• Title/Summary/Keyword: group key distribution

Search Result 228, Processing Time 0.024 seconds

MoTE-ECC Based Encryption on MSP430

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.3
    • /
    • pp.160-164
    • /
    • 2017
  • Public key cryptography (PKC) is the basic building block for the cryptography applications such as encryption, key distribution, and digital signature scheme. Among many PKC, elliptic curve cryptography (ECC) is the most widely used in IT systems. Recently, very efficient Montgomery-Twisted-Edward (MoTE)-ECC was suggested, which supports low complexity for the finite field arithmetic, group operation, and scalar multiplication. However, we cannot directly adopt the MoTE-ECC to new PKC systems since the cryptography is not fully evaluated in terms of performance on the Internet of Things (IoT) platforms, which only supports very limited computation power, energy, and storage. In this paper, we fully evaluate the MoTE-ECC implementations on the representative IoT devices (16-bit MSP processors). The implementation is highly optimized for the target platform and compared in three different factors (ROM, RAM, and execution time). The work provides good reference results for a gradual transition from legacy ECC to MoTE-ECC on emerging IoT platforms.

A Study On ID-Based Group Signature (신원 정보 기반 그룹 서명)

  • Kim, Dae-Youb;Ju, Hak-Soo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.489-494
    • /
    • 2005
  • In 2002, Shundong Xia proposed a new ID-based group signature scheme with strong separability. The nature of a strong separability is to divide group manager's role into a membership manager and a revocation manager Jianhong et al showed that the scheme was not coalition-resistant. In this letter, we first propose two new attacks, forgery and link attacks, for Xia-You's scheme. We also propose a new ID-based group signature scheme that Is resistant to coalition, forgery and link attacks

3D Content Model Hashing Based on Object Feature Vector (객체별 특징 벡터 기반 3D 콘텐츠 모델 해싱)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.75-85
    • /
    • 2010
  • This paper presents a robust 3D model hashing based on object feature vector for 3D content authentication. The proposed 3D model hashing selects the feature objects with highest area in a 3D model with various objects and groups the distances of the normalized vertices in the feature objects. Then we permute groups in each objects by using a permutation key and generate the final binary hash through the binary process with the group coefficients and a random key. Therefore, the hash robustness can be improved by the group coefficient from the distance distribution of vertices in each object group and th hash uniqueness can be improved by the binary process with a permutation key and a random key. From experimental results, we verified that the proposed hashing has both the robustness against various mesh and geometric editing and the uniqueness.

A Multilevel Key Distribution using Pseudo - random Permutations (의사 랜덤치환을 이용한 다중레벨 키분배)

  • Kim, Ju-Seog;Shin, Weon;Lee, Kyung-Hyune
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2493-2500
    • /
    • 1997
  • We propose a new key management scheme for multiuser group which is classified as hierarchical structure (sometimes it is called a multilevel security hierarchy) in the symmetric key cryptosystem. The proposed scheme is based on the trapdoor one-way permutations which are generated by the pseudo-random permutation algorithm, and it is avaliable for multilevel hierarchical structure composed of a totally ordered set and a partially ordered set, since it has advantage for time and storage from an implemental point of view. Moreover, we obtain a performance analysis by comparing with the other scheme, and show that the proposed scheme is very efficient for computing time of key generation and memory size of key storage.

  • PDF

A Study on the Service Waiting - Focus on Medical Services - (서비스 목적에 따른 대기관리 영향요인 - 병원서비스를 중심으로 -)

  • Kim, Sang-Cheol
    • Journal of Distribution Science
    • /
    • v.7 no.2
    • /
    • pp.45-61
    • /
    • 2009
  • The aims of this paper is to examine the key factor of customer satisfaction in the medical service. Especially service waiting is a significant component of the customer's overall satisfaction with the service process. For this purpose, this study proposed 6 hypotheses as follow : H1 : Waiting cost, affect on perceived service waiting, will be different between patient customer group and health care group. H2 : Controllability of the cause, affect on perceived service waiting, will be different between patient customer group and health care group. H3 : Controllability of the cause affect on perceived service waiting, will be different between patient customer group and health care group. H4 : Waiting environment, affect on perceived service waiting, will be different between patient customer group and health care group. H5 : Transaction importance, affect on perceived service waiting, will be different between patient customer group and health care group. H1 : Waiting cost, Controllability of the cause, Controllability of the cause, Waiting environment, Transaction importance, customer satisfaction will affect on service waiting significantly This study find that 1) Waiting cost and Transaction importance are significant variables to influence customer satisfaction between patient group and health care group. 2) customer satisfaction is very important variables to minimize perceived service waiting.

  • PDF

Occlusal deviations in adolescents with idiopathic and congenital scoliosis

  • Zhang, Hao;Ma, Jingbo;Zhang, Zhicheng;Feng, Yafei;Cai, Chuan;Wang, Chao
    • The korean journal of orthodontics
    • /
    • v.52 no.3
    • /
    • pp.165-171
    • /
    • 2022
  • Objective: This cross-sectional study aimed to investigate the characteristics of malocclusions in scoliotic patients through clinical examinations. Methods: Fifty-eight patients with idiopathic scoliosis (IS) and 48 patients with congenital scoliosis (CS) participated in the study. A randomly selected group of 152 orthopedically healthy children served as the control group. Standardized orthodontic and orthopedic examination protocols were used to record the occlusal patterns and type of scoliosis. Assessments were made by three experienced orthodontists and a spinal surgery team. The differences in the frequency distribution of occlusal patterns were evaluated by the chi-squared test. Results: In comparison with patients showing IS, patients with CS showed a higher incidence of Cobb angle ≥ 45° (p = 0.020) and included a higher proportion of patients receiving surgical treatments (p < 0.001). The distribution of the Angle Class II subgroup was significantly higher in the IS (p < 0.001) and CS (p = 0.031) groups than in the control group. In comparison with the healthy controls, the CS and IS groups showed significantly higher (p < 0.05) frequencies of asymmetric molar and asymmetric canine relationships, upper and lower middle line deviations, anterior deep overbite, unilateral posterior crossbite, and canted occlusal plane, with the frequencies being especially higher in CS patients and to a lesser extent in IS patients. Conclusions: Patients with scoliosis showed a high frequency of malocclusions, which were most obvious in patients with CS.

Case Study of Cooperative Learning Simulating Turn-Key System in Design Class for Environmental Engineering (턴키 제도를 모사한 환경공학 설계과목의 협동학습 적용사례)

  • Kim, Geon-Ha;Oh, Ju-Won;Lee, Hack-Soo
    • Journal of Engineering Education Research
    • /
    • v.9 no.4
    • /
    • pp.5-9
    • /
    • 2006
  • In this research, a case study for cooperative learning practiced in a design class for environmental engineering was presented. Designing a treatment facility for urban diffuse pollution was a main problem given to the participants. Turn-key system for civil works were simulated throughout class works. Twenty five students were grouped into four virtual companies and assigned own position from chairperson to workers. Each group competed throughout establishing design concept regarding order, expense calculation, process distribution, actual calculation. Best design with lowest bidding won the first place. For evaluating class effectiveness, one student from each group were monitored thorough semester. Participants were improved for their understanding about company establishment, turn-key system management, awareness about personal management, and presentation skills. Tension of the class was effectively elevated as well.

Aerodynamic and aero-elastic performances of super-large cooling towers

  • Zhao, Lin;Chen, Xu;Ke, Shitang;Ge, Yaojun
    • Wind and Structures
    • /
    • v.19 no.4
    • /
    • pp.443-465
    • /
    • 2014
  • Hyperbolic thin-shell cooling towers have complicated vibration modes, and are very sensitive to the effects of group towers and wind-induced vibrations. Traditional aero-elastic models of cooling towers are usually designed based on the method of stiffness simulation by continuous medium thin shell materials. However, the method has some shortages in actual engineering applications, so the so-called "equivalent beam-net design method" of aero-elastic models of cooling towers is proposed in the paper and an aero-elastic model with a proportion of 1: 200 based on the method above with integrated pressure measurements and vibration measurements has been designed and carried out in TJ-3 wind tunnel of Tongji university. According to the wind tunnel test, this paper discusses the impacts of self-excited force effect on the surface wind pressure of a large-scale cooling tower and the results show that the impact of self-excited force on the distribution characteristics of average surface wind pressure is very small, but the impact on the form of distribution and numerical value of fluctuating wind pressure is relatively large. Combing with the Complete Quadratic Combination method (hereafter referred to as CQC method), the paper further studies the numerical sizes and distribution characteristics of background components, resonant components, cross-term components and total fluctuating wind-induced vibration responses of some typical nodes which indicate that the resonance response is dominant in the fluctuating wind-induced vibration response and cross-term components are not negligible for wind-induced vibration responses of super-large cooling towers.

Location Selection of Distribution Centers by Using Grey Relational Analysis (GRA를 이용한 물류센터 입지선정문제)

  • Woo, Taehee;Bach, Seung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.2
    • /
    • pp.82-90
    • /
    • 2015
  • Location selection of distribution centers is a crucial task for logistics operators and key decision makers of an organization. This is a multi-criteria decision making (MCDM) process which includes both quantitative and qualitative criteria. In order to propose an optimized location selection model, this research suggests a hierarchical group of evaluation criteria : 5 major criteria with 15 sub-criteria. The MCDM approach presented in this research, by integrating Grey Relational Analysis (GRA) with Analytic Hierarchy Process (AHP), tends to rectify the overall quality and uncertainty of the values of evaluation criteria. An example of a location selection case in Korea is illustrated in this study to show the effectiveness of this method.

Lightweight Individual Encryption for Secure Multicast Dissemination over WSNs (무선 센서네트워크에서 경량화 개인별 암호화를 사용한 멀티캐스트 전송기법)

  • Park, Taehyun;Kim, Seung Young;Kwon, Gu-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.115-124
    • /
    • 2013
  • In this paper, we suggest a secure data dissemination by Lightweight Individual Encryption Multicast scheme over wireless sensor networks using the individual encryption method with Forward Error Correction instead of the group key encryption method. In wireless sensor networks, a sink node disseminates multicast data to the number of sensor nodes to update the up to date software such as network re-programming and here the group key encryption method is the general approach to provide a secure transmission. This group key encryption approach involves re-key management to provide a strong secure content distribution, however it is complicated to provide group key management services in wireless sensor networks due to limited resources of computing, storage, and communication. Although it is possible to control an individual node, the cost problem about individual encryption comes up and the individual encryption method is difficult to apply in multicast data transmission on wireless sensor networks. Therefore we only use 0.16% of individually encrypted packets to securely transmit data with the unicast to every node and the rest 99.84% non-encrypted encoded packets is transmitted with the multicast for network performance.