• Title/Summary/Keyword: RSA Problem

Search Result 50, Processing Time 0.025 seconds

Efficient Oblivious Search on Encrypted Data (암호화된 데이터에서의 OT(Oblivious Transfer)를 이용한 효율적인 검색 기술)

  • Rhee, Hyun-Sook;Park, Jong-Hwan;Lee, Dong-Hoon
    • Journal of Broadcast Engineering
    • /
    • v.13 no.1
    • /
    • pp.43-52
    • /
    • 2008
  • We study the problem of search in which a server contains various multimedia contents and a user wishes to retrieve some multimedia items containing a specific without revealing to the server which items they are. Recently, Ogata and Kurosawa introduced a search scheme by using the notion of oblivious transfer. In their scheme, a user must inefficiently search and compare all the data stored in the seuer for each search query. In this paper, we propose an efficient oblivious search by using the oblivious transfer, in which a user needs not to search and compare all the data. We formally prove that the proposed scheme is secure under the hardness of RSA known target inversion problem.

Design of RFID Cryptanalysis Strengthening Protocol Using Access Time Interval scheme (접근시간 간격 확인 방식을 이용한 RFID 보안강화 프로토콜 설계)

  • Kim, Seung-Jin;Park, Seok-Cheon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.193-200
    • /
    • 2006
  • RFID technology has been gradually expanding its application areas however studies on personal space infringement along with security are insufficient. This paper proposes a new security protocol access time interval scheme and RSA algorithm to analyze existing RFID security protocol and attempts to solve the problem of lightweight protocol. Information protection for two-way channels can be enforced through the proposed protocol and other issues of sniffing and man-in-the-middle attacks can be solved by applying a mutual certification technique application among tag readers.

  • PDF

On the Enciphering by Using One-Way Function of the Finite Ring (유한환의 일향함수를 이용한 암호화에 대하여)

  • Kim, Chul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.79-84
    • /
    • 1991
  • We construct one-way function based on a finite ring. One-way function in this paper means that to find the inverse of the function is hard computationally. We have used the extension of group action to construct this function and applied it to encipher the given plain text. To decipher the enciphered text generated by this function is considerd\ed a hard problem. but not impossible theoretically. However, a successful enciphering system. for example, RSA system which depends on the difficulty of factoring, need not have mathematically perfectness.

Proposal of ID-Based Cryptosystems Integrating Digital Signature and Key Distribution (개인정보에 기초한 서명 및 키 분배 통합 암호시스템의 제안)

  • Ha, Jae-Cheol;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.3
    • /
    • pp.57-70
    • /
    • 1996
  • It would be desirable in network to implement an efficient asymmetric key cryptosystem which can not only solve the public key authentication problem but also integrate digital signature and key distribution, We propose two ID-based key distribution systems integrated with digital signature, and analyze them in computation and implementation. The first is based on the EIGamal-typed signature scheme, and the second is based on the RSA scheme, Both can be employed in one-pass and interactive key distribution systems.

CYP2E1 Genetic Polymorphism with Dietary, Tobacco, Alcohol Habits, H. pylori Infection Status and Susceptibility to Stomach Cancer in Mizoram, India

  • Malakar, Mridul;Devi, K. Rekha;Phukan, Rup Kumar;Kaur, Tanvir;Deka, Manab;Puia, Lalhriat;Baruah, Debajit;Mahanta, Jagadish;Narain, Kanwar
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.20
    • /
    • pp.8815-8822
    • /
    • 2014
  • Background: The incidence of stomach cancer in India is highest in the state of Mizoram. In this population based matched case-control study, we evaluated the relationship between CYP450 2E1 RsaI polymorphism and risk of stomach cancer taking into considering various important dietary habits along with tobacco, alcohol consumption and H. pylori infection status. Materials and Methods: A total of 105 histologically confirmed stomach cancer cases and 210 matched healthy population controls were recruited. CYP2E1 RsaI genotypes were determined by PCR-RFLP and H. pylori infection status by ELISA. Information on various dietary, tobacco and alcohol habits was recorded in a standard questionnaire. Results: Our study revealed no significant association between the CYP2E1 RsaI polymorphism and overall risk of stomach cancer in Mizoram. However, we observed a non-significant protective effect of the variant allele (A) of CYP2E1 against stomach cancer. Tobacco smokers carrying C/C genotype have three times more risk of stomach cancer, as compared to non-smokers carrying C/C genotype. Both Meiziol and cigarette current and past smokers who smoked for more than 10 times per day and carrying the (C/C) genotype are more prone to develop stomach cancer. Smoke dried fish and preserved meat (smoked/sun dried) consumers carrying C/C genotype possesses higher risk of stomach cancer. No significant association between H. pylori infection and CYP2E1 RsaI polymorphism in terms of stomach cancer was observed. Conclusions: Although no direct association between the CYP2E1 RsaI polymorphism and stomach cancer was observed, relations with different tobacco and dietary risk habits in terms of developing stomach cancer exist in this high risk population of north-eastern part of India. Further in-depth study recruiting larger population is required to shed more light on this important problem.

An Efficient ID-Based Multisignature Scheme Based on the High Residuosity Problem (고차잉여류 문제에 기반을 둔 다중서명 방식)

  • Lee, Bo-Yeong;Park, Taek-Jin;Won, Dong-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.664-671
    • /
    • 1999
  • Itakura and Nakamura proposed the first multisignature scheme based on RSA signature scheme. But if many users sign on one paper, then their scheme has a reblocking problem. In 1991, Ohta and Okamoto proposed a multisignature scheme by using Fiat-Shamir signature scheme. But in this scheme, the group of signers must generate common random number in the first round, and in the second round, they sign the message with common random number. Also L.Harn proposed a multsignature scheme which is based on the ElGamal's. In korea, S.D.Kim et al. at ICEIC'95 conference, proposed an efficient sequential multisignature scheme by using the modified Park-Won scheme. This scheme is not require an additional round to generate common random number, and has fixed signature length. In this paper, we analyze problem of Kim's multisignature scheme, and propose a new multisignature scheme based on ${\gamma}$\ulcorner residuosity problem.

  • PDF

A Study on Flow Distribution to Flocculation Basins Using DOE and RSA (실험계획법과 반응표면분석법을 적용한 응집지로의 유량분배에 관한 연구)

  • Kim, Seong-Jae;Kyung, Gyu-Sun;Jeong, Heui-Jung;Kim, Hyeong-Seop;Yang, Sa-Sun
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.35 no.12
    • /
    • pp.918-928
    • /
    • 2013
  • The inequitable flow distribution to flocculation basins is an important problem faced in many water treatment plants. This is caused by the structure of a distribution channel, the height differences of outlet weirs etc. But, a modified approach for the structures has no effectiveness to achieve flow equality. The aim of this study is to reduce the inequality by adopting optimized inlet valve opening (%) of the flocculation basins using DOE (Design of Experiments) and RSA (Response Surface Analysis). The inlet valve openings (%) and inflow distributions (%) of 6 paralleled basins were set as factors (X) and characteristics(Y) respectively. 2 level factorial experiments and RSA were conducted for optimization and regression analysis (Y = f(X) + Const.). Adopting the optimized inlet valve opening (%) at field, standard deviation of flow distribution (%) and effluent turbidity was declined from 3.80% to 0.42% and from 0.29 NTU to 0.03 NTU respectively.

A Study on the Performance Evaluation of Elliptic Curve Cryptography based on a Real Number Field (실수체 기반 타원곡선 암호의 성능 평가에 관한 연구)

  • Woo, Chan-Il;Goo, Eun-Hee;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1439-1444
    • /
    • 2013
  • Recently, as the use of the applications like online banking and stock trading is increasing by the rapid development of the network, security of data content is becoming more and more important. Accordingly, public key or symmetric key encryption algorithm is widely used in open networks such as the internet for the protection of data. Generally, public key cryptographic systems is based on two famous number theoretic problems namely factoring or discrete logarithm problem. So, public key cryptographic systems is relatively slow compared to symmetric key cryptography systems. Among public key cryptographic systems, the advantage of ECC compared to RSA is that it offers equal security for a far smaller key. For this reason, ECC is faster than RSA. In this paper, we propose a efficient key generation method for elliptic curve cryptography system based on the real number field.

IL-23 Inhibits Trophoblast Proliferation, Migration, and EMT via Activating p38 MAPK Signaling Pathway to Promote Recurrent Spontaneous Abortion

  • He, Shan;Ning, Yan;Ma, Fei;Liu, Dayan;Jiang, Shaoyan;Deng, Shaojie
    • Journal of Microbiology and Biotechnology
    • /
    • v.32 no.6
    • /
    • pp.792-799
    • /
    • 2022
  • As a vital problem in reproductive health, recurrent spontaneous abortion (RSA) affects about 1% of women. We performed this study with an aim to explore the molecular mechanism of interleukin-23 (IL-23) and find optimal or effective methods to improve RSA. First, ELISA was applied to evaluate the expressions of IL-23 and its receptor in HTR-8/SVneo cells after IL-23 treatment. CCK-8, TUNEL, wound healing and transwell assays were employed to assess the proliferation, apoptosis, migration and invasion of HTR-8/SVneo cells, respectively. Additionally, the expressions of apoptosis-, migration-, epithelial-mesenchymal transition- (EMT-) and p38 MAPK signaling pathway-related proteins were measured by western blotting. To further investigate the relationship between IL-23 and p38 MAPK signaling pathway, HTR-8/SVneo cells were treated for 1 h with p38 MAPK inhibitor SB239063, followed by a series of cellular experiments on proliferation, apoptosis, migration and invasion, as aforementioned. The results showed that IL-23 and its receptors were greatly elevated in IL-23-treated HTR-8/SVneo cells. Additionally, IL-23 demonstrated suppressive effects on the proliferation, apoptosis, migration, invasion and EMT of IL-23-treated HTR-8/SVneo cells. More importantly, the molecular mechanism of IL-23 was revealed in this study; that is to say, IL-23 inhibited the proliferation, apoptosis, migration, invasion and EMT of IL-23-treated HTR-8/SVneo cells via activating p38 MAPK signaling pathway. In conclusion, IL-23 inhibits trophoblast proliferation, migration, and EMT via activating p38 MAPK signaling pathway, suggesting that IL-23 might be a novel target for the improvement of RSA.

A Verifiable and Traceable Secondhand Digital Media Market Protocol

  • Chen, Chin-Ling;Chen, Chin-Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.8
    • /
    • pp.1472-1491
    • /
    • 2011
  • As used product transactions are currently on the rise, the demand for transactions of secondhand digital content will grow in the future; thus, learning to make secure transactions while avoiding cyber attacks becomes an important issue. In this paper, we combine the new buyer's secret key, the new buyer's watermark to embed in resold digital content, and the reseller's encrypted watermark, which can prove legal ownership of the reseller. Using the privacy homomorphism property of RSA and exponential calculus, the original seller of digital content can verify the legality of the reseller and the new buyer. We also reduced the load of encryption/decryption digital content using a partial encryption/decryption algorithm to make our protocol more efficient and practical. In the proposed protocol, the seller is not able to conduct piracy and easily frame any other innocent secondhand buyer when a case of piracy is found. In fact, piracy can be clearly traced using the privacy homomorphism property of RSA and the embedded watermark mechanism. Further, in the proposed protocol, the seller himself can trace the piracy using exponential calculus. Since it is unnecessary to trust third party participation, the conspiracy problem is resolved and the new buyer is not required to participate in the dispute. Moreover, the seller, reseller and new buyer can simultaneously benefit from the secondhand transaction.