• Title/Summary/Keyword: Secure channel

Search Result 325, Processing Time 0.033 seconds

Efficient Anonymous Broadcast Encryption with Adaptive Security

  • Zhou, Fu-Cai;Lin, Mu-Qing;Zhou, Yang;Li, Yu-Xi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4680-4700
    • /
    • 2015
  • Broadcast encryption is an efficient way to distribute confidential information to a set of receivers using broadcast channel. It allows the broadcaster to dynamically choose the receiver set during each encryption. However, most broadcast encryption schemes in the literature haven't taken into consideration the receiver's privacy protection, and the scanty privacy preserving solutions are often less efficient, which are not suitable for practical scenarios. In this paper, we propose an efficient dynamic anonymous broadcast encryption scheme that has the shortest ciphertext length. The scheme is constructed over the composite order bilinear groups, and adopts the Lagrange interpolation polynomial to hide the receivers' identities, which yields efficient decryption algorithm. Security proofs show that, the proposed scheme is both secure and anonymous under the threat of adaptive adversaries in standard model.

Secure Key Establishment Scheme using Multi-Channel in Wireless Sensor Networks (무선 센서 네트워크에서의 다중 채널을 사용한 안전한 키 설립 방법)

  • Yoo, Ki-Baek;Kim, Chong-Kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.686-689
    • /
    • 2006
  • 무선 센서 네트워크의 사용이 증가함에 따라, 센서 네트워크의 보안에 대한 연구가 중요한 이슈가 되고 있다. 그 중 센서 노드들 사이의 키 설립 방법에 대한 연구가 매우 활발히 진행되었으며, 그에 따라 다양한 연구 결과들이 제시되었다. 하지만 기존의 연구 결과들은 강력한 보안성을 제공하기는 하나 키 설립과정이 매우 복잡하기 때문에 현실적으로 이용되기에는 어렵다는 단점이 있다. 즉, 이는 실제 센서 노드에 대한 구현을 어렵게 하며, 다양한 응용 분야에서 요구하는 보안성의 제공 역시 보장하지 못한다. 이에 본 연구에서는 다중 채널을 사용한 간단한 키 설립 방법을 제시하였다. 제시된 방법은 필요한 저장 공간과 통신 횟수, 계산 횟수를 최소화 한 반면, 다중 채널을 사용함으로서 보안성은 강화하였다. 이는 다양한 분야에서 제시된 방법이 활용될 수 있음을 의미한다. 1장의 서론에 이어 2장에서는 관련연구를 설명한다. 3장에서는 배경지식을 설명하고 4장에서 제안한 프로토콜을 설명한다. 마지막으로 5장에서는 분석을 통하여 이를 증명한다.

  • PDF

A Remote Password Authentication scheme for Multiple Centers on Network (네트워크내의 다중센타를 위한 원격 암호 인증기법)

  • Jo, In-June
    • The Journal of Natural Sciences
    • /
    • v.8 no.1
    • /
    • pp.131-136
    • /
    • 1995
  • In this paper, We propose an efficient remote password authentication scheme that enables network users to access and open distributed network. Our authentication Scheme provides a pair of a center-supplied password and a user key for a network user. The center-supplied password is generated on the center, and the user key can be chosen by the network user. Each network user can access multiple centers through the open and distributed network by using single super smart card. The passwords generated by network centers are sent to the network users via secure channel, and put into their own supper smart card by themselves.

  • PDF

IPTV Delivery Architecture in 10G EPONs using ONU-Based Multicast Emulation

  • Choi, Su-Il
    • Journal of the Optical Society of Korea
    • /
    • v.12 no.2
    • /
    • pp.69-78
    • /
    • 2008
  • EPONs are a low cost, high speed solution to the bottleneck problem of broadband access networks. To support point-to-point and shared LAN emulation, EPONs use the multi-point control protocol (MPCP), which uses logical link identification (LLID) forframe tagging and filtering between the OLT and ONUs. In this paper, ONU-based multicast or multiple shared LAN emulation for IPTV services is proposed using logical group identification (LGID). Using ONUbased VLAN services, EPONs can support separate and secure connections between providers and subscribers in a simple manner. Also, differentiated IPTV channel packages can be delivered through EPONs by implementing ONU-based VLAN and IGMP snooping mechanisms.

Efficient Masking Methods Appropriate for the Block Ciphers ARIA and AES

  • Kim, Hee-Seok;Kim, Tae-Hyun;Han, Dong-Guk;Hong, Seok-Hie
    • ETRI Journal
    • /
    • v.32 no.3
    • /
    • pp.370-379
    • /
    • 2010
  • In this paper, we propose efficient masking methods for ARIA and AES. In general, a masked S-box (MS) block can be constructed in different ways depending on the implementation platform, such as hardware and software. However, the other components of ARIA and AES have less impact on the implementation cost. We first propose an efficient masking structure by minimizing the number of mask corrections under the assumption that we have an MS block. Second, to make a secure and efficient MS block for ARIA and AES, we propose novel methods to solve the table size problem for the MS block in a software implementation and to reduce the cost of a masked inversion which is the main part of the MS block in the hardware implementation.

The Secure Hybrid Authentication message protocol (안전한 하이브리드 인증 메시지 프로토콜)

  • Yang, Hyung-Kyu;Choi, Jong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.77-85
    • /
    • 2007
  • Asecure channel provides protection against interception, while an authentication system is created to protect the client and the server from fabrication attacks. This paper proposes a hybrid authentication algorithm, which fixes the lapses problem encountered in the SSL authentication. Also, the Proposed hybrid authentication system has been created to protect the client and the server from modification and fabrication attacks. By using a modified three-way authentication there is no need for a timeserver. thus timestamps are not needed.

  • PDF

(A Key Roaming Protocol with a New Password Hardening Scheme) (새로운 패스워드 강화 기법을 이용한 키 로밍 프로토콜)

  • 정현철;김승호
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.387-396
    • /
    • 2003
  • In this paper, we present more efficient Protocol than that of Ford and Kaliski. We use RSA in the roaming protocol and it Plays decisive role to reduce the total time cost. We show that our protocol is safe from various attacks. We present the performance of our protocol and verify that This protocol needs fewer secure channel like SSL than other protocols.

Role Based Smart Contract For Data sharing

  • Joachim, Kweka Bruno;Rhee, Kyung-Hyune
    • Annual Conference of KIPS
    • /
    • 2018.10a
    • /
    • pp.235-237
    • /
    • 2018
  • The Internet has allowed many things to move fast, including sharing of data, files and others within a second. Many domains use applications range from IoT, smart cities, healthcare, and organizations to share the data when necessary. However, there are some challenges faced by existing systems that works on centralized nature. Such challenges are data breach, trustiness issue, unauthorized access and data fraud. Therefore in this work, we focus on using a smart contract which is used by blockchain platform and works on decentralized form. Furthermore, in this work our contract provides an access to the file uploaded onto the decentralized storage such as IPFS. By leveraging smart contract-role based which consist of a contract owner who can manage the users when access the certain resources such as a file and as well as use of decentralized storage to avoid single point of failure and censorship over secure communication channel. We checked the gas cost of the smart contract since most of contracts tends to be a high cost.

A Study on DPA Countermeasures of the block-type ciphers (블록 형태 암호에서의 DPA 방어기술 연구)

  • 이훈재;최희봉;이상곤
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.4
    • /
    • pp.1-8
    • /
    • 2002
  • Attacks have been proposed that use side information as timing measurements, power consumption, electromagnetic emissions and faulty hardware. Elimination side-channel information of prevention it from being used to attack a secure system is an active ares of research. In this paper, differential power analysis techniques used to attack DES are compared and analyzed finally, we propose a software prevention idea of DPA attack for DES-like ciphers.

  • PDF

On Securing Web-based Educational Online Gaming: Preliminary Study

  • Yani, Kadek Restu;Prihatmanto, Ary Setijadi;Rhee, Kyung-Hyune
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.767-770
    • /
    • 2015
  • With the deployment of web-based educational game over the internet, the user's registration becomes a critical element. The user is authenticated by the system using username, password, and unique code. However, it cannot be handled properly because the data is transmitted through insecure channel on the network. Hence, security requirement is needed to avoid identity leakage from malicious user. In this paper, we propose a secure communication approach using SSL protocol for an online game. We also describe the security requirements for our approach. In future work, we intend to configure and implement the SSL protocol by enabling HTTPS in web-based online game.