• Title/Summary/Keyword: Key Ring

Search Result 220, Processing Time 0.031 seconds

Efficient Load Balancing Algorithms for a Resilient Packet Ring

  • Cho, Kwang-Soo;Joo, Un-Gi;Lee, Heyung-Sub;Kim, Bong-Tae;Lee, Won-Don
    • ETRI Journal
    • /
    • v.27 no.1
    • /
    • pp.110-113
    • /
    • 2005
  • The resilient packet ring (RPR) is a data optimized ring network, where one of the key issues is on load balancing for competing streams of elastic traffic. This paper suggests three efficient traffic loading algorithms on the RPR. For the algorithms, we evaluate their efficiency via analysis or simulation.

  • PDF

A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography

  • Rajendiran, Kishore;Sankararajan, Radha;Palaniappan, Ramasamy
    • ETRI Journal
    • /
    • v.33 no.5
    • /
    • pp.791-801
    • /
    • 2011
  • Security in wireless sensor networks (WSNs) is an upcoming research field which is quite different from traditional network security mechanisms. Many applications are dependent on the secure operation of a WSN, and have serious effects if the network is disrupted. Therefore, it is necessary to protect communication between sensor nodes. Key management plays an essential role in achieving security in WSNs. To achieve security, various key predistribution schemes have been proposed in the literature. A secure key management technique in WSN is a real challenging task. In this paper, a novel approach to the above problem by making use of elliptic curve cryptography (ECC) is presented. In the proposed scheme, a seed key, which is a distinct point in an elliptic curve, is assigned to each sensor node prior to its deployment. The private key ring for each sensor node is generated using the point doubling mathematical operation over the seed key. When two nodes share a common private key, then a link is established between these two nodes. By suitably choosing the value of the prime field and key ring size, the probability of two nodes sharing the same private key could be increased. The performance is evaluated in terms of connectivity and resilience against node capture. The results show that the performance is better for the proposed scheme with ECC compared to the other basic schemes.

Generic Constructions for Strong Designated Verifier Signature

  • Feng, Deng-Guo;Xu, Jing;Chen, Wei-Dong
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.159-172
    • /
    • 2011
  • A designated verifier signature is a special type of digital signature, which convinces a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party. A strong designated verifier signature scheme enhances the privacy of the signer such that no one but the designated verifier can verify the signer's signatures. In this paper we present two generic frame works for constructing strong designated verifier signature schemes from any secure ring signature scheme and any deniable one-pass authenticated key exchange protocol, respectively. Compared with similar protocols, the instantiations of our construction achieve improved efficiency.

A CONCEPT UNIFYING THE ARMENDARIZ AND NI CONDITIONS

  • Chun, Young;Jeon, Young-Cheol;Kang, Sung-Kyung;Lee, Key-Nyoung;Lee, Yang
    • Bulletin of the Korean Mathematical Society
    • /
    • v.48 no.1
    • /
    • pp.115-127
    • /
    • 2011
  • We study the structure of the set of nilpotent elements in various kinds of ring and introduce the concept of NR ring as a generalization of Armendariz rings and NI rings. We determine the precise relationships between NR rings and related ring-theoretic conditions. The Kothe's conjecture is true for the class of NR rings. We examined whether several kinds of extensions preserve the NR condition. The classical right quotient ring of an NR ring is also studied under some conditions on the subset of nilpotent elements.

Balancing Inter-Ring Loads on SONET Dual-Ring without Demand Splitting

  • Lee, Chae-Y.;Moon, Jung-H.
    • IE interfaces
    • /
    • v.9 no.3
    • /
    • pp.64-71
    • /
    • 1996
  • In the survivability and simplicity aspect, SONET Self-healing Ring(SHR) is one of the most important schemes for the high-speed telecommunication networks. Since the ring capacity requirement is defined by the largest STS-1 cross-section in the ring, load balancing is the key issue in the design of SONET SHR. Recently, most of the research on load balancing problem have been concentrated on the SONET single-ring case. However, in certain applications, multiple-ring configuration is necessary because of the geographical limitations or the need for extra bandwidth. In this paper, the load balancing problem for SONET dual-ring is considered by assuming symmetric inter-ring demands. We present a linear programming based formulation of the problem. Initial solution and improvement procedures are presented, which solves the routing and interconnection between the two rings for each demand. Computational experiments are performed on various size of networks with randomly generated demand sets. Results show that the proposed algorithm is excellent in both the solution quality and the computational time requirement. The average error bound of the solutions obtained is 0.26% of the optimum.

  • PDF

A Study of SPA Vulnerability on 8-bit Implementation of Ring-LWE Cryptosystem (8 비트 구현 Ring-LWE 암호시스템의 SPA 취약점 연구)

  • Park, Aesun;Won, Yoo-Seung;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.439-448
    • /
    • 2017
  • It is news from nowhere that post-quantum cryptography has side-channel analysis vulnerability. Side-channel analysis attack method and countermeasures for code-based McEliece cryptosystem and lattice-based NTRU cryptosystem have been investigated. Unfortunately, the investigation of the ring-LWE cryptosystem in terms of side-channel analysis is as yet insufficient. In this paper, we propose a chosen ciphertext simple power analysis attack that can be applied when ring-LWE cryptography operates on 8-bit devices. Our proposed attack can recover the key only with [$log_2q$] traces. q is a parameter related to the security level. It is used 7681 and 12289 to match the common 128 and 256-bit security levels, respectively. We identify the vulnerability through experiment that can reveal the secret key in modular add while the ring-LWE decryption performed on real 8-bit devices. We also discuss the attack that uses a similarity measurement method for two vectors to reduce attack time.

A New Type of CPPM Machine with Stator Axial Magnetic Ring

  • Xie, Kun;Li, Xinhua;Ma, Jimin;Wu, Xiaojiang;Yi, Hong;Hu, Gangyi
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.3
    • /
    • pp.1285-1293
    • /
    • 2018
  • This paper proposes a new type of consequent-pole permanent-magnet (CPPM) machine with stator axial magnetic ring that increases torque capability over a wide speed range and enhances efficiency for the built-in rare-earth permanent magnet synchronous machine used in new energy vehicles. The excitation winding of the CPPM hybrid excitation synchronous machine in the stator is replaced by ferrite magnetic ring to simplify the structure and manufacturing process of the machine. The basic structure and magnetic regulation principle of the proposed machine are introduced and compared with the traditional interior rare-earth permanent magnet synchronous machine and CPPM hybrid excitation synchronous machine. Finally, experimental results of a new type of CPPM synchronous motor prototype with axial magnetic ring are introduced in the paper.

Countermeasure against Chosen Ciphertext Spa Attack of the Public-Key Cryptosystem Based on Ring-Lwe Problem (Ring-LWE 기반 공개키 암호시스템의 선택 암호문 단순전력분석 공격 대응법)

  • Park, Aesun;Won, Yoo-Seung;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1001-1011
    • /
    • 2017
  • A lattice-based cryptography is known as one of the post-quantum cryptographies. Ring-LWE problem is an algebraic variant of LWE, which operates over elements of polynomial rings instead of vectors. It is already known that post-quantum cryptography has side-channel analysis vulnerability. In 2016, Park et al. reported a SPA vulnerability of the public key cryptosystem, which is proposed by Roy et al., based on the ring-LWE problem. In 2015 and 2016, Reparaz et al. proposed DPA attack and countermeasures against Roy cryptosystem. In this paper, we show that the chosen ciphertext SPA attack is also possible for Lyubashevsky cryptosystem which does not use NTT. And then we propose a countermeasure against CCSPA(Chosen Ciphertext SPA) attack and we also show through experiment that our proposed countermeasure is secure.

Efficient Identity-Based Generalized Ring Signcryption Scheme

  • Zhou, Caixue;Cui, Zongmin;Gao, Guangyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5553-5571
    • /
    • 2016
  • In this paper, we introduce a new concept called generalized ring signcryption (GRSC), which can achieve ring signature and ring signcryption functions with only one key pair and one algorithm. It is very useful for a system which has a large number of users, or has limited storage space, or whose function requirements may be changed later. We give a formal definition and a security model of GRSC and propose a concrete scheme based on bilinear pairings. In the random oracle model, the scheme's confidentiality can be proved under the GBDH assumption, and its unforgeability can be proved under GDH' assumption, and what is more, this scheme also allows unconditional anonymity. Compared with other identity-based ring signcryption schemes that use bilinear pairings as well, our scheme is a highly efficient one.