• Title/Summary/Keyword: Private key

Search Result 686, Processing Time 0.024 seconds

PARTIAL KEY EXPOSURE ATTACKS ON RSA AND ITS VARIANT BY GUESSING A FEW BITS OF ONE OF THE PRIME FACTORS

  • Sarkar, Santanu;Maitra, Subhamoy
    • Bulletin of the Korean Mathematical Society
    • /
    • v.46 no.4
    • /
    • pp.721-741
    • /
    • 2009
  • Consider RSA with N = pq, q < p < 2q, public encryption exponent e and private decryption exponent d. We first study cryptanalysis of RSA when certain amount of the Most Significant Bits (MSBs) or Least Significant Bits (LSBs) of d is known. The basic lattice based technique is similar to that of Ernst et al. in Eurocrypt 2005. However, our idea of guessing a few MSBs of the secret prime p substantially reduces the requirement of MSBs or LSBs of d for the key exposure attack. Further, we consider the RSA variant proposed by Sun and Yang in PKC 2005 and show that the partial key exposure attack works significantly on this variant.

A New Construction of Fuzzy Identity Based Signature Scheme

  • Wang, Chang-Ji
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.24-29
    • /
    • 2009
  • Sahai and Waters first introduced the concept of Fuzzy Identity Based Encryption (FIBE) to provide an error-tolerance property for Identity Based Encryption (IBE) in 2005. Yang et al. extended this idea and introduced the concept of Fuzzy Identity Based Signature (FIBS) in 2008, and constructed a FIBS scheme based on Sahai and Waters's FIBE scheme. In this paper, we further formalize the notion and security model of FIBS scheme and propose a new construction of FIBS scheme based on bilinear pairing. The proposed FIBS scheme not only provide shorter public parameters, private key and signature, but also have useful structures which result in more efficient key extraction, signing and verification than that of Yang et al.'s FIBS scheme.

On Research of Certificates Management on Mobile Device (모바일 기기를 이용한 인증서 관리 연구)

  • Nam, Yong-su;Kim, Tae Yong;Jang, Won Tae;Lee, Hun Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.359-362
    • /
    • 2009
  • Qualified certificates in online financial and security transaction area are currently used for authentication of the user. The authorized user's public key certificates are stored in binary; the private key corresponding to the user's public key certificates is encrypted by the user password, and then is stored in a file. But the present management system to access the public certificates in local has some problems. In this study, we propose that the mobile public certificate management application to avoid the exist problems.

  • PDF

Qualitative Assessment of web quality and web-activities (웹사이트 품질과 웹활동에 따른 질적성과연구)

  • Lee, Jiwon;Kang, Inwon
    • International Commerce and Information Review
    • /
    • v.17 no.2
    • /
    • pp.41-65
    • /
    • 2015
  • Online firms collect consumers' private information, which serves as a valuable database for marketing activities. In order to encourage consumers to provide their private information, online firms offer high quality websites for consumers who provide private information. However, identity theft, phishing, and pharming, become critical social issues, consumers started to avoid providing their private information to online firms. Thus, consumers often provide false or limited information, which lacks value for practical use for the online firms. The main issue raised in this study is to discuss how online marketing activities has influence on consumers attitude and information providing behavior. From the result, this paper found that websites reputation had greatest impact on willingness of providing information. Also this study revealed that unauthorized use is the key factor for increasing distrust and avoidance of providing information.

  • PDF

NHS Reforms and Healthcare Market in the United Kingdom (영국의 NHS 개혁 및 의료시장 동향에 관한 연구)

  • Nam, Eun-Woo;Chun, Ki-Young
    • Korea Journal of Hospital Management
    • /
    • v.8 no.4
    • /
    • pp.1-25
    • /
    • 2003
  • The wave of globalisation initiated by marketisation has increasingly penetrated into all sectors across the world, accordingly, the health & hospital service sector could not be made no escapes, and it currently faces the order of more marketised competition more than ever. Traditionally, the characteristic of the hospital services in the UK has considered as a model of social provision by government. However, contrary to our knowledge, the sphere of the hospital service in the UK has already been immersed in by the marketisation, in which the private actors have been embedded in order to tweak the activities of the hospital service with in the European Union. As the methodology of this research, the qualitative analysis, namely the interview with some doctors in Surgery, NHS Trusts staffs and relevant specialists in has been performed on April to May, 2003. And on the other hand, the various documents related to its service have been analysed. Thus, this paper will review the characteristics of the health service sector in the UK. In doing so, it will illuminate what would be the structural factors derived from its existing system, as a result, it will shed light on how the UK government makes an effort to resolve the problematic situation by reviewing the policy direction of Foundation Hospital proposed recently. In the next stage, it will analyse how all elements consist of the hospital management in the UK has been adjusted and be likely to be changed within Europe. More specifically focuses on how the private hospital service has been managed and related with the activities of its public hospital service-NHS Trusts. Also, under the circumstance, what private health insurance companies function will be studied. In conclusion, it will be concluded that what will be the implication of Korean hospital service market so as to correspond to globally open market by WTO. Now the UK health service system has faced a turning point of becoming more health care market internally and externally pressed by global and regional factors. Thus it is meaningful to scrutinize how a key part of social provision in the health care market system tends to adjust to globally marketised regulation.

  • PDF

A Comparative Study on the Usage Level of Construction Management Services during Pre-Construction Stages - Focused on Public and Private Building Projects - (시공이전단계 CM서비스 활용수준 비교에 관한 연구 - 공공 및 민간 건축CM사업을 중심으로-)

  • Cho, Hong-Keun;Kim, Han-Soo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.3
    • /
    • pp.112-120
    • /
    • 2011
  • Since early 2000s, the use of construction management(CM) in the public and private building sectors has rapidly grown in Korea. In addition, the use of CM services during pre-construction stages has been increasingly recognized as a critical factor to succeed in construction projects. Understanding clients' needs of pre-construction CM services is important for CM firms to strategically prepare and cope with market needs. The objective of the paper is to investigate and compare the usage level of CM services in public and private building projects during pre-construction stages, and to identify key characteristics and implications for CM firms. The paper identified that although there are some differences in CM service needs between public and private sectors, time management and cost management commonly showed the higher usage level.

Comparative Study on Knowledge Protection in Public and Private Organizations (정부조직의 지식보호 - 민간기업과의 비교를 중심으로 -)

  • Lee, Hyangsoo
    • Informatization Policy
    • /
    • v.17 no.1
    • /
    • pp.78-101
    • /
    • 2010
  • Unlike knowledge sharing or knowledge transfer, knowledge protection has received little attention in the literature. Knowledge protection play a very important role in keeping organization competitive. This study explores the differences in knowledge protection between public and private organizations by T-test and regression analysis. The results of this study shows that the level of knowledge protection in public organizations is lower than that in private organizations. There is even larger difference in the level of access to key knowledge from outside between the two sectors. Such difference can be explained by the unique characteristics of public sector organizations. Understanding why the level of knowledge protection differs between the public and private sector is very important. This study presents lessons and implications for management leadership.

  • PDF

Blockchain-based Data Storage Security Architecture for e-Health Care Systems: A Case of Government of Tanzania Hospital Management Information System

  • Mnyawi, Richard;Kombe, Cleverence;Sam, Anael;Nyambo, Devotha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.364-374
    • /
    • 2022
  • Health information systems (HIS) are facing security challenges on data privacy and confidentiality. These challenges are based on centralized system architecture creating a target for malicious attacks. Blockchain technology has emerged as a trending technology with the potential to improve data security. Despite the effectiveness of this technology, still HIS are suffering from a lack of data privacy and confidentiality. This paper presents a blockchain-based data storage security architecture integrated with an e-Health care system to improve its security. The study employed a qualitative research method where data were collected using interviews and document analysis. Execute-order-validate Fabric's storage security architecture was implemented through private data collection, which is the combination of the actual private data stored in a private state, and a hash of that private data to guarantee data privacy. The key findings of this research show that data privacy and confidentiality are attained through a private data policy. Network peers are decentralized with blockchain only for hash storage to avoid storage challenges. Cost-effectiveness is achieved through data storage within a database of a Hyperledger Fabric. The overall performance of Fabric is higher than Ethereum. Ethereum's low performance is due to its execute-validate architecture which has high computation power with transaction inconsistencies. E-Health care system administrators should be trained and engaged with blockchain architectural designs for health data storage security. Health policymakers should be aware of blockchain technology and make use of the findings. The scientific contribution of this study is based on; cost-effectiveness of secured data storage, the use of hashes of network data stored in each node, and low energy consumption of Fabric leading to high performance.

Key Factors Affecting the Development of Public-Private Partnerships in Water and Wastewater Services in the Jiangsu Province, China

  • Oh, Jihye;Lee, Seungho
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.211-211
    • /
    • 2022
  • The marketization reform from the open-door policy in 1978 was not only booming export-oriented industries with foreign investment but also expanding the role of private actors in the Chinese water sector. Private Sector Participation (PSP) has become an important element in developing urban infrastructure by providing better services with advanced facilities. The rapid development of PSP-driven urban water infrastructure in China has a positive impacted on Chinese economic development, particularly in coastal areas. PPPs in some coastal areas have successfully spread out over China since China applied the first Build-Operate-Transfer (BOT) mode in the water sector in the early 1990s. The market-oriented water and wastewater, Public-Private Partnership (PPP) mechanism in the initial period of China has been transformed into a state-dominated PPP mechanism. The development pattern of the water and wastewater PPPs in China has been divided in four stages: the first period from 1984 to 2002, the second period from 2003 to 2008, the third period from 2009 to 2014, and the last period after 2015. The study aims to investigate the successful process of water and wastewater PPPs in local areas through five socioeconomic elements: export-oriented economic strategy, urbanization, cheap land policy, infrastructure investment, and water issues and climate change. In addition, the study focuses on analyzing the extent to which the Chinese government re-asserted its control over the PPP mechanism by classifying five elements in three different development Phases from early 2000 to 2020. The Jiangsu Province in the estern coastal area has actively invited PPP projects in the water and wastewater sectors. The successful introduction and rapid growth of PPPs in the urban water infrastructure has made the province an attractive area for a foreign investor.

  • PDF

An Authority-Based Efficient Key Management Protocol for Cloud Environment (클라우드 환경을 위한 효율적인 권한 기반 키 설립 프로토콜)

  • Choi, Jeong-hee;Lee, Sang-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1035-1045
    • /
    • 2018
  • Recently, with the development of IT technology, authentication methods of users using cloud services have been diversified. However, research on providing authentication information of a user using a cloud service securely according to authority has not been make until now. In this paper, we propose a key establishment protocol which can perform split authentication using secret key and access control key according to the role authority of user in Intra cloud environment. The proposed protocol generates the access control key and secret key of the user by using the attributes of the user and the generated random number($t_1$, $t_2$), and classifies the roles according to the user's authority after generating the key. Unnecessary operation processes can be reduced. As a result of the performance evaluation, the proposed protocol guarantees the security against various type of attacks that may occur in the cloud environment because the user is authenticated by dividing the access control key and secret key. The size of the ciphertext used to establish the key could be reduced by ${\sum}+1$ more than the existing protocol.