• 제목/요약/키워드: one-way function.

Search Result 877, Processing Time 0.026 seconds

A Design Process for Structural Borne Noise using Panel Contribution and Design Sensitivity (판넬기여도와 설계민감도를 이용한 구조기인소음 설계프로세스)

  • Kim, Hyo-Sig;Kim, Heon-Hee;Cho, Hyo-Jin;Yoon, Seong-Ho
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2007.11a
    • /
    • pp.806-811
    • /
    • 2007
  • In this study, we propose a more systematic design process for the structure-borne noise. The proposed way consists of 4 steps: Problem definition, Cause analysis, Development of counter-measure and Validation. Especially, we improved the second step: Cause analysis. According to the PCA(Panel Contribution Analysis), a reduction in vibration of the panels of which panel contribution is positive and larger, results in a reduction in structure-borne noise. We have, however, met the case in which the concept of PCA is no valid in a few vehicle tests. In order to understand this phenomenon, we compared the major panels selected by PCA with the one chosen by DSA(Design Sensitivity Analysis). After investigating the difference between the two results, a more improved process is suggested. The proposed one for the second step in the design process consists of not only the previous way: PCA with deformation analysis results but also DSA. It is finally validated that the proposed design process decreases the sound pressure of the concerned noise transfer function more than 3.5 dB.

  • PDF

Study of Undeniable Signatures Schemes based on Zero-Knowledge Proof (효율적인 영지식 부인봉쇄 프로토콜 연구)

  • Gui, Yi-Qi;Choi, Hwang-Kyu
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.5
    • /
    • pp.691-696
    • /
    • 2010
  • The main idea is to protect the signer of a document against the document being digitally distributed without the cooperation of signer. This paper proposes a new scheme of undeniable signature, which is so effective and improved D. Chaum's scheme. And our scheme which is zero-knowledge proved by using one-way function and partition - selection method, shows that its communication(challenge-response) only needs much fewer times during the confirmation protocol and disavowal protocol respectively, being very useful for wireless network environment. In the meantime our scheme allows the verifier to verify that the signature is valid, while the signer doesn't know the original message and the signature, to preserve the privacy of the verifier.

A Design of RFID Mutual Authentication System based on Open Channel (공개 채널 기반의 RFID 상호인증 시스템 설계)

  • Yoon, Eun-Jun;Yoo, Kee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10C
    • /
    • pp.946-954
    • /
    • 2009
  • General RFID system has assumed that the communication channel between reader and back-end database is secure channel. However, the reader can be communicated with the database through insecure channel like the communication channel between the reader and the tag according to application environment. In this paper, we propose a new secure RFID mutual authentication protocol based on open network channel which assumed that all communication channels between the database, the reader and the tag are insecure communication channels. The proposed protocol uses a secure one-way hash function to provide authentication and integrity against all communication messages which exchanged on the open channels. In addition, we designed that the proposed protocol can provide forward secrecy by performing the database and the tag update their old secret key with a new secret key after finished mutual authentication.

A Reusable Secure Mobile e-Coupon Protocol (다회 사용가능한 안전한 모바일 쿠폰 프로토콜)

  • Yong, Seunglim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.10
    • /
    • pp.81-88
    • /
    • 2013
  • Since nowadays mobile phone messages are flourishing, the application of electronic coupon (e-coupon) will become a trend for mobile users. E-coupon for mobile commerce can provide mobility for users and distribution flexibility for issuers. In this paper, we propose a mobile e-coupon system that just applies some simple cryptographic techniques, such as one-way hash function and XOR operation. In our system, the customer can control the number of issued e-coupons and the issuer can prevent them from double-redeeming. The customer does not need to perform any exponential computation in redeeming and transferring the coupons. Our scheme uses one-way hash chains for preventing from double-spending.

Efficient On-line Secret Sharing scheme based on One-way Hash Function (일반향 해쉬 함수에 기반한 효율적인 온라인 비밀분산 방식)

  • Oh, Soo-Hyun;Kim, Seung-Joo;Won, Dong-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3128-3137
    • /
    • 2000
  • Secret sharing scheme is a cryptographic protocol in which a dealer distribures shares of a secret among a set of participants such that only authorized set of participants can recover the secret at a later. Secret sharing is an important cryptographic primitive in management of secret information, secure multiparty protocol and group-oriented cryptography, etc. In this paper, we propose an efficient, on-line secret sharing scheme based on one-way hash function. This scheme provides the property to share multiple secrets and allows participants to be added/deleted dynamically, without having to redistributo new shares. Proposed scheme has advantage to detect cheating and identify of all cheater, regardless of then number. Frthermore, it is more eficient than previous schemes.

  • PDF

Improved Password Change Protocol Using One-way Function (일방향 함수를 이용한 개선된 패스월드 변경 프로토콜)

  • Jeon Il-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.121-127
    • /
    • 2006
  • Recently, Chang et at.$^[9]$ proposed a new password-based key agreement protocol and a password change protocol to improve the efficiency in the password-based authenticated key agreement protocol proposed by Yeh et at.$^[8]$. However, Wang et al.$^[10]$ showed that their protected password change protocol is not secure under the denial of service attack and the dictionary attack This paper proposes an improved password change protocol to solve this problems in the Chang et al's protocol. In the proposed protocol, the format of communication messages is modified not to have any clue for the guessing of the password and verifying of the guessed password. The proposed protocol supports the advantages in the previous password-based protocols and solves the problems in them effectively.

Analysis of Server's Computational Cost for Multicast Batch Rekeying Scheme (멀티캐스트 일괄 키 갱신 방법의 서버계산 비용 분석)

  • Park Chang-Seop;Lee Gyu-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.71-80
    • /
    • 2005
  • In the near future, various aplications on the Internet will be based on the multicast group communication, so that the efficient group key management is essential for managing the frequent group join and leave events. In this paper, we propose several batch rekeying schemes extended from conventional individual rekeying schemes, and analyze the efficiencies of them in terms of both the number of encryption and one-way hash function as well as multicast message size. Considering multiple member leaves, a probabilistic approach is need to compute the average computational amounts for rekeying.

Evaluation of Sensory Nerve Function Before and after Intraoral Vertico-Sagittal Ramus Osteotomy Using Current Perception Threshold(CPT) Test (구강내하악지수직시상골절단수술 전후 전류역치검사(CPT)를 이용한 지각신경의 변화에 대한 연구)

  • Choung Pill-Hoon;Kim Sao-Geol;Seo Byoung-Moo
    • Korean Journal of Cleft Lip And Palate
    • /
    • v.4 no.1
    • /
    • pp.39-43
    • /
    • 2001
  • The design of osteotomy plane in orthognathic surgery has been developed to diminish the nerve injury. Intraoral Vertico-Sagittal Ramus Osteotomy (IVSRO) is the one of the best way to minimize untoward results, which is designed not to expose the lingula. We evaluated the nerve damage before and after with current perception threshold (CPT) test which is modem and numerically expressible way of nerve damages. Sixty patients underwent IVSRO since 1998 were evaluated. They were divided into 2 groups; one group underwent IVSRO only, and the other underwent IVSRO plus genioplasty. The both groups were evaluated with CPT test 1 week before surgery, and 1, 3 and 6 months after surgery. The CPT test was performed on A-beta, A-delta and C fiber respectively. 111e result showed that the recovery of sensory function of damaged nerve fibers was observed at the period of three to six months after surgery. There was no impairment of nerve function after only the IVSRO . But there were sensory disturbances in cases of additional genioplasty group. We thought that one of major factors on nerve damages were exposure of nerve and traction injury during genioplasty.

  • PDF

Clinical Importance of Peak Cough Flow in Dysphagia Evaluation of Patients Diagnosed With Ischemic Stroke

  • Min, Sang Won;Oh, Se Hyun;Kim, Ghi Chan;Sim, Young Joo;Kim, Dong Kyu;Jeong, Ho Joong
    • Annals of Rehabilitation Medicine
    • /
    • v.42 no.6
    • /
    • pp.798-803
    • /
    • 2018
  • Objective To investigate the relationship between peak cough flow (PCF), pulmonary function tests (PFT), and severity of dysphagia in patients with ischemic stroke. Methods This study included patients diagnosed with ischemic stroke, who underwent videofluoroscopic swallowing study (VFSS), PCF and PFT from March 2016 to February 2017. The dysphagia severity was assessed using the videofluoroscopic dysphagia scale (VDS). Correlation analysis of VDS, PFT and PCF was performed. Patients were divided into three groups based on VDS score. One-way ANOVA of VDS was performed to analyze PCF, forced vital capacity (FVC), forced expiratory volume in one second (FEV1), and age among the different groups. Results The correlation coefficients of VDS and PCF, VDS and FVC, and VDS and FEV1 were -0.836, -0.508, and -0.430, respectively, all of which were statistically significant at the level of p<0.001. The one-way ANOVA indicated statistically significant differences in PCF, FVC, FEV1, and age among the VDS groups. Statistically significant differences in VDS and age were observed between aspiration pneumoia and non-aspiration pneumonia groups. Conclusion Coughing is a useful factor in evaluating the risk of aspiration in dysphagia patients. Evaluation of respiratory and coughing function should be conducted during the swallowing assessment of patients with ischemic stroke.

The Effect of Intensive Therapy on Gross Motor Function Measure Score in Cerebral Palsy (집중치료가 뇌성 마비아의 대동작 기능 점수에 미치는 영향)

  • Oh, Jung-Lim;Kim, Chung-Sun
    • Journal of the Korean Society of Physical Medicine
    • /
    • v.4 no.2
    • /
    • pp.101-106
    • /
    • 2009
  • Purpose:The purpose of this study was to find the effect of intensive therapy on gross motor function measure(GMFM) score in cerebral palsy. Methods:Twenty eight cerebral palsy children were recruited in this study. Gross motor Function Measure(GMFM) score and Gross motor Function Classification System(GMFCS) were used to evaluate as functional change and functional level. Intensive therapy period for cerebral palsy children was 3, 4, and 5 weeks. Statistical analysis was used paired T test and one way ANOVA to know change between pre and post therapy was used. Results:GMFM Score of pre- and post- intensive therapy showed the statistically significant difference. Intensive therapy period indicated the statistically significant difference in GMFM score. GMFCS level did not reveal statistically significant difference in GMFM score. Conclusion:Intensive therapy was effective on gross motor function measure(GMFM) score in cerebral palsy.

  • PDF