• Title/Summary/Keyword: Private key

Search Result 686, Processing Time 0.026 seconds

A Study on Key Issues of Vitalizing the Governance of Rural Area Development and Policy Improvement Plans: Focusing on the Case of Regions in Chungcheongnam-do with Privately Entrusted Intermediary Support Organizations for the Community building Established (농촌 마을만들기 거버넌스의 활성화를 위한 주요 쟁점 및 정책 개선방안에 관한 연구: 충남지역 내 민간위탁형 마을만들기 중간지원조직 설치 지역을 사례로)

  • Ko, Kyoung-Ho
    • Korean Journal of Organic Agriculture
    • /
    • v.29 no.1
    • /
    • pp.51-73
    • /
    • 2021
  • This study is intended to derive the key issues on vitalization of the governance of rural area development for 6 cities and counties in Chungcheongnam-do where privately entrusted intermediary support organizations have been established and to present their improvement plans of policy. The findings of the study have shown the governance for the case regions is still being characterized with a very formal governance being dominated by the strong administrative initiative and expediency. What have been presented as the improvement plans of policy are as follows: First, core provisions of the ordinances must be strengthened to mandatory regulations, and some ways to check and supplement such as monitoring, policy forums by public-private partnership, etc. are required for the sake of the effective operation of the ordinances. Second, in relation to the bases of competence according to the roles of core governance players, it is necessary to overcome the limitations of job rotation system, align the administrative support systems, expand the functions of a policy committee based on public-private cooperation and operate it effectively in the case of administration, and to strengthen a footing of a civilian community and the perspectives of political incubation in administration and provide support projects contributing to the growth of the corporations in the case of the entrusted corporation, and to align the operating systems of the centers, review the introduction of a system with a full-time center head, continuously provide specialized education and improve the working environment in the case of the support centers.

A Comparative Analysis of PKI Authentication and FIDO Authentication (PKI 인증과 FIDO 인증에 대한 비교 분석)

  • Park, Seungchul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1411-1419
    • /
    • 2017
  • The two factor authentication capability, private key possession and key protection password knowledge, and the strong public key cryptography protocol of PKI authentication have largely contributed to the rapid construction of Internet transaction trusted infrastructure. The reusability of a certificate-based identity for every PKI site was another contribution factor of the spread of PKI authentication. Nevertheless, the PKI authentication has been criticised mainly for the cost of PKI construction, inconvenience of individual certificate management, and difficulties of password management. Recently FIDO authentication has received high attention as an alternative of the PKI authentication. The FIDO authentication is also based on the public key cryptography which provides strong authentication services, but it does not require individual certificate issuance and provides user-friendly and secure authentication services by integrating biometric technologies. The purpose of this paper is to concretely compare the PKI-authentication and FIDO-authentication and, based on the analysis result, to propose their corresponding applications.

An Individual Privacy Protection Design for Smart Tourism Service based on Location (위치 기반 스마트 관광 서비스를 위한 개인 프라이버시 보호 설계)

  • Cho, Cook-Chin;Jeong, Eun-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.439-444
    • /
    • 2016
  • This paper proposes the technique to protect the privacy of those who uses Smart Tourism Service based on location. The proposed privacy protection technique (1) generates a shared private key, OTK(One Time Key) without information exchanging Users with a Tourism Server and provides Users and a Tourism Server with message confidentiality by encrypting data with the key, (2) concatenates users' ID, login time(timestamp), and randomly-generated nonce, generates OTK by hashing with a hash function, encrypts users' location information and query by using the operation of OTK and XOR and provides Users and a Tourism Server with message confidentiality by sending the encrypted result. (3) protects a message replay attack by adding OTK and timestamp. Therefore, this paper not only provides data confidentiality and users' privacy protection but also guarantees the safety of location information and behavior pattern data.

Study on a Secure Authentication and Authorization Protocol based on Kerberos (커버로스 기반의 안전한 인증 및 허가 프로토콜 에 관한 연구)

  • 김은환;김명희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.737-749
    • /
    • 2004
  • Kerberos authenticates clients using symmetric-key cryptography, and supposed to Oust other systems of the realm in distributed network environment. But, authentication and authorization are essential elements for the security. In this paper, we design an efficient and secure authentication/authorization mechanism by introducing the public/private-key and installing the proxy privilege server to Kerberos. In the proposed mechanism, to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we reduce the number of keys by simplifying authentication steps. Proxy privilege server certifies privilege request of client and issues a privilege attribute certificate. Application server executes privilege request of client which is included a privilege attribute certificate. Also, a privilege attribute certificate is used in delegation. We design an efficient and secure authentication/authorization algorithm with Kerberos.

A Secure Data Processing Using ID-Based Key Cryptography in Mobile Cloud Computing (모바일 클라우드 컴퓨팅 환경에서 ID-기반 키 암호화를 이용한 안전한 데이터 처리 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.3-8
    • /
    • 2015
  • Most mobile cloud computing system use public key cryptography to provide data security and mutual authentication. A variant of traditional public key technologies called Identity-Based Cryptography(IBC) has recently received considerable attention. The certificate-free approach of IBC may well match the dynamic qualities of cloud environment. But, there is a need for a lightweight secure framework that provides security with minimum processing overhead on mobile devices. In this paper, we propose to use hierarchical ID-Based Encryption in mobile cloud computing. It is suitable for a mobile network since it can reduce the workload of root Public Key Generators by delegating the privilege of user authentication and private key generation. The Identity-Based Encryption and Identity-Based Signature are also proposed and an ID-Based Authentication scheme is presented to secure data processing. The proposed scheme is designed by one-way hash functions and XOR operations, thus has low computation costs for mobile users.

Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing

  • Guangwei Xu;Chen Wang;Shan Li;Xiujin Shi;Xin Luo;Yanglan Gan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.998-1019
    • /
    • 2024
  • Mobile cloud computing is a very attractive service paradigm that outsources users' data computing and storage from mobile devices to cloud data centers. To protect data privacy, users often encrypt their data to ensure data sharing securely before data outsourcing. However, the bilinear and power operations involved in the encryption and decryption computation make it impossible for mobile devices with weak computational power and network transmission capability to correctly obtain decryption results. To this end, this paper proposes an outsourcing decryption algorithm of verifiable transformed ciphertext. First, the algorithm uses the key blinding technique to divide the user's private key into two parts, i.e., the authorization key and the decryption secret key. Then, the cloud data center performs the outsourcing decryption operation of the encrypted data to achieve partial decryption of the encrypted data after obtaining the authorization key and the user's outsourced decryption request. The verifiable random function is used to prevent the semi-trusted cloud data center from not performing the outsourcing decryption operation as required so that the verifiability of the outsourcing decryption is satisfied. Finally, the algorithm uses the authorization period to control the final decryption of the authorized user. Theoretical and experimental analyses show that the proposed algorithm reduces the computational overhead of ciphertext decryption while ensuring the verifiability of outsourcing decryption.

The Distributed Authentication and Key Exchange Protocols for Smartcard (스마트카드에 적용가능한 분산형 인증 및 키 교환 프로토콜)

  • Oh Heung-Ryongl;Yoon Ho-Sun;Youm Heung-Youl
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.17-30
    • /
    • 2005
  • A PAK(Password-Authenticated Key Exchange) protocol is used as a protocol to provide both the mutual authentication and allow the communication entities to share the session key for the subsequent secure communication, using the human-memorable portable short-length password, In this paper, we propose distributed key exchange protocols applicable to a smartcard using the MTI(Matsumoto, Takashima, Imai) key distribution protocol and PAK protocol. If only one server keeps the password verification data which is used for password authentication protocol. then It could easily be compromised by an attacker, called the server-compromised attack, which results in impersonating either a user or a server, Therefore, these password verification data should be distributed among the many server using the secret sharing scheme, The Object of this paper Is to present a password-based key exchange protocol which is to allow user authentication and session key distribution, using the private key in a smartcard and a password typed by a user. Moreover, to avoid the server-compromised attack, we propose the distributee key exchange protocols using the MTI key distribution protocol, And we present the security analysis of the proposed key exchange protocol and compare the proposed protocols with the existing protocols.

  • PDF

A Study on the Present Status of Development by Project Types of Environmental Assessment System (환경성평가제도 대상사업 유형별 개발실태 분석 연구 - 경기도의 개발사업을 대상으로 -)

  • Sung, Hyun-Chan
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.11 no.6
    • /
    • pp.130-142
    • /
    • 2008
  • The objective of this study is to analyze the types and current status of development projects that underwent environment assessment in recent three years and provide basic data to encourage environment-friendly development projects in the future. This study was conducted by analyzing the pre-environment review reports and environment impact statements of development projects that took place in Gyeonggi province. Key findings are as follows. First, a total of 2,465 development projects spanning $173km^2$ were undertaken in Gyeonggi province in recent three years. This is equivalent to three times of the area of Anyang city. Second, types of development projects were in the order of factories and industrial parks, road construction, town (housing estates) development, sports facilities and waste treatment facilities. Public projects accounted for about 30%, while private investment projects represented 70%, indicating that private sector projects were as twice as high. The findings of this study show that the development density of Gyeonggi-do should be examined as a whole in order to develop a comprehensive, long-term plan and harmonize conservation and development systematically in Gyeonggi-do in a holistic perspective.

Digital Hologram Watermarking using Quad-tree Fresnelet Transform (Quad-tree Fresnelet 변환을 이용한 디지털 홀로그램 워터마킹)

  • Seo, Young Ho;Koo, Ja Myung;Lee, Yoon Hyuk;Kim, Dong Wook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.79-89
    • /
    • 2013
  • This paper proposes a watermarking scheme to protect ownership of a digital hologram, an ultra-high value-added content. It performs pre-defined levels of quad-tree Fresnelet transforms. The relationship among the same-positional-blocks is extracted as the digital pre-watermark. For the relationship, we use properties of a digital hologram that a hologram pixel retains all the information of the object and that the same size of partial holograms reconstructs the same size of object but different in their view points. Also we mix a set of private data with the pre-watermark and the result is encrypted by a block cipher algorithm with a private key. Experimental results showed that the proposed scheme is very robust for the various malicious and non-malicious attacks. Also because it extracts the watermarking data instead of inserting, the watermarking process does not harm the original hologram data. So, it is expected to be used effectively for invisible and robust watermark for digital holograms.

Public Acceptance and Economic Evaluation of Biotechnology (생명공학(生命工學) 인지도(認知度) 및 경제적(經濟的) 가치평가(價値評價))

  • Lim, Jae-Hwan;Hyeon, Byung-Hwan
    • Korean Journal of Agricultural Science
    • /
    • v.24 no.1
    • /
    • pp.75-84
    • /
    • 1997
  • Modem biotechnology, specifically for the use of recombinant DNA(rDNA), has brought about a revolution in our ability to control and use life forms. Most of the world's leading countries view biotechnology as the key scientific and industrial discipline for the 21st century and are making all - out efforts for scientific and technological advance in the related fields. The impact of biotechnology on the nation's economy has been growing explosively as such diverse industries invested increasingly on the fruits of biotechnological research. However, such an impact could only be realized through concerted endeavours from the government to private sectors for guarantee of the successful technological advances in this scientific area. There are risks associated with every technology; the classical application of biotechnology has not been exempt. For example, the introduction of bio-tech to agriculture might be destroied the ecosystems. Therefore, to increase the research budgets by the government and private sectors, we need to identify the public attitudes and preference on the acceptance of bio-technology and on the potential economic value of it. For the study, we surveied 959 persons including students enrolled in college of agriculture, Chungnam National University. And to measure the economic value of biotechnology, we use the Contingent Valuation Method(CVM) which is considered as the new approaching method in the bio-technology field.

  • PDF