• Title/Summary/Keyword: identity-based

Search Result 2,339, Processing Time 0.03 seconds

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.

Correlations of self-esteem, major satisfaction and career identity in dental hygiene students (일부지역 치위생과 학생들의 자아존중감, 전공만족도 및 진로정체감과의 관련성)

  • Park, Kyung-Hwa;Choi, Hye-Jung
    • Journal of Korean society of Dental Hygiene
    • /
    • v.15 no.2
    • /
    • pp.279-286
    • /
    • 2015
  • Objectives: The purpose of the study is to investigate the factors influencing on self-esteem, major satisfaction, and career identity. Methods: A self-reported questionnaire was filled out by 389 dental hygiene students in three colleges located in Metropolitan area. The questionnaire consisted of 5 questions of general characteristics, 10 questions of self-efficacy, 18 questions of major satisfaction, and 13 questions of career identity by Likert 5 scale. Cronbach's alpha was 0.92 in self-efficacy, 0.90 in major satisfaction, and 0.88 in career identity in the previous studies. Cronbach's alpha in this study was 0.911 in major satisfaction, 0.840 in self-efficacy, and 0.8090 in career identity. The data were analyzed using descriptive statistics, independent t-test, one-way ANOVA, and stepwise multiple regressions. Results: The score was 3.47 in self-esteem, 3.79 in major satisfaction, and 3.03 in career identity. There were significant differences in self-esteem and major satisfaction based on grade, motivation for entering college, and clinical practice satisfaction. In case of career identity, there were significant differences based on characteristics, motivation for college choice, and clinical practice satisfaction. There was a positive correlation between negative self-esteem, positive self-esteem, general satisfaction, awareness satisfaction, curricula satisfaction, interpersonal relation satisfaction, and career identity. The influencing factors on career identity were aptitude, interest, self-esteem, and major satisfaction in order(p<0.001). Conclusions: The career identity is closely related to self-esteem and major satisfaction. It is desirable to open a variety of education courses and to develop systematic and practical programs to the students in order to improve the career identity.

A Decentralized Face Mask Distribution System Based on the Decentralized Identity Management (블록체인 분산신원증명에 기반한 탈중앙화된 마스크 중복구매 확인 시스템)

  • Noh, Siwan;Jang, Seolah;Rhee, Kyung-Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.315-320
    • /
    • 2020
  • Identity authentication is an important technology that has long been used in society to identify individuals and provide appropriate services. With the development of the Internet infrastructure, many areas have expanded into online areas, and identity authentication technologies have also expanded online. However, there is still a limit to identity authentication technology that relies entirely on trusted third parties like the government. A centralized identity management system makes the identification process between agencies with different identity management systems very complex, resulting in a waste of money and time for users. In particular, the limits of the centralized identity management system were clearly revealed in the face mask shortage in the 2020 COVID-19 crisis. A Decentralized Identity (DID) is a way for users to manage their identity on their own, and recently, a number of DID platform based on blockchain technology have been proposed. In this paper, we analyze the limitations of the existing centralized identity management system and propose a DID system that can be utilized in future national emergency situations such as COVID-19.

Proposal for a Peer Decentralized Identity System Using Short-Range Wireless Communications (단거리 무선 통신을 이용한 개인 간 분산 신원증명 시스템 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.959-972
    • /
    • 2021
  • Decentralized Identity is based on the concept of self-sovereign identity, in which holders manage and provide their own credentials. However, a procedure is required to obtain credentials from issuers, and there is a risk of mess personal information leaking due to negligence of the issuers. In this paper, we propose a peer decentralized identity system based on Peer DID technology that allows only participants to verify their identity in 1:1 or 1:N small groups by matching the holder with the issuer. It is directly connected to a mobile device using short-range wireless communications such as bluetooth, and the holders create and provide their own credentials in person to the other party, thus fully realizing the self-sovereignty identity. The proposed system can simplify the identification process, improve security and privacy, and reduce costs. Furthermore, an extended architecture is possible to connect the proposed system and the distributed ledger to identify users in other domains. In the future, based on various technologies, it is also necessary to expand research on identity systems that can be utilized for human-to-thing and things-to-things authentication.

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication

  • Zhang, Xiaojun;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2762-2777
    • /
    • 2017
  • A fuzzy identity based signature (FIBS) scheme allows a signer with identity ${\omega}$ to generate a signature which could be verified under identity ${\omega}^{\prime}$ if and only if ${\omega}$ and ${\omega}^{\prime}$ are within a certain distance of each other as judged by some metric. In this paper, we propose an efficient FIBS scheme from lattice assumption, which can resist quantum-computer attacks. Without using the Bonsai Tree technique, we utilize the lattice basis delegation technique to generate the private key, which has the advantage of keeping the lattice dimension invariant. We also prove that our proposed scheme is existentially unforgeable under an adaptive chosen message and identity attack in the random oracle model. Compared with existing scheme, our proposed scheme is much more efficient, especially in terms of communication overhead. Since our FIBS scheme possesses similar error-tolerance property, it can be well applied in post-quantum communication biometric authentication environments, where biometric identifiers such as fingerprints, voice, iris and gait are used in human identification.

The Revisionary Ratio and Architectural Identity of Seung, Hyo-Sang against the Precursor Kim, Swoo-Geun - Focusing on the Dialectic of Revisionism by Harold Bloom - (김수근에 대한 승효상 건축의 수정주의 행보 - 해럴드 블룸의 수정주의 변증법을 중심으로 -)

  • Kang, Yun-Sik;Kang, Hoon
    • Journal of architectural history
    • /
    • v.23 no.1
    • /
    • pp.51-62
    • /
    • 2014
  • Architecture is a product of numerous influences, as shown in the apprenticeships of Kim, Jung-Up and Kim, Swoo-Geun with Le Corbusier's influences. Therefore, its identity is need to be re-defined based on such complex relationships. The rhetorical images of 'the Map of Misreading', as the core of the poetic identification proposed by Harold Bloom's 'the Theory of Influence', provide an efficient way of explaining the relations between architectural apprenticeships and identities. This research is to re-build a new methodology of architectural criticism based on it. The diachronic transformations of the architecture of Seung, Hyo-Sang also had very characteristic 'revisionary ratios' about his precursor Kim, Swoo-Geun. As an antithetic stance of his precursor's final phase, his early days works pursued continuously geometric abstraction and objective images of the architecture of Adolf Loos. However, his recent works are showing the obvious symptoms of regression to his origins. Finally, the architectural identity should be re-conceptualized as a complexity, based on inter-textuality from complex influences. This new architectural identity can be reflected into the modern obsessive identity.

Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security

  • Tan, Zuowen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.8
    • /
    • pp.1982-1997
    • /
    • 2012
  • Authenticated multiple key agreement protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In 2011, Dehkordi et al. proposed an identity-based authenticated multiple key agreement protocol. In this paper, we demonstrate that Dehkordi et al.'s protocol is vulnerable to impersonation attacks. Furthermore, we have found that their protocol cannot provide perfect forward security or mutual security. Then we propose an identity-based authenticated multiple key agreement protocol which removes the weaknesses of the Dehkordi et al.'s protocol. Compared with the multiple key agreement protocols in the literature, the proposed protocol is more efficient and holds stronger security.

Hierarchical Identity-based Broadcast Encryption Scheme from LWE

  • Yang, Chunli;Zheng, Shihui;Wang, Licheng;Lu, Xiuhua;Yang, Yixian
    • Journal of Communications and Networks
    • /
    • v.16 no.3
    • /
    • pp.258-263
    • /
    • 2014
  • A hierarchical identity-based broadcast encryption (H-IBBE) scheme is an identity-based broadcast encryption (IBBE) scheme in a hierarchical environment. In order to obtain secure H-IBBE schemes in the quantum era, we propose an H-IBBE scheme based on the learning with errors problemassumption.Our scheme achieves indistinguishability from random under adaptive chosen-plaintext and chosen-identity attacks in the random oracle model.

The Relationships among Occupational Identity, Occupation Satisfaction Job Commitment of Care Workers in Care Hospitals - Focusing on moderating effects of personal characteristics.

  • Park, Hwieseo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.179-185
    • /
    • 2017
  • The purpose of this study was to investigate the relationships between occupational identity, occupation satisfaction, and self-efficacy of care workers in care hospitals and to draw implications for improving the quality of care services. In order to accomplish the purpose of this study, the occupational identity of care workers in care hospitals as an independent variable, occupation satisfaction as a dependent variable of occupational identity, and self-efficacy as a moderating variable were selected. The causal relationships between occupational identity and occupation satisfaction and the moderating effect of self-efficacy were analyzed. As a result of the analysis, the occupational identity of care workers in care hospitals showed significant effects on occupation satisfaction and job commitment. Also, the effects of occupational identity on occupation satisfaction and job commitment differ depending on self-efficacy, which means that moderating effects of self-efficacy are significant. Based on this analytical results, the theoretical and policy implications of this study were suggested, and the directions and limitations of this study were suggested.

A Study on Sex Role Identity, Clothing Involvement, and Clothing Satisfaction of High School Students (고교생의 성역할 정체감과 의복관여 및 의복만족에 관한 연구)

  • 백선영;이선재
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.24 no.1
    • /
    • pp.55-66
    • /
    • 2000
  • The purpose of this study was to investigate relationship between Sex Role Identity, Clothing Involvement, and Clothing Satisfaction, among high school students, and the difference of Sex Role Identity, Clothing Involvement, and Clothing Satisfaction according to demographic variables. The questionaire survey was used toward 555 high school students in seoul region during October, 1998. SAS package program were used to analyze the gatherd data. Frequency, Percentage. Factor Analysis, Duncan test, Correlation Analysis and so on. The conclusion based on the results are as follows: 1. With the analyses of Sex Role Identity, Clothing Involvement, and Clothing Satisfaction, we divided the polarized Sex Role Identity into four factors : androgynous, masculine, feminine and undifferentited type. Four factors are considered to decide Clothing Involvement: fashion, interesting pleasure, symbolism, and utility perceived risk. 2. There are significant differences in Sex Role Identity, Clothing Involvement, and Clothing Satisfaction according to demographic variables. 3. The analysis of correlations among Sex Role Identity, Clothing Involvement and Clothing Satisfaction showed that there are significant among them.

  • PDF