• Title/Summary/Keyword: Key issue

Search Result 1,215, Processing Time 0.027 seconds

Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption

  • Du, Jiajie;HelIl, Nurmamat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3274-3297
    • /
    • 2021
  • Permission delegation is an important research issue in access control. It allows a user to delegate some of his permissions to others to reduce his workload, or enables others to complete some tasks on his behalf when he is unavailable to do so. As an ideal solution for controlling read access on outsourced data objects on the cloud, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has attracted much attention. Some existing CP-ABE schemes handle the read permission delegation through the delegation of the user's private key to others. Still, these schemes lack the further consideration of granularity and traceability of the permission delegation. To this end, this article proposes a flexible and fine-grained CP-ABE key delegation approach that supports white-box traceability. In this approach, the key delegator first examines the relations between the data objects, read permission thereof that he intends to delegate, and the attributes associated with the access policies of these data objects. Then he chooses a minimal attribute set from his attributes according to the principle of least privilege. He constructs the delegation key with the minimal attribute set. Thus, we can achieve the shortest delegation key and minimize the time of key delegation under the premise of guaranteeing the delegator's access control requirement. The Key Generation Center (KGC) then embeds the delegatee's identity into the key to trace the route of the delegation key. Our approach prevents the delegatee from combining his existing key with the new delegation key to access unauthorized data objects. Theoretical analysis and test results show that our approach helps the KGC transfer some of its burdensome key generation tasks to regular users (delegators) to accommodate more users.

Design of CEK Distributed Management System for Secure DRM Key Management. (안전한 DRM 키 관리를 위한 비밀 분산 관리 시스템 설계)

  • Sung Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.390-396
    • /
    • 2005
  • With the spread of computer and development of internet service, the varied contents and digital data has been produced, then provided. The digital contents are more efficiently able to be created, produced, provided as well as distributed, on the other hand, its own copyrights seem to be more easily broken than analogue contents due to the convenience to make copies of original contents. Therefore, protecting copyrights recently become the key issue. DRM(Digital Rights Management) is the current technology to protect digital contents from duplication but it sometimes causes problems in the key-management. In this thesis, we would first like to analyze DRM and find out some trouble in the key-management of it. Finally, we will show CDMS(CEK Distributed Management System) to improve DRM out of the key-management problem and continue to study for better key-management system with it.

A Highly Secure Identity-Based Authenticated Key-Exchange Protocol for Satellite Communication

  • Yantao, Zhong;Jianfeng, Ma
    • Journal of Communications and Networks
    • /
    • v.12 no.6
    • /
    • pp.592-599
    • /
    • 2010
  • In recent years, significant improvements have been made to the techniques used for analyzing satellite communication and attacking satellite systems. In 2003, a research team at Los Alamos National Laboratory, USA, demonstrated the ease with which civilian global positioning system (GPS) spoofing attacks can be implemented. They fed fake signals to the GPS receiver so that it operates as though it were located at a position different from its actual location. Moreover, Galileo in-orbit validation element A and Compass-M1 civilian codes in all available frequency bands were decoded in 2007 and 2009. These events indicate that cryptography should be used in addition to the coding technique for secure and authenticated satellite communication. In this study, we address this issue by using an authenticated key-exchange protocol to build a secure and authenticated communication channel for satellite communication. Our protocol uses identity-based cryptography. We also prove the security of our protocol in the extended Canetti-Krawczyk model, which is the strongest security model for authenticated key-exchange protocols, under the random oracle assumption and computational Diffie-Hellman assumption. In addition, our protocol helps achieve high efficiency in both communication and computation and thus improve security in satellite communication.

A Private Key Management Guideline For Secure Blockchain-Based Services (안전한 블록체인 기반 서비스를 위한 개인키 관리 가이드라인)

  • Noh, Siwan;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.899-914
    • /
    • 2022
  • A blockchain-based decentralized service can offer reliable services without the centralized server by operating the system based on the consensus among byzantine participants. Participants can interact with the blockchain network through a digital signature mechanism but the private key management issue remains unresolved. NIST SP800-57 provides a key-management guidance but this guidance is not appropriate for blockchain-based services because it does not consider a decentralized environment. In this paper, we define the core functions of the blockchain wallet application for private key management and present security protections according to NIST SP800-57, as well as related techniques to satisfy them. Finally, we propose the private key management guideline for secure blockchain-based decentralized services.

3D Range Measurement using Infrared Light and a Camera (적외선 조명 및 단일카메라를 이용한 입체거리 센서의 개발)

  • Kim, In-Cheol;Lee, Soo-Yong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.10
    • /
    • pp.1005-1013
    • /
    • 2008
  • This paper describes a new sensor system for 3D range measurement using the structured infrared light. Environment and obstacle sensing is the key issue for mobile robot localization and navigation. Laser scanners and infrared scanners cover $180^{\circ}$ and are accurate but too expensive. Those sensors use rotating light beams so that the range measurements are constrained on a plane. 3D measurements are much more useful in many ways for obstacle detection, map building and localization. Stereo vision is very common way of getting the depth information of 3D environment. However, it requires that the correspondence should be clearly identified and it also heavily depends on the light condition of the environment. Instead of using stereo camera, monocular camera and the projected infrared light are used in order to reduce the effects of the ambient light while getting 3D depth map. Modeling of the projected light pattern enabled precise estimation of the range. Identification of the cells from the pattern is the key issue in the proposed method. Several methods of correctly identifying the cells are discussed and verified with experiments.

Binary Hashing CNN Features for Action Recognition

  • Li, Weisheng;Feng, Chen;Xiao, Bin;Chen, Yanquan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4412-4428
    • /
    • 2018
  • The purpose of this work is to solve the problem of representing an entire video using Convolutional Neural Network (CNN) features for human action recognition. Recently, due to insufficient GPU memory, it has been difficult to take the whole video as the input of the CNN for end-to-end learning. A typical method is to use sampled video frames as inputs and corresponding labels as supervision. One major issue of this popular approach is that the local samples may not contain the information indicated by the global labels and sufficient motion information. To address this issue, we propose a binary hashing method to enhance the local feature extractors. First, we extract the local features and aggregate them into global features using maximum/minimum pooling. Second, we use the binary hashing method to capture the motion features. Finally, we concatenate the hashing features with global features using different normalization methods to train the classifier. Experimental results on the JHMDB and MPII-Cooking datasets show that, for these new local features, binary hashing mapping on the sparsely sampled features led to significant performance improvements.

SCALING ANALYSIS IN BEPU LICENSING OF LWR

  • D'auria, Francesco;Lanfredini, Marco;Muellner, Nikolaus
    • Nuclear Engineering and Technology
    • /
    • v.44 no.6
    • /
    • pp.611-622
    • /
    • 2012
  • "Scaling" plays an important role for safety analyses in the licensing of water cooled nuclear power reactors. Accident analyses, a sub set of safety analyses, is mostly based on nuclear reactor system thermal hydraulics, and therefore based on an adequate experimental data base, and in recent licensing applications, on best estimate computer code calculations. In the field of nuclear reactor technology, only a small set of the needed experiments can be executed at a nuclear power plant; the major part of experiments, either because of economics or because of safety concerns, has to be executed at reduced scale facilities. How to address the scaling issue has been the subject of numerous investigations in the past few decades (a lot of work has been performed in the 80thies and 90thies of the last century), and is still the focus of many scientific studies. The present paper proposes a "roadmap" to scaling. Key elements are the "scaling-pyramid", related "scaling bridges" and a logical path across scaling achievements (which constitute the "scaling puzzle"). The objective is addressing the scaling issue when demonstrating the applicability of the system codes, the "key-to-scaling", in the licensing process of a nuclear power plant. The proposed "road map to scaling" aims at solving the "scaling puzzle", by introducing a unified approach to the problem.

A Plan & Research of Perceptual Color Designation in China Public Residential Housing - Centered In the Boiling Public Residential Housing After 2000 - (중국 공동주택 거실의 감성적 색채계획에 관한 연구 - 2000년 이후의 북경지역의 공동주택을 중심으로 -)

  • Rui, Xu;Hong, Kwan-Seon
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2008.05a
    • /
    • pp.105-108
    • /
    • 2008
  • Beijing as one of the prosperous cities has been attracting more and more to the people in China and overseas because of the coming Olympic Games. And the housing enterprises have become extremely popular as follows. The request of housing designation has also been increased and a color factor should be the key point of housing designation. This study is a research of perceptual color designation in public residential housing in Beijing. In particular, this study will deal with the color designation development trend of public residential housing in Beijing after an analysis of color designation of high-class residential housing from 2000 to 2007 in Beijing. Color around people is not only understood more rationally and personally in 21 century but also it is pursued to get a brand-newly incentive from tradition. While color could give housing many wonderful looks. Chromatics people have had a deeper acknowledge of color and color function so color has played a key role of housing designation. Color effect on people in physical and physiology aspect is getting more important. The color issue are one of the most effective and efficient factor in the in public residential housing, therefore this study deal with this issue 'How to effectively use the color in public residential housing space.

  • PDF

Robust Fuzzy Control of a Class of Nonlinear Descriptor Systems with Time-Varying Delay

  • Yan Wang;Sun, Zeng-Qi;Sun, Fu-Chun
    • International Journal of Control, Automation, and Systems
    • /
    • v.2 no.1
    • /
    • pp.76-82
    • /
    • 2004
  • A robust fuzzy controller is designed to stabilize a class of solvable nonlinear descriptor systems with time-varying delay. First, a new modeling and control method for nonlinear descriptor systems is presented with a fuzzy descriptor model. A sufficient condition for the existence of the fuzzy controller is given in terms of a series of LMIs. Then, a less conservative fuzzy controller design approach is obtained based on the fuzzy rules and weights. This method includes the interactions of the different subsystems into one matrix. The effectiveness of the presented approach and the design procedure of the fuzzy controller are illustrated by way of an example.

Key-Frame Based Real-Time Fluid Simulations (키-프레임 기반 실시간 유체 시뮬레이션)

  • Ryu, Ji-Hyun;Park, Sang-Hun
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.11
    • /
    • pp.1515-1528
    • /
    • 2006
  • Systems for physically based fluid animation have developed rapidly in the visual special effects industry and can make very high quality images. However, in the real-time application fields such as computer game, the simulation speed is more critical issue than image quality. This paper presents a real-time method for animating fluid using programmable graphics pipeline. We show that once two key-frames are given, the technique can interactively generate a sequence of images changing from the source key-frame to the target.

  • PDF