• Title/Summary/Keyword: Semi-Honest

Search Result 7, Processing Time 0.023 seconds

Deterministic Private Matching with Perfect Correctness (정확성을 보장하는 결정적 Private Matching)

  • Hong, Jeong-Dae;Kim, Jin-Il;Cheon, Jung-Hee;Park, Kun-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.10
    • /
    • pp.502-510
    • /
    • 2007
  • Private Matching is a problem of computing the intersection of private datasets of two parties. One could envision the usage of private matching for Insurance fraud detection system, Do-not-fly list, medical databases, and many other applications. In 2004, Freedman et at. [1] introduced a probabilistic solution for this problem, and they extended it to malicious adversary model and multi-party computation. In this paper, we propose a new deterministic protocol for private matching with perfect correctness. We apply this technique to adversary models, achieving more reliable and higher speed computation.

Deterministic Private Matching with Perfect Correctness (정확성을 보장하는 결정적 Private Matching)

  • Hong, Jeong-Dae;Kim, Jin-Il;Cheon, Jung-Hee;Park, Kun-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10a
    • /
    • pp.484-489
    • /
    • 2006
  • Private Matching은 각기 다른 두 참여자 (two-party)가 가진 데이터의 교집합 (intersection)을 구하는 문제이다. Private matching은 보험사기 방지시스템 (insurance fraud detection system), 의료정보 검색, 항공기 탐승 금지자 목록 (Do-not-fly list) 검색 등에 이용될 수 있으며 다자간의 계산 (multiparty computation)으로 확장하면 전자투표, 온라인 게임 등에도 이용될 수 있다. 2004년 Freedman 등은 이 문제를 확률적 (probabilistic)으로 해결하는 프로토콜 (protocol) [1]을 제안하고 악의적인 공격자 (malicious adversary) 모델과 다자간 계산으로 확장하였다. 이 논문에서는 기존의 프로토콜을 결정적 (deterministic) 방법으로 개선하여 Semi-Honest 모델에서 결과의 정확성을 보장하는 한편, 이를 악의적인 공격자 모델에 확장하여 신뢰도와 연산속도를 향상시키는 새로운 프로토콜을 제안한다.

  • PDF

An Approach Towards Secure Matchmaking Using Mobile Social Network

  • Abbas, Fizza;Hussain, Rasheed;Son, Junggab;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.698-701
    • /
    • 2013
  • Mobile social networking applications are getting increasingly popular among today's mobile applications. Mobile users find their old or new friends anywhere or anytime through mobile social network (MSN) services. MSN uses matchmaking mechanisms to discover mutual interests among different people. To discover friends in MSN, a user must share his/her private information which can be a risk for his/her personal privacy as this information can be learned by a malicious or semi honest user. In this paper we give a brief survey on MSN that includes MSN categories, components, architecture and applications. In the rest of the paper we discuss the matchmaking protocols. Finally we give some suggestions to improve the previous protocols.

A1lowing Anonymity in Fair Threshold Decryption (익명성을 제공하는 공평한 그룹 복호화 기법)

  • Kim, Jin-Il;Seo, Jung-Joo;Hong, Jeong-Dae;Park, Kun-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.6
    • /
    • pp.348-353
    • /
    • 2010
  • A threshold decryption scheme is a multi-party public key cryptosystem that allows any sufficiently large subset of participants to decrypt a ciphertext, but disallows the decryption otherwise. When performing a threshold decryption, a third party is often involved to guarantee fairness among the participants. To maintain the security of the protocol as high as possible, it is desirable to lower the level of trust and the amount of information given to the third party. In this paper, we present a threshold decryption scheme which allows the anonymity of the participants as well as the fairness by employing a semi-trusted third party (STTP) which follows the protocol properly with the exception that it keeps a record of all its intermediate computations. Our solution preserves the security and fairness of the previous scheme and reveals no information about the identities of the participants and the plaintext even though an attacker is allowed to access the storage of the STTP.

An Efficient PSI-CA Protocol Under the Malicious Model

  • Jingjie Liu;Suzhen Cao;Caifen Wang;Chenxu Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.720-737
    • /
    • 2024
  • Private set intersection cardinality (PSI-CA) is a typical problem in the field of secure multi-party computation, which enables two parties calculate the cardinality of intersection securely without revealing any information about their sets. And it is suitable for private data protection scenarios where only the cardinality of the set intersection needs to be calculated. However, most of the currently available PSI-CA protocols only meet the security under the semi-honest model and can't resist the malicious behaviors of participants. To solve the problems above, by the application of the variant of Elgamal cryptography and Bloom filter, we propose an efficient PSI-CA protocol with high security. We also present two new operations on Bloom filter called IBF and BIBF, which could further enhance the safety of private data. Using zero-knowledge proof to ensure the safety under malicious adversary model. Moreover, in order to minimize the error in the results caused by the false positive problem, we use Garbled Bloom Filter and key-value pair packing creatively and present an improved PSI-CA protocol. Through experimental comparison with several existing representative protocols, our protocol runs with linear time complexity and more excellent characters, which is more suitable for practical application scenarios.

Perceptions and Experiences of Acupuncture among Expatriates Living in Korea: A Qualitative Study (국내 거주 외국인의 침 치료 경험과 한의학에 대한 인식: 질적연구)

  • Lee, Seungmin Kathy;Park, Inhyo;Miller, David B.;Lee, Sangjae
    • Korean Journal of Acupuncture
    • /
    • v.37 no.3
    • /
    • pp.172-182
    • /
    • 2020
  • Objectives : In this study, we conducted a focus group interview among expatriates living in Korea, to investigate their experiences and perceptions of acupuncture and Korean Medicine in order to improve the usage of Korean Medicine in the medical tourism market. Methods : The inclusion criteria for the focus group interview was: (1) participants between the age of 20 to 75 years old; (2) those who had lived in Korea for more than 90 days, and (3) those who were able to express their thoughts freely in English. The participants were informed that the interviews will be recorded and transcribed. We ended recruitment once saturation of materials was met. Semi-structured interviews were conducted, and the data was analyzed after each interview. Results : The interviews were held between June to December 2016. Twenty-four participants were recruited but four dropped out and a total of twenty participants successfully finished the interviews. Six focus group interviews were conducted. Analysis revealed that Korean Medicine was relatively less known compared to Traditional Chinese Medicine or Complementary and Alternative Medicine. Participants automatically associated acupuncture with the management of pain or stress and replied that these were the areas that they thought acupuncture would be most effective. Positive experiences with acupuncture and with the acupuncture practitioners were factors that promoted the use of acupuncture whereas lack of awareness, accessibility and accreditation were factors that hindered its use. Other factors that hindered the use of acupuncture was needle phobia and the perception that acupuncture lacks scientific evidence. Conclusions : Awareness on Korean Medicine and acupuncture is low. Participants lack awareness on what diseases acupuncture can treat, the scientific evidence behind the mechanism of action, and the rigorous education system that Korean Medicine doctors must go through to get their license. Rigorous marketing should be encouraged, which includes greater exposure in the media, more honest reviews from patients, and promotion of the scientific evidence base.

Life Experience of People Living with HIV/AIDS: rising up from despair (HIV/AIDS 감염인의 감염 이후 삶의 긍정적 경험 : "추락하는 것에는 날개가 있다")

  • Kim, Kyung Mee;Kim, Min-Jung
    • Korean Journal of Social Welfare Studies
    • /
    • v.41 no.1
    • /
    • pp.251-279
    • /
    • 2010
  • In 2009 the Ministry of Health and Society reported a new milestone in longevity among people living with HIV and AIDS (PLWHA): An individual was reported to be living and healthy after 24 years with HIV/AIDS. Today, PLWHA who receive treatment are more likely to die as a result of cancer or cardiovascular diseases than HIV/AIDS. However, in Korea the public association between HIV/AIDS and death remains strong and PLWHA live with the feeling of being discarded. While great advances have been made in the treatment of HIV/AIDS, understanding of life with HIV/AIDS is just beginning. This study describes the life experiences of PLWHA after being diagnosed with HIV/AIDS. Phenomenological methods were used to analyze the transcripts of semi-structured interviews with six PLWHA. Time is a constant factor in the life experiences of PLWHA. After being diagnosed, participants were shocked, feeling as though the world was caving in and they were living with a time bomb. Compulsory disclosure left PLWHA with a feeling of disconnection from the world. Participants were fired from their jobs, resulting in poverty, isolation and a sense that they were simply waiting to die. However, health professionals informed participants that HIV/AIDS is a manageable illness. With time, PLWHA came to understand HIV/AIDS differently. In accepting their HIV infection, PLWHA created a new sense of meaning in their lives. To be honest to their loved ones and true to their own identity, PLWHA worked to "come out." The experience of coming out helped them to accept themselves as they were and understand their own strength. The most important influence on their treatment, and living with HIV/AIDS generally, was obtaining correct information about HIV/AIDS from health professionals. After accepting that they were living with HIV/AIDS, participants were able to look beyond themselves to support those around them, including family members, friends, and others who encouraged them to recognize and feel confident in their own identity.