• Title/Summary/Keyword: proof of security

Search Result 186, Processing Time 0.027 seconds

Traceable Ciphertet-Policy Attribute-Based Encryption with Constant Decryption

  • Wang, Guangbo;Li, Feng;Wang, Pengcheng;Hu, Yixiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3401-3420
    • /
    • 2021
  • We provide a traceable ciphertext-policy attribute based encryption (CP-ABE) construction for monotone access structures (MAS) based on composite order bilinear groups, which is secure adaptively under the standard model. We construct this scheme by making use of an "encoding technique" which represents the MAS by their minimal sets to encrypt the messages. To date, for all traceable CP-ABE schemes, their encryption costs grow linearly with the MAS size, the decryption costs grow linearly with the qualified rows in the span programs. However, in our traceable CP-ABE, the ciphertext is linear with the minimal sets, and decryption needs merely three bilinear pairing computations and two exponent computations, which improves the efficiency extremely and has constant decryption. At last, the detailed security and traceability proof is given.

Providing Payment Atomicity Using Verifiable Encryption (확인 가능한 암호기법을 사용한 지불의 원자성 보장 방법)

  • 최형섭;김상진;오희국
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.69-80
    • /
    • 2003
  • Verifiable encryption is an encryption technique with which one can verify what has been encrypted even if one can not decrypt the ciphertext. This technique can be used in fair exchange to convince the counterpart of his or her receiving an item by presenting an encrypted form in advance. In this paper, a method that can guarantee the payment atomicity is proposed by applying verifiable encryption to an electronic cash system based on the representation problem. With the new method, the process of dispute settlement is improved in the fact that the trusted third party do not have to interact with the bank to resolve disputes. This method is also flexible in a sense that clients and shops can request for dispute settlement regardless of any deadline constraint. However, additional proof is necessary to apply verifiable encryption during payment. We discuss the security and the atomicity of our method, and compare ours with others.

An Analysis of the Media's Report on the Adoption of the Address of Things using Topic Modeling and Network Analysis (토픽 모델링과 네트워크 분석을 활용한 사물주소 도입에 대한 언론보도 분석)

  • Mo, Sung Hoon;Lim, Cheol Hyeon;Kim, Hyun Jae;Lee, Jung Woo
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.38-47
    • /
    • 2021
  • This study analyzed media reports on the Address of Things, which are being introduced through the amendment of related law and pilot projects. The titles and its texts in the media's reports were collected by searching for 'Address of Things' on the Naver News Platform. Then, we analyzed the corpus using by topic modeling and network analysis. As a result, there were four topics: 'Promotion of the address of things system', Proof of assigning Address of Things', 'Improvement of usage of the Roadname Address Systems', and 'Education and public relation for the address activation'. It was confirmed that the topic 'Proof of assigning Address of Things' was the main agenda. We presented some implication by comparing the results with the 「3rd Basic Plan for Address Policy (2018-2022)」 of the Ministry of Public Administration and Security.

Petrochemical Plant Safety Management System based on Wireless Transmitter (무선 트랜스미터 기반의 석유화학 플랜트 안전관리 시스템)

  • Kang, Sung-Min;Park, Soo-Yeol;Yeo, Keum-Soo;Park, Jae-Woo
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.19 no.6
    • /
    • pp.88-94
    • /
    • 2015
  • Large-scale petrochemical and power plants has increased demanting wireless technology for continuous monitoring. However, the current USN technologies, such as ZigBee and Bluetooth, are lackof reliability and security. Therefore, there is a strong need to apply a new wireless technology standard of the ISA. In this study, a petrochemicalplant safety management system based on the ISA wireless transmitter isdeveloped. ISA100.11a communication module and LTE communication module equippedwith an explosion-proof wireless transmitter are developed. A petrochemicalplant safety management system is built based on the IoT technologies. Thedeveloped system is verified through a wide range of testing and thus, on-siteapplicability is proved.

Impact of Personal Health Information Security Awareness on Convenience (개인의료정보보안인식이 편의성에 미치는 영향)

  • Park, Jung-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.600-612
    • /
    • 2017
  • The purpose of the research is that how awareness of importance of personal medical data, laws regarding personal medical data and perception gap regarding information of medical data system may affect usage of hospital convenience between a regular patient who has experienced hospital service and medical professionals. Preceding research analysis was conducted previous on establishing research model; 150 questionnaires to a regular patient and 150 questionnaires for a medical professional, total of 300 questionnaires were gathered for conducting a question investigation. First of all, the research concluded that there are a regular perception differences between a regular patient and medical professional. Moreover, there are perception differences among the different gender, age, and area of residence. Furthermore, medical professionals tend to consider that convenience of hospital usage will be increased if user strengthens recognition of security of personal medical data. Results of hypothesis stress that higher awareness of exposure of personal medical data and medical information system affect decision making convenience for a better usage of hospital. On the other side, awareness of laws related with personal medical information security does not affect decision making convenience of hospital usage and transaction. The results of the research analyzes with proof that strengthening awareness of personal medical data security positively increase convenience of decision making and transactions in selection of provided medical service.

Construction of UOWHF based on Block Cipher (유니버설 일방향 해쉬 함수에 대한 블록 암호 기반 구성 방법)

  • 이원일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.101-111
    • /
    • 2004
  • Preneel, Govaerts, and Vandewalle considered the 64 basic ways to construct a collision resistant hash function from a block cipher. They regarded 12 of these 64 schemes as secure, though no proofs or formal claims were given. Black, Rogaway, and Shrimpton presented a more proof-centric look at the schemes from PGV. They proved that, in the black box model of block cipher, 12 of 64 compression functions are CRHFs and 20 of 64 extended hash functions are CRHFs. In this paper, we present 64 schemes of block-cipher-based universal one way hash functions using the main idea of PGV and analyze these schemes in the black box model. We will show that 30 of 64 compression function families UOWHF and 42 of 64 extended hash function families are UOWHF. One of the important results is that, in this black box model, we don't need the mask keys for the security of UOWHF in contrast with the results in general security model of UOWHF. Our results also support the assertion that building an efficient and secure UOWHF is easier than building an efficient and secure CRHF.

The assessment of Seoul City school sheriff system and developmental expansion plan - Around the righteousness proof of the security industry law application - (서울시 학교보안관 제도의 평가와 발전적 확대방안 - 경비업법 적용의 당위성 논증을 중심으로 -)

  • Lee, Sang-Hun
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.163-191
    • /
    • 2011
  • Recently, the problems in school violence did not stop on the crime between the members at the school and which developed into the invasion crime of the school caused by outsiders. The school is no more the safety zone from the crime. Particularly, in the case of the elementary school, because there are nearly no people who oppose to the outside attacker and can control this, it is the place where it is vulnerable to the invasion crime. The Metropolis of Seoul implements the School Sheriff system within the jurisdiction bureau, in the public elementary school. However, actually the School Sheriff business is being managed, never applying a rule in the Security Industry Law with the main content, that is the Security Industry Law application is excluded. Because the jurisdiction on the contract of Seoul City and operating company are run, the various issues is caused. First, since it is not being considered as a security business, the commercial liability insurance for security company has no chance to applicate when the operation company and the School Sheriff have related damage generation. So the security for the indemnification of loss of the victim is weak. Second, The task of the School Sheriff is ruled just by in the individual contracts. But it is insufficient with this thing. The related duties are required some supplement like a general rule application including the obligation of the guard in the security industry law. Third, the education of the School Sheriff needs to connect with the educational programme in the security industry law. The related professional education specially needed for the prevention of school violence ought to be reserved compensation. Forth, the citizens still demand the strengthening of police patrol for the surroundings of a school in spite of the result of Seoul City's public survey. Therefore, the active relation of cooperation with the police needs to be supported legally and institutionally with the Security Industry Law application. Fifthly, the success of the School Sheriff business can be more guaranteed with the supervision of the legal and institutional device like a the Security Industry Law application or police and all sorts of administrative execution's and etc.

  • PDF

Development Web-based Arabic Assessments for Deaf and Hard-of-Hearing Students

  • Atwan, Jaffar;Wedyan, Mohammad;Abbas, Abdallah;Gazzawe, Foziah;Alturki, Ryan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.359-367
    • /
    • 2022
  • Arabic skills are the tools by which children are prepared for the educational procedures on which their life depends. Deaf and hard of hearing students (DHH), must be able to grasp the same Arabic terms as hearing students and their different meanings in a context of different sentences less than what they are supposed to be due to their inability. However, problems arise in the same Arabic word and their different meanings in a context for (DHH) students since the way of comprehending such words does not meet the needs and circumstances of (DHH) students. Therefore, researchers introduce web-based method for Arabic words and their meanings in a context prototype that can overcome those problems. Methodology: The study sample consists of 30 (DHH) students at Al Amal City of Palestine, Gaza Region (GR). Those participants that agreed to take part in this study were recruited using a purposeful sampling method. Additionally, to examine the survey information descriptively, the Statistical Packages for social Sciences (SPSS) version 24.0 was used. A sign language teaching movie is utilized in the prototype to standardize the process and verify that Arabic vocabulary and their implications are comprehended. The Evolutionary Process Model of Prototype technique was utilized to create this system. Finding: The findings of this study show that the prototype built is workable and has the ability to help DHHS differentiate between phrases that have the same letters but distinct meanings. The findings of this study are expected to contribute to a better understanding and application of Development of Web-based Arabic Assessments for (DHH) Students in developing countries, which will help to increase the use of Development of Web-based Arabic for (HDD) students in those countries. The empirical models of Web-based Arabic for (DHH) students are established as a proof of concept for the proposed model. The results of this study are predicted to have a significant impact to the information system practitioners and to the body of knowledge.

A Study on the Effect of System Characteristics of Online Lectures on Lecture Satisfaction in the COVID-19 Crisis: Focused on the Moderating Effect of ICT Utilization Ability (코로나19 사태에 온라인 강의의 시스템 특성이 강의만족도에 미치는 영향연구: ICT 활용능력의 조절효과를 중심으로)

  • Mo, Ya-Ting;Xu, Yu-Jia;Lee, Yoon-koo
    • Journal of Digital Convergence
    • /
    • v.19 no.9
    • /
    • pp.43-57
    • /
    • 2021
  • The purpose of this study is to find the relationship between Online Lecture System, Motivation for Use, ICT Utilization Ability, and Lectures Satisfaction as online lectures continue. For that, conducted survey of students at Woosong University, secured 330 valid samples, and conducted with analysis of actual proof with using SPSS 25.0. The results of the study confirmed that the system's Convenience, Simplicity, Security and Motivation for Use have significantly affected to Lecture Satisfaction, and also confirmed that ICT Utilization Ability, the variable of Moderating Effect, also has meaningful correlation between System Characteristics(Simplicity and Security) and Lecture Satisfaction. Therefore, the need for development and operation of additional education programs to improve ICT Utilization Ability as well as development of new online system are presented in order to enhance online Lecture Satisfaction of students. Lastly, various sample surveys and researches are seems to be needed in the future in order to increase the Lecture Satisfaction.

Simulator Design and Performance Analysis of BADA Distributed Consensus Algorithm (BADA 분산합의 알고리즘 시뮬레이터 설계 및 성능 분석)

  • Kim, Young Chang;Kim, Kiyoung;Oh, Jintae;Kim, Do Gyun;Choi, Jin Young
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.4
    • /
    • pp.168-177
    • /
    • 2020
  • In recent years, importance of blockchain systems has been grown after success of bitcoin. Distributed consensus algorithm is used to achieve an agreement, which means the same information is recorded in all nodes participating in blockchain network. Various algorithms were suggested to resolve blockchain trilemma, which refers conflict between decentralization, scalability, security. An algorithm based on Byzantine Agreement among Decentralized Agents (BADA) were designed for the same manner, and it used limited committee that enables an efficient consensus among considerable number of nodes. In addition, election of committee based on Proof-of-Nonce guarantees decentralization and security. In spite of such prominence, application of BADA in actual blockchain system requires further researches about performance and essential features affecting on the performance. However, performance assessment committed in real systems takes a long time and costs a great deal of budget. Based on this motivation, we designed and implemented a simulator for measuring performance of BADA. Specifically, we defined a simulation framework including three components named simulator Command Line Interface, transaction generator, BADA nodes. Furthermore, we carried out response surface analysis for revealing latent relationship between performance measure and design parameters. By using obtained response surface models, we could find an optimal configuration of design parameters for achieving a given desirable performance level.