• 제목/요약/키워드: signature-tracing

검색결과 13건 처리시간 0.027초

그룹 서명 기법에서의 효율적이고 안전한 구성원 탈퇴 방법 (Efficient and Secure Member Deletion in Group Signature Scheme)

  • 김현정;임종인;이동훈
    • 정보보호학회논문지
    • /
    • 제11권6호
    • /
    • pp.41-51
    • /
    • 2001
  • 그룹 서명 기법은 익명성을 보장해주면서 그룹 구성원들로 하여금 그룹을 대표해서 서명을 할 수 있도록 하는 방법으로 분쟁이 발생하는 경우에는 지정된 그룹 관리자만이 구성원의 신원을 확인할 수 있다. 최근 수 년 동안, 그룹 서명 기법은 집중적으로 연구되어 왔으며 다양한 응용분야에 적용되고 있다. 그러나 그룹의 구성원이 소속된 그룹에서 탈퇴하기를 원하거나 불법행위 등의 이유로 그룹에서 강제 탈퇴되어야 하는 경우가 발생했을 때, 이 상황에 적합한 방법이 구체적으로 제시되어 있지 않다. [3]에서 언급한 바에 의하면 구성원 탈퇴에 따른 복잡도는 그룹 서명을 실생활에 적용하는데 있어 걸림돌이며 따라서 시급히 해결해야 할 문제이다. 이 논문에서 그룹 공개키와 서명 길이는 그룹 크기에 독립적이면서 구성원의 자유로운 탈퇴를 허용하는 효율적인 그룹 서명 기법을 제안한다. 제안한 그룹 서명 기법의 안전성은 RSA 가정에 기반하고 있다. 더 나아가 특정한 구성원이 생성한 서명을 추적해 낼 수 있는 방법도 더불어 제안한다.

New Revocable E-cash System Based on the Limited Power of TTP

  • Yan Xie;Fangguo Zhang;Kim, Kwangjo
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2002년도 종합학술발표회논문집
    • /
    • pp.266-269
    • /
    • 2002
  • As a simulation or replacement of analog money in cyber space, the e-cash was introduced by using cryptographic primitives. Since a perfect anonymity system causes some illegal activities, such as money laundering, blackmailing, and illegal purchase, a revocable electronic system was paid a great attention to control the anonymity. In general, Trust Third Party(TTP) is introduced to detect any dubious user and coin, namely user tracing and coin tracing. In this paper we propose a new revocable anonymity e-cash system, and verify the security requirement as well. In our scheme a user first withdraws the e-coin from bank by using blind signature, and then TTP verifies the bank's signature and records the tracing information.

  • PDF

RCS/ISAR를 이용한 레이다 표적분석 기법 및 소프트웨어 개발 (A Development of the Analysis Technique for Radar Target Signature and the Sofware using RCS/ISAR)

  • 권경일;유지희;정명수;윤태환
    • 한국군사과학기술학회지
    • /
    • 제7권2호
    • /
    • pp.88-99
    • /
    • 2004
  • A development of a software on radar target signature analysis is presented in this paper The target signature includes Radar Cross Section(RCS) prediction, Range Profile(RP) processing and Inverse Synthetic Aperture Radar(ISAR) processing. Physical Optics(PO) is the basic calculation method for RCS prediction and Geometrical Optics(GO) is used for ray tracing in the field calculation of multiple reflection. For RP and ISAR, Fast Fourier Transform(FFT) and Matrix Pencil(MP) method were implemented for post-processing. Those results are integrated into two separate softwares named as Radar Target Signature Generator(RTSG) and Radar Target Signature Analyser(RTSA). Several test results show good performances in radar signature prediction and analysis.

An Efficient Anonymous Authentication and Vehicle Tracing Protocol for Secure Vehicular Communications

  • Park, Young-Shin;Jung, Chae-Duk;Park, Young-Ho;Rhee, Kyung-Hyune
    • 한국멀티미디어학회논문지
    • /
    • 제13권6호
    • /
    • pp.865-874
    • /
    • 2010
  • Recently, Hao et al. proposed a privacy preservation protocol based on group signature scheme for secure vehicular communications to overcome a well-recognized problems of secure VANETs based on PKI. However, although efficient group signature schemes have been proposed in cryptographic literatures, group signature itself is still a rather much time consuming operation. In this paper, we propose a more efficient privacy preservation protocol than that of Hao et al. In order to design a more efficient anonymous authentication protocol, we consider a key-insulated signature scheme as our cryptographic building block. We demonstrate experimental results to confirm that the proposed protocol is more efficient than the previous scheme.

Signature 기반의 겹쳐진 원형 물체 검출 및 인식 기법 (Detection and Recognition of Overlapped Circular Objects based a Signature Representation Scheme)

  • 박상범;한헌수;한영준
    • 제어로봇시스템학회논문지
    • /
    • 제14권1호
    • /
    • pp.54-61
    • /
    • 2008
  • This paper proposes a new algorithm for detecting and recognizing overlapped objects among a stack of arbitrarily located objects using a signature representation scheme. The proposed algorithm consists of two processes of detecting overlap of objects and of determining the boundary between overlapping objects. To determine overlap of objects, in the first step, the edge image of object region is extracted and those areas in the object region are considered as the object areas if an area is surrounded by a closed edge. For each object, its signature image is constructed by measuring the distances of those edge points from the center of the object, along the angle axis, which are located at every angle with reference to the center of the object. When an object is not overlapped, its features which consist of the positions and angles of outstanding points in the signature are searched in the database to find its corresponding model. When an object is overlapped, its features are partially matched with those object models among which the best matching model is selected as the corresponding model. The boundary among the overlapping objects is determined by projecting the signature to the original image. The performance of the proposed algorithm has been tested with the task of picking the top or non-overlapped object from a stack of arbitrarily located objects. In the experiment, a recognition rate of 98% has been achieved.

An Efficient Dynamic Group Signature with Non-frameability

  • Xie, Run;Xu, Chunxiang;He, Chanlian;Zhang, Xiaojun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권5호
    • /
    • pp.2407-2426
    • /
    • 2016
  • A group signature scheme allows any member to sign on behalf of a group. It is applied to practical distributed security communication environments, such as privacy-preserving, data mining. In particular, the excellent features of group signatures, including membership joining and revocation, anonymity, traceability, non-frameability and controllable linkability, make group signature scheme more attractive. Among these features, non-frameability can guarantee that a member's signature cannot be forged by any other (including issuer), and controllable linkability supports to confirm whether or not two group signatures are created by the same signer while preserving anonymity. Until now, only Hwang et al.'s group schemes (proposed in 2013 and 2015) can support all of these features. In this paper, we present a new dynamic group signature scheme which can achieve all of the above excellent features. Compared with their schemes, our scheme has the following advantages. Firstly, our scheme achieves more efficient membership revocation, signing and verifying. The cost of update key in our scheme is two-thirds of them. Secondly, the tracing algorithm is simpler, since the signer can be determined without the judging step. Furthermore, in our scheme, the size of group public key and member's private key are shorter. Lastly, we also prove security features of our scheme, such as anonymity, traceability, non-frameability, under a random oracle model.

VSS와 은닉서명에 기반한 공정한 추적 방식 (Fair Tracing based on VSS and Blind Signature)

  • 김병곤;김광조
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2003년도 하계학술대회논문집
    • /
    • pp.53-56
    • /
    • 2003
  • 전자현금에 대한 암호학적 요구사항 중의 하나가 추적성이다. 전자 현금에 대한 무조건적인 익명성은 돈 세탁, 협박등의 완전범죄가 가능하게 하며, 반대로 익명성이 보장되지 않는다면 전자현금 사용에 따른 사생활 보호 문제가 대두되게 된다. 이를 해결하고자 등장한 것이 합법적인 추적성을 보장하는 공정한 추적 방식이며, 본 논문에서는 제3의 신뢰기관, 은닉서명, VSS(verifiable secre sharing)을 결합한 새로운 공정한 추적방식을 제안한다.

  • PDF

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing

  • Dai, Yingling;Weng, Jian;Yang, Anjia;Yu, Shui;Deng, Robert H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권8호
    • /
    • pp.2827-2848
    • /
    • 2021
  • Mobile Crowdsourcing (MCS) has become an emerging paradigm evolved from crowdsourcing by employing advanced features of mobile devices such as smartphones to perform more complicated, especially spatial tasks. One of the key procedures in MCS is to collect answers from mobile users (workers), which may face several security issues. First, authentication is required to ensure that answers are from authorized workers. In addition, MCS tasks are usually location-dependent, so the collected answers could disclose workers' location privacy, which may discourage workers to participate in the tasks. Finally, the overhead occurred by authentication and privacy protection should be minimized since mobile devices are resource-constrained. Considering all the above concerns, in this paper, we propose a lightweight and privacy-preserving answer collection scheme for MCS. In the proposed scheme, we achieve anonymous authentication based on traceable ring signature, which provides authentication, anonymity, as well as traceability by enabling malicious workers tracing. In order to balance user location privacy and data availability, we propose a new concept named current location privacy, which means the location of the worker cannot be disclosed to anyone until a specified time. Since the leakage of current location will seriously threaten workers' personal safety, causing such as absence or presence disclosure attacks, it is necessary to pay attention to the current location privacy of workers in MCS. We encrypt the collected answers based on timed-release encryption, ensuring the secure transmission and high availability of data, as well as preserving the current location privacy of workers. Finally, we analyze the security and performance of the proposed scheme. The experimental results show that the computation costs of a worker depend on the number of ring signature members, which indicates the flexibility for a worker to choose an appropriate size of the group under considerations of privacy and efficiency.

익명 게시판 환경에서 가상 아이디를 이용한 개인정보보호에 관한 연구 (A Study on the protection of personal information using a Virtual IDs in an anonymous bulletin board)

  • 민소연;장승재
    • 한국산학기술학회논문지
    • /
    • 제13권9호
    • /
    • pp.4214-4223
    • /
    • 2012
  • 최근 인터넷 게시판의 실명 및 익명 사용에 대한 논쟁은 주요 이슈가 되고 있다. 실명을 사용할 경우 자유로운 토론 및 프라이버시 침해할 우려가 있는 반면에, 익명을 사용하는 경우에 있어서는 악성 댓글 폭력이라든지, 존재하지 않는 허위 사실 유포 등의 인터넷의 역기능이 나타날 수 있다. 따라서 본 논문에서는 SSO의 기술 중 하나인 XML 토큰 방식을 사용하여 개인정보의 분산을 막고 단일 로그인이 가능하게 하였고 토큰 발급 시 가상 아이디와 경로구성을 통해 익명성 및 조건부 추적이 가능한 익명 게시판을 제안 하였다. 성능분석 결과 접속자 수에 따른 인증시간에서 그룹 서명 방식을 사용한 익명 게시판은 평균 응답 속도가 0.72초, 제안하는 방식은 0.18초를 나타내었다. 즉 인증시간에서 4~5배 정도 빠른 응답 속도를 보였다. 또한 제안하는 시스템은 단일 인증을 제공하고 사용자가 서명을 하지 않아도 되기 때문에 사용자 편의성에서 월등히 뛰어나며, 익명 게시판 환경에서의 사용자 편의성은 제안하는 시스템이 더 적합함을 알 수가 있었다.

통킹만 경계획정을 통해본 중국의 해양경계획정 정책 및 우리나라 대응방안에 관한 연구 (A Study on the Maritime Delimitation Policy of China on Maritime Delimitation in Tonkin Gulf and Policy of Korea)

  • 양희철;박성욱;정현수
    • Ocean and Polar Research
    • /
    • 제29권3호
    • /
    • pp.245-262
    • /
    • 2007
  • On 25 December 2000, China and Vietnam signed the Agreement on the Delimitation of the Territorial Seas, EEZs and Continental Shelves in the Tonkin Gulf. Three and a half years after signature, in June 2004, China and Vietnam both ratified a maritime boundary agreement for the Tonkin Gulf (Beibu Gulf) and the agreement entered into force. A potentially complicating factor in the negotiation process was likely to have been the status of the Sino-French Agreement of 1887. In the end, the agreement reached indicated that even if the status of the Sino-French Agreement of 1887 was part of the negotiations, both sides eventually agreed that it would not have an impact on the delimitation of maritime zones in the Gulf of Tonkin. Another crucial issue was the impact of the islands, in particular, the Vietnamese controlled Bach Long Vi Island and Con Co Island. Especially, Bach Long Vi Island was entitled to a half suite of maritime zones (3n.m. EEZ) and would impact the tracing of a line of equidistance in the Gulf of Tonkin. Minor as the point might be, Con Co Island also would have an impact for it would play a fixing terminal point for the boundary. Article 7 of the agreement is about minerals and hydrocarbons of cross-boundary deposit, and if any single geophysical structure of oil and gas or other mineral deposits should straddle the demarcation line, an agreement is to be reached on the development of the structure or deposit and on the most effective manner to equally share the profits resulting from the development.