• Title/Summary/Keyword: Symmetric-Key

Search Result 347, Processing Time 0.036 seconds

A Quantum Resistant Lattice-based Blind Signature Scheme for Blockchain (블록체인을 위한 양자 내성의 격자 기반 블라인드 서명 기법)

  • Hakjun Lee
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.76-82
    • /
    • 2023
  • In the 4th industrial revolution, the blockchain that distributes and manages data through a P2P network is used as a new decentralized networking paradigm in various fields such as manufacturing, culture, and public service. However, with the advent of quantum computers, quantum algorithms that are able to break existing cryptosystems such as hash function, symmetric key, and public key cryptography have been introduced. Currently, because most major blockchain systems use an elliptic curve cryptography to generate signatures for transactions, they are insecure against the quantum adversary. For this reason, the research on the quantum-resistant blockchain that utilizes lattice-based cryptography for transaction signatures is needed. Therefore, in this paper, we propose a blind signature scheme for the blockchain in which the contents of the signature can be verified later, as well as signing by hiding the contents to be signed using lattice-based cryptography with the property of quantum resistance. In addition, we prove the security of the proposed scheme using a random oracle model.

Flexural performance of prestressed UHPC beams with different prestressing degrees and levels

  • Zongcai Deng;Qian Li;Rabin Tuladhar;Feng Shi
    • Computers and Concrete
    • /
    • v.34 no.4
    • /
    • pp.379-391
    • /
    • 2024
  • The ultra-high performance concrete (UHPC) mixed with hybrid fibers has excellent mechanical properties and durability, and the hybrid fibers have a certain impact on the bearing capacity, deformation capacity, and crack propagation of beams. Many scholars have conducted a series of studies on the bending performance of prestressed UHPC beams, but there are few studies on prestressed UHPC beams mixed with hybrid fibers. In this study, five bonded post-tensioned partially prestressed UHPC beams mixed with steel fibers and macro-polyolefin fibers were poured and subjected to four-points symmetric loading bending tests. The effects of different prestressing degrees and prestressing levels on the load-deflection curves, crack propagation, failure modes and ultimate bearing capacity of beams were discussed. The results showed that flexural failure occurred in the prestressed UHPC beams with hybrid fibers, and the integrity of specimens was good. When the prestressing degree was the same, the higher the prestressing level, the better the crack resistance capacity of UHPC beams; When the prestressing level was 90%, increasing the prestressing degree was beneficial to improve the crack resistance and ultimate bearing capacity of UHPC beams. When the prestressing degree increased from 0.41 to 0.59, the cracking load and ultimate load increased by 66.0% and 41.4%, respectively, but the ductility decreased by 61.2%. Based on the plane section assumption and considering the bridging effect of short fibers, the cracking moment and ultimate bearing moment were calculated, with good agreement between the test and calculated values.

Privacy Preserving Keyword Search with Access Control based on DTLS (프라이버시를 보호하는 접근제어가 가능한 키워드 검색 기법)

  • Noh, Geon-Tae;Chun, Ji-Young;Jeong, Ik-Rae;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.35-44
    • /
    • 2009
  • To protect sensitive personal information, data will be stored in encrypted form. However in order to retrieve these encrypted data without decryption, there need efficient search methods to enable the retrieval of the encrypted data. Until now, a number of searchable encryption schemes have been proposed but these schemes are not suitable when dynamic users who have the permission to access the data share the encrypted data. Since, in previous searchable encryption schemes, only specific user who is the data owner in symmetric key settings or has the secret key corresponding to the public key for the encrypted data in asymmetric key settings can access to the encrypted data. To solve this problem, Stephen S. Yau et al. firstly proposed the controlled privacy preserving keyword search scheme which can control the search capabilities of users according to access policies of the data provider. However, this scheme has the problem that the privacy of the data retrievers can be breached. In this paper, we firstly analyze the weakness of Stephen S. Yau et al.'s scheme and propose privacy preserving keyword search with access control. Our proposed scheme preserves the privacy of data retrievers.

A Fast and Secure Scheme for Data Outsourcing in the Cloud

  • Liu, Yanjun;Wu, Hsiao-Ling;Chang, Chin-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.8
    • /
    • pp.2708-2721
    • /
    • 2014
  • Data outsourcing in the cloud (DOC) is a promising solution for data management at the present time, but it could result in the disclosure of outsourced data to unauthorized users. Therefore, protecting the confidentiality of such data has become a very challenging issue. The conventional way to achieve data confidentiality is to encrypt the data via asymmetric or symmetric encryptions before outsourcing. However, this is computationally inefficient because encryption/decryption operations are time-consuming. In recent years, a few DOC schemes based on secret sharing have emerged due to their low computational complexity. However, Dautrich and Ravishankar pointed out that most of them are insecure against certain kinds of collusion attacks. In this paper, we proposed a novel DOC scheme based on Shamir's secret sharing to overcome the security issues of these schemes. Our scheme can allow an authorized data user to recover all data files in a specified subset at once rather than one file at a time as required by other schemes that are based on secret sharing. Our thorough analyses showed that our proposed scheme is secure and that its performance is satisfactory.

Modeling and Simulation of the Delay Time in Superconductive Multi-pole Hairpin type Filter (Superconductive Multi-pole Hairpin type Filter과 Delay Time 설계 및 실험)

  • 양재라;정구락;강준희
    • Proceedings of the Korea Institute of Applied Superconductivity and Cryogenics Conference
    • /
    • 2002.02a
    • /
    • pp.135-137
    • /
    • 2002
  • In the favor of adjusting microwave signal, Hairpin type Filter, which delay microwave signal enough to several nanosecond, is a key component. One of the main advantage in using Hairpin type Filter is a conveniency for equipping with Delay Module, and because of having a wide bandwidth, Hairpin type Filter can be designed to satisfy the most applications. In this work, we attempted to estimate the delay time in a superconductive hairpin type filter A software to synthesize even and odd order equiripple hairpin type filter has been developed. This software arbitrarily locate its transfer zeros making symmetric of asymmetric amplitude response and equalizing group delay. Borland C++ compiler has been used. The program was designed to run under MS-DOS, Window 98, Window 2000. The program optimizes the position of the transfer function zeros in order to fulfill the group delay specification masks. We designed and fabricated a hairpin type HTS 2-pole microstrip bandpass filter to operate at 5.8Ghz. The fabrication method was pulsed laser deposition and YBCO films were deposited on sapphire substrates with a Ce$O_{2}$ thin layer as a buffer layer. We also developed a new style hairpin type filter by using interdigitide inner-pole. Compared to the same size regular hairpin type filters, our filters had a lower center frequency.

  • PDF

The Design of Electronic Payment Protocol Using Dual Signature based on Cardholder's Secret Number (카드사용자의 비밀번호 기반 이중서명을 이용한 전자 지불 프로토콜의 설계)

  • 김성열;이옥빈;배용근
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.2
    • /
    • pp.411-420
    • /
    • 1999
  • The topic of electronic commerce is a hot issue in computer technology. There are many kinds of risks associated with electronic commerce which performs financial transactions by exchanging electronic information over public networks. Therefore, security factors such as confidentiality, integrity, authentication and non-repudiation should be required to construct secure electronic commerce systems. In this paper, the credit card-based payment protocol applying dual signature is presented. It provides payment information to the bank a cardholder pays to, but conceals ordering information. It also offers ordering information to a merchant, but hides payment information including the card number. Thus, cardholder's private information can be protected. In order to accomplish this, dual signature is performed employing both symmetric method utilizing cardholder's secret number as an encryption key and asymmetric method.

  • PDF

Fabrication of a Circular Coil for the Study on the Magnetic Field Tolerance of TMP

  • Baik, Kyungmin;Cheung, Wan-Sup;Lim, Jong-Yeon
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2013.02a
    • /
    • pp.153-153
    • /
    • 2013
  • Turbomolecular pump (TMP) is widely used to obtain and maintain high vacuum by spinning turbine rotors to migrate gas molecules to the exhaust of the pump. However, performance of the TMP has not been well observed when it is influenced by strong magnetic field. Such study may give useful information about magnetic field tolerance of TMP, development of magnetic shielding technique for key components of TMP, etc. For this purpose, magnetic field induced by a circular current source was firstly designed and investigated. Using spherical coordinates and vector potential, magnetic field throughout the space including axis of rotation was calculated. Due to the rotational symmetry of the circular current source, induced magnetic field is azimuthally symmetric and, thus, is analyzed by radial and polar components of the magnetic fields. In order to enhance the numerical accuracy for the calculation, magnetic field was expressed by complete elliptic integrals of first and second kinds. According to the calculation, when 1 A of DC-current passes through a 1 turned circular wire with 50 cm of diameter, overall magnitude of the inducedmagnetic field was about 0.02 Gauss, which was used to the determination of the current and the number of turns of wires to fabricate the coil for the study on the magnetic field tolerance of TMP.

  • PDF

Selective Encryption Scheme Based on Region of Interest for Medical Images (의료 영상을 위한 관심영역 기반 선택적 암호 기법)

  • Lee, Won-Young;Ou, Yang;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.5
    • /
    • pp.588-596
    • /
    • 2008
  • For the patients' privacy, secure access control of medical images is essentially necessary. In this paper, two types of Region of Interest (ROI)-based selective encryption schemes are proposed, which concentrate on the security of crucial parts in medical images. The first scheme randomly inverts the most significant bits of ROI coefficients in several high frequency subbands in the transform domain, which only incurs little loss on compression efficiency. The second scheme employs a symmetric key encryption to encrypt selectively the ROI data in the final code-stream, which provides sufficient confidentiality. Both of two schemes are backward compatible so as to ensure a standard bitstream compliant decoder so the encrypted images can be reconstructed without any crash.

  • PDF

The Frequence Band on the Pizoelectric Characteristic of the Piezoelectric Ceramic Filter (압전 세라믹 필터의 압전 특성에 의한 대역폭 의존성에 관한 연구)

  • Lee, S.H.;Seok, J.Y.;Ha, S.J.;Ryu, G.H.;Kim, H.G.;Yoo, J.H.
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2002.07b
    • /
    • pp.613-617
    • /
    • 2002
  • The ceramic filters were developed using technology similar to that of quartz crystal and electromechanical filter. However, the key to this development involved the theoretical analysis of vibration modes and material improvements of piezoelectric ceramics. The primary application of ceramic filters has been for consumer-market use. Accordingly, a major emhpasis has involved mass production technology, leading to low-priced devices. A typical ceramic filter includes monolithic resonators and capacitors packaged in unique configurations. Nakazawa developed a double-mode resonator as two acoustically coupled single resonators. And he developed 10.7MHz crystal filters using multi-energy trapping mode of thickness shear vibration. He succeeded in realizing a two-pole band pass filter response without external inductance by splitting a dot electrode to creat coupled symmetric and antisymmetric vibration modes. Accordingly, the simulation for ceramic filter were important. So that, this paper were investigated the pass frequency of filter on the electrode length and thickness of ceramic.

  • PDF

Stabilizing Solutions of Algebraic Matrix riccati Equations in TEX>$H_\infty$ Control Problems

  • Kano, Hiroyuki;Nishimura, Toshimitsu
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1994.10a
    • /
    • pp.364-368
    • /
    • 1994
  • Algebraic matrix Riccati equations of the form, FP+PF$^{T}$ -PRP+Q=0. are analyzed with reference to the stability of closed-loop system F-PR. Here F, R and Q are n * n real matrices with R=R$^{T}$ and Q=Q$^{T}$ .geq.0 (nonnegative-definite). Such equations have been playing key roles in optimal control and filtering problems with R .geq. 0. and also in the solutions of in H$_{\infty}$ control problems with R taking the form R=H$_{1}$$^{T}$ H$_{1}$-H$_{2}$$^{T}$ H$_{2}$. In both cases an existence of stabilizing solution, i.e. the solution yielding asymptotically stable closed-loop system, is an important problem. First, we briefly review the typical results when R is of definite form, namely either R .geq. 0 as in LQG problems or R .leq. 0. They constitute two extrence cases of Riccati to the cases H$_{2}$=0 and H$_{1}$=0. Necessary and sufficient conditions are shown for the existence of nonnegative-definite or positive-definite stabilizing solution. Secondly, we focus our attention on more general case where R is only assumed to be symmetric, which obviously includes the case for H$_{\infty}$ control problems. Here, necessary conditions are established for the existence of nonnegative-definite or positive-definite stabilizing solutions. The results are established by employing consistently the so-called algebraic method based on an eigenvalue problem of a Hamiltonian matrix.x.ix.x.

  • PDF