Li, Fagen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1904-1919
    • /
    • 2015
  • Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.

Cryptanalysis of an Identity-Based Message Authentication Scheme in VANETs (신원기반의 차량통신망 메시지 인증 스킴에 대한 안전성 분석)

  • Ryu, Eun-Kyung;Lee, Sung-Woon;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.167-172
    • /
    • 2013
  • In a paper recently published in the International Journal of Parallel, Emergent and Distributed Systems, Biswas et al. proposed a VANET message authentication scheme which uses an identity-based proxy signature mechanism as an underlying primitive. The authors claimed that their scheme supports various security features including the security of proxy-key, the security against message forgery and the security against replay attack, with non-repudiation and resistance to proxy-key compromise. Here, we show how an active attacker, who has no knowledge of an original message sender's private key, can compute the proxy-signature key of the corresponding message sender, meaning that the scheme is completely insecure. We also suggest an enhanced version of the protocol capable of solving such serious security holes.

Cross-Model Effect of Model Types, Product Gender Identity and Message Appeal Type (모델유형과 제품의 성 정체성 그리고 메시지 소구에 따른 크로스 광고모델 효과)

  • Kim, Eun-Hee;Yu, Seung Yeob
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.105-114
    • /
    • 2014
  • This study has recently been issued to businesses and consumers who examined the effects of cross-advertising model. Experimental design, the model type (2) ${\times}$ sexuality products (2) ${\times}$ advertising message appeal form (2) is a factorial design. The results are as follows. First, the advertising model, based on the type of cognitive response to advertising than the general model of cross-recall index was higher model. Second, the product of gender identity in response to what the advertising product for women than men was higher index of product recalls. Third, the ad attention model ANOVA results for each type of message, the main effect of appeal type was identified. In addition, the type and model of sexual identity, and message appeal type in the type of model interaction effects were found. Finally, the model-product analysis of goodness of fit, the model type and sexual identity and appeal type messages of main effect were identified. The result is more efficient advertising effect model strategies for promoting meaningful results, it is meant to be confirmed.

An Identity-based Ring Signcryption Scheme: Evaluation for Wireless Sensor Networks

  • Sharma, Gaurav;Bala, Suman;Verma, Anil K.
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.2
    • /
    • pp.57-66
    • /
    • 2013
  • Wireless Sensor Networks consist of small, inexpensive, low-powered sensor nodes that communicate with each other. To achieve a low communication cost in a resource constrained network, a novel concept of signcryption has been applied for secure communication. Signcryption enables a user to perform a digital signature for providing authenticity and public key encryption for providing message confidentiality simultaneously in a single logical step with a lower cost than that of the sign-then-encrypt approach. Ring signcryption maintains the signer's privacy, which is lacking in normal signcryption schemes. Signcryption can provide confidentiality and authenticity without revealing the user's identity of the ring. This paper presents the security notions and an evaluation of an ID-based ring signcryption scheme for wireless sensor networks. The scheme has been proven to be better than the existing schemes. The proposed scheme was found to be secure against adaptive chosen ciphertext ring attacks (IND-IDRSC-CCA2) and secure against an existential forgery for adaptive chosen message attacks (EF-IDRSC-ACMA). The proposed scheme was found to be more efficient than scheme for Wireless Sensor Networks reported by Qi. et al. based on the running time and energy consumption.

  • PDF

A Fuzzy Identity-Based Signcryption Scheme from Lattices

  • Lu, Xiuhua;Wen, Qiaoyan;Li, Wenmin;Wang, Licheng;Zhang, Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.4203-4225
    • /
    • 2014
  • Fuzzy identity-based cryptography introduces the threshold structure into identity-based cryptography, changes the receiver of a ciphertext from exact one to dynamic many, makes a cryptographic scheme more efficient and flexible. In this paper, we propose the first fuzzy identity-based signcryption scheme in lattice-based cryptography. Firstly, we give a fuzzy identity-based signcryption scheme that is indistinguishable against chosen plaintext attack under selective identity model. Then we apply Fujisaki-Okamoto method to obtain a fuzzy identity-based signcryption scheme that is indistinguishable against adaptive chosen ciphertext attack under selective identity model. Thirdly, we prove our scheme is existentially unforgeable against chosen message attack under selective identity model. As far as we know, our scheme is the first fuzzy identity-based signcryption scheme that is secure even in the quantum environment.

A Reputation System based on Blockchain for Collaborative Message Delivery over VANETs (VANET 환경에서의 협력적 메시지 전달을 위한 블록체인 기반 평판 시스템)

  • Lee, Kyeong Mo;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.12
    • /
    • pp.1448-1458
    • /
    • 2018
  • Vehicular Ad-Hoc Networks (VANETs) have become one of the active areas of research, standardization, and development because they have tremendous potentials to improve vehicle and road safety, traffic efficiency, and convenience as well as comfort to both drivers and passengers. However, message trustfulness is a challenge because the propagation of false message by malicious vehicles induces unreliable and ineffectiveness of VANETs, Therefore, we need a reliable reputation method to ensure message trustfulness. In this paper, we consider a vulnerability against the Sybil attack of the previous reputation systems based on blockchain and suggest a new reputation system which resists against Sybil attack on the previous system. We propose an initial authentication process as a countermeasure against a Sybil attack and provide a reliable reputation with a cooperative message delivery to cope with message omission. In addition, we use Homomorphic Commitment to protect the privacy breaches in VANETs environment.

Roles of Power State and Message Types on Restaurant Store Brand Attitude

  • Choi, Nak-Hwan;Dhakal, Anisha
    • Journal of Distribution Science
    • /
    • v.15 no.10
    • /
    • pp.5-14
    • /
    • 2017
  • Purpose - This research aims to find the moderation roles of power states in the effects of four message types (competence self-referencing, competence self-defining, warmth self-referencing, warmth self-defining) on brand attitude. Research design, data, and methodology - A restaurant brand was used as an experimental object, and 4(message types: warmth self-defining message, warmth self-referencing message, competence self-defining message, competence self-referencing message) × 2(power: high power and low power) between-subjects design was employed. Through on-line survey in Nepal, we collected a total of 240 individuals composed of eight experimental groups with 30 members in Nepal. Results - Consumers under low power state formed more positive brand attitude at the warmth self-defining message than any other types of message, while under high power condition, there are neither the attitude differences between competence self-referencing message and competence self-defining message, nor those between competence self-referencing message and warm self-defining message. The significant attitude differences showed between competence self-referencing message and warmth self-referencing message. Conclusions - This study contributes to the advertising theory development. Restaurant store marketers should deliver warmth self-defining message rather than the other three types of message to consumers under low power state, and they should not deliver warmth self-referencing message to consumers under high power state.