• Title/Summary/Keyword: identity information

Search Result 1,541, Processing Time 0.028 seconds

A Research on the Use of DID Using a Private Blockchain (프라이빗 블록체인을 사용한 DID 활용 연구)

  • Park, Jong-Gyu;Kwon, Seong-Geun;Kwon, Ki-Ryong;Lee, Suk-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.6
    • /
    • pp.760-767
    • /
    • 2021
  • The identity verification is one of the most important technologies in online services. Many services in society are provided online, and the service is provided after confirming the user's identity. Users can do a lot of things online, but they also have side effects. Online digital information is easily manipulated and it is difficult to verify its authenticity, causing social confusion. Accordingly, there has been a movement for individuals to directly manage their identity information using DID. In this paper, we propose a system that can authenticate identity by directly adding own personal information and issuing an identifier using DID technology based on a private blockchain. Then, to verify the proposed system, the scenario is executed and verified.

A Study on The Dispute about The Identity of Oriental Medicine - Focused on Oriental Medical Classics (한의학(韓醫學) 정체성 논의에 대한 연구 - 원전학(原典學)을 중심으로)

  • Baik, You-Sang
    • Journal of Korean Medical classics
    • /
    • v.23 no.5
    • /
    • pp.123-132
    • /
    • 2010
  • In this paper, on the assumption that the dispute about the identity of Oriental Medicine(OM) will finally act as an developmental element of Oriental Medicine otherwise total Korean Medicine, at first we think about what are he meaning of identity and it's essential elements, and search how to establish the standard of the identity of Oriental Medicine. From this working, the direction of the research in the Oriental Medical Classics that is one of the detail field in OM will be drawn out. The identity of Oriental Medicine must be decided according to what is the mission or existence value contributing for Korean Society, not to the form of materiality or immateriality. The core of the identity of Oriental Medical Classics is relevant to being a help to other research fields through reinterpreting the Classics. And the most important issue of research are the analysis of thinking pattern In OM, and systematization of OM knowledge and information.

Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage

  • Zhang, Yinghui;Zhang, Tiantian;Guo, Rui;Xu, Shengmin;Zheng, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5653-5672
    • /
    • 2019
  • In cloud computing era, an increasing number of resource-constrained users outsource their data to cloud servers. Due to the untrustworthiness of cloud servers, it is important to ensure the integrity of outsourced data. However, most of existing solutions still have challenging issues needing to be addressed, such as the identity privacy protection of users, the traceability of users, the supporting of dynamic user operations, and the publicity of auditing. In order to tackle these issues simultaneously, in this paper, we propose a traceable dynamic public auditing scheme with identity privacy preserving for cloud storage. In the proposed scheme, a single user, including a group manager, is unable to know the signer's identity. Furthermore, our scheme realizes traceability based on a secret sharing mechanism and supports dynamic user operations. Based on the security and efficiency analysis, it is shown that our scheme is secure and efficient.

A Study on the Website Design applied to WDS(Web Identity Development System) (WIDS(Web Identity Development System)을 적용한 웹사이트디자인 개발에 관한 연구)

  • 정철종
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.1
    • /
    • pp.77-85
    • /
    • 2002
  • It has been a well known fact that the Internet as a information media has became a obvious ISDN(Integrated Services Digital Networks) through ultra speed information networks. Internet has mads a great change in educational fields. The educational systems are being changed into a learner central figure from the professor central one and cyber universities regardless of space and distance have appeared though the Internet. Accordingly in this paper, we present the web site of UC(Ulsan College) applied to WIDS(Web Identity Development System) to supply the enhancement of information services and the interface design of user's convenience in rapid changing educational environment. We suggest the more enhanced methodology of web site development in cyber space through the case of UC web site development.

  • PDF

Identity-Based Multiple Key Agreement Scheme

  • Dehkordi, Massoud Hadian;Alimoradi, Reza
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.12
    • /
    • pp.2392-2402
    • /
    • 2011
  • In order to protect some important information communicated through an insecure network, a common hidden key must be used. One can produce the common hidden key using key agreement protocols; and this helps to have high security in modern data networks. Today, the designers of public key cryptography protocols try to set the public identity of a system's users (like their email addresses) as their public key. This not only makes a cryptographic protocol more efficient but also decreases its cost. These protocols are called "identity-based". In this article, an identity-based multiple key agreement scheme will be presented; this scheme uses the challenge-response method to do the verification. While the number of random values produced in our scheme is the same as other schemes, the number of keys generated in this scheme is much more than what many other key agreement schemes produce,. Therefore, we will have less computational complexities campered with other schems. In this paper, we consider the security of our scheme and consequently, we will show that it satisfies many security conditions such as strong security.

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.

A Study on Representation of a Identity in Internet Homepage Design - With emphasis on the building of Ssamzie Homepage - (Internet Homepage Design 에서의 Identity 구현에 관한 연구 - 쌈지 홈 페이지 제작사례 중심으로 -)

  • 홍석기;강병철
    • Archives of design research
    • /
    • v.11 no.2
    • /
    • pp.242-248
    • /
    • 1998
  • Rapid increasing number of the internet web site enables the users receives information prepared with multimedia techniques as an exchanging gateway to the world. It is also realized that we are living in information society connected by the flooding number of the web sites. Consequently, setting up the identity in developing a homepage is critical since clear distinction from other sites is required for the homepage in which a random user can delivers the ideas from the message offered by the provider. In this paper, in order to establish the identity for a homepage, what kinds of components of the identity should be discussed and how the identity is reflected in the existing homepage are analyzed with the selected sample web sites. The design process in developing the identity for Ssamzie homepage (www ssarnzie eo.kr) is reviewed for comparing with others of the selected sites as a case study. These will explain that the roles of the designers in a homepage preparation will not be limited to the graphic expressions but will be expanded to the contribution to provide the reasonable distinction in terms of the establishing identity of the web sites. Moreover, the phase of the designer can be reevaluated by emphasizing the roles and the established identity.

  • PDF

Gender-Identity of Animation Character (애니메이션 캐릭터의 젠더 정체성)

  • Sung, Re-A
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.11
    • /
    • pp.150-157
    • /
    • 2007
  • The image calls forth the curiosity of the children. children experience the many thing through the image and it makes children to study naturally. Specially, the animation socializes children and it plays an important role in form of a self-identity. The gender-identity reappearance of the animation character is important. Gender-identity reappearance type of the animation character is able to classify with the reappearance type of visual information and the narrative. The narrative reappearance type does more clearly visual information reappearance type. Also classifying the gender-identity of animation character aspects into each type, they are; gender stereotype that character reflects the conservative and commercial ideology; gender non-stereotype that character doesn't reflect gender stereotype. But reappearance of the gender non-stereotype character as well, it is stopping in the exaggeration or the caricature of gender role of the character. Consequently the animation characters must be reappeared with the character which have the future oriented gender identity-as one human being that forms a value subjectively. The animation which reappears the future oriented gender-identity plants a proper self-perception and gender role in children and relaxes the traditional gender-identity which is already acquired.

The Proposals of Identity Escrow Scheme to Control User's Anonymity (사용자의 익명성을 제어하는 신원 위탁 방식 제안)

  • 황보성;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.6
    • /
    • pp.617-624
    • /
    • 2000
  • We introduce the concept of a Identity Escrow Scheme, an application of key escrow ideas to solve the problem of authentication. In the Identity Escrow Scheme, the User escrows a own real identity to the Issuer and receives a Authentication Information. In authentication step, between the User to the Service Provider, the User only gives a Authentication Information to the Service Provider. Therefore, the Service Provider don't know a real identity of user's. However, when the User does unlawful actions, the Lawful Agent is called by the Service Provider, and his anonymity is revoked by cooperation of the Issuer and the Lawful Agent. We propose new Identity Escrow Schemes and analyze these.

  • PDF

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication

  • Zhang, Xiaojun;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2762-2777
    • /
    • 2017
  • A fuzzy identity based signature (FIBS) scheme allows a signer with identity ${\omega}$ to generate a signature which could be verified under identity ${\omega}^{\prime}$ if and only if ${\omega}$ and ${\omega}^{\prime}$ are within a certain distance of each other as judged by some metric. In this paper, we propose an efficient FIBS scheme from lattice assumption, which can resist quantum-computer attacks. Without using the Bonsai Tree technique, we utilize the lattice basis delegation technique to generate the private key, which has the advantage of keeping the lattice dimension invariant. We also prove that our proposed scheme is existentially unforgeable under an adaptive chosen message and identity attack in the random oracle model. Compared with existing scheme, our proposed scheme is much more efficient, especially in terms of communication overhead. Since our FIBS scheme possesses similar error-tolerance property, it can be well applied in post-quantum communication biometric authentication environments, where biometric identifiers such as fingerprints, voice, iris and gait are used in human identification.