• Title/Summary/Keyword: trust third party

Search Result 49, Processing Time 0.026 seconds

DIT (Digital Investment Trust) Agent Based on ECSSL (Elliptic Curve SSL) (ECSSL(Elliptic Curve SSL) 기반 DIT(Digital Investment Trust) 에이전트)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.599-608
    • /
    • 2002
  • This paper proposes DIT (Digital Investment Trust) agent based on ECSSL (Elliptic Curve SSL). This DIT agent is a banking project using IT (Investment Trust) conception based on EC (Electronic Commerce) and can manage micro payment, account opening and account transferring. In addition, ECSSL (Elliptic Curve SSL) protocol is implemented which consists of much better encryption functions than existing SSL (Secure Socket Layer) Protocol. Therefore, This DIT agent based on ECSSL protocol protects a customer's information and asset from third party.

A1lowing Anonymity in Fair Threshold Decryption (익명성을 제공하는 공평한 그룹 복호화 기법)

  • Kim, Jin-Il;Seo, Jung-Joo;Hong, Jeong-Dae;Park, Kun-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.6
    • /
    • pp.348-353
    • /
    • 2010
  • A threshold decryption scheme is a multi-party public key cryptosystem that allows any sufficiently large subset of participants to decrypt a ciphertext, but disallows the decryption otherwise. When performing a threshold decryption, a third party is often involved to guarantee fairness among the participants. To maintain the security of the protocol as high as possible, it is desirable to lower the level of trust and the amount of information given to the third party. In this paper, we present a threshold decryption scheme which allows the anonymity of the participants as well as the fairness by employing a semi-trusted third party (STTP) which follows the protocol properly with the exception that it keeps a record of all its intermediate computations. Our solution preserves the security and fairness of the previous scheme and reveals no information about the identities of the participants and the plaintext even though an attacker is allowed to access the storage of the STTP.

Review of the Supreme Court Judgement on Real Estate Nominal Trust without Intermediate Registration (부동산의 제3자간 명의신탁에 관한 대법원의 판례평석)

  • Park, Kwang-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.141-143
    • /
    • 2016
  • 2016년 5월 19일 대법원은 전원합의체판결에서 부동산 매수자가 본인 명의로 소유권이전등기를 하지 않고 등기를 매도인에게서 직접 명의수탁자로 이전하는 제3자간 명의신탁(중간생략등기형 명의신탁)의 경우 명의수탁자가 신탁부동산을 임의로 처분하여도 형사처벌를 할 수 없다는 판결을 하였다. 본 논문에서는 민법과 형법의 교차영역인 명의신탁에서 민사사건의 형사화를 지양했다는 점에서 긍정적인 평가를 하지만 이에 따른 관련법의 정비를 통한 법개정을 제안한다. 즉, 명의신탁에 관한 법제 간 모순을 극복하기 위해 '부동산 실권리자명의 등기에 관한 법률'의 개정이 요구된다. 또한 부동산소유자가 그 등기명의를 타인에게 신탁하기로 하는 명의신탁약정을 맺고 그 등기명의를 명의수탁자에게 이전하는 소위 2자간 명의신탁의 경우도 비범죄화를 함으로써 법체계의 논리성과 통일성을 확보할 필요가 있다.

  • PDF

A Survey about Consensus Algorithms Used in Blockchain

  • Nguyen, Giang-Truong;Kim, Kyungbaek
    • Journal of Information Processing Systems
    • /
    • v.14 no.1
    • /
    • pp.101-128
    • /
    • 2018
  • Thanks to its potential in many applications, Blockchain has recently been nominated as one of the technologies exciting intense attention. Blockchain has solved the problem of changing the original low-trust centralized ledger held by a single third-party, to a high-trust decentralized form held by different entities, or in other words, verifying nodes. The key contribution of the work of Blockchain is the consensus algorithm, which decides how agreement is made to append a new block between all nodes in the verifying network. Blockchain algorithms can be categorized into two main groups. The first group is proof-based consensus, which requires the nodes joining the verifying network to show that they are more qualified than the others to do the appending work. The second group is voting-based consensus, which requires nodes in the network to exchange their results of verifying a new block or transaction, before making the final decision. In this paper, we present a review of the Blockchain consensus algorithms that have been researched and that are being applied in some well-known applications at this time.

Introducing Contemporary Blockchain Platforms

  • Alrumaih, Malak Suliman
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.9-18
    • /
    • 2021
  • Blockchain and its infrastructure technology have expanded rapidly in the last decade and are in high demand, but there is a lack of comprehensive studies on those platforms. Blockchain is a new technology based on the distributed digital ledger system. Decentralized trust is one of the key factors behind the blockchain-based system. Transparency of such a system is better than a conventional centralized ledger system. By using a blockchain-based transaction system, any business organization can harness key benefits like data integrity, confidentiality, and anonymity without involving any third party in control of the transactions. Since the blockchain is used in numerous applications and the horizon is expanding at an unprecedented pace. So, there is a need for an introducing and reviewing of blockchain platforms. In this paper, we have reported a review on existing contemporary blockchain platforms. In particular, From the existing studies, we have identified eighty blockchain platforms and the majority of them have a lack of technical details. To provide the researchers a comprehensive introducing on blockchain platforms to perform a broad guideline for future research and investment in the blockchain domain.

A Novel Electronic Voting Mechanism Based on Blockchain Technology

  • Chuan-Hao, Yang;Pin-Chang Su;Tai-Chang Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2862-2882
    • /
    • 2023
  • With the development of networking technology, it has become common to use various types of network services to replace physical ones. Among all such services, electronic voting is one example that tends to be popularized in many countries. However, due to certain concerns regarding information security, traditional paper voting mechanisms are still widely adopted in large-scale elections. This study utilizes blockchain technology to design a novel electronic voting mechanism. Relying on the transparency, decentralization, and verifiability of the blockchain, it becomes possible to remove the reliance on trusted third parties and also to enhance the level of trust of voters in the mechanism. Besides, the mechanism of blind signature with its complexity as difficult as solving an elliptic curve discrete logarithmic problem is adopted to strengthen the features related to the security of electronic voting. Last but not least, the mechanism of self-certification is incorporated to substitute the centralized certificate authority. Therefore, the voters can generate the public/private keys by themselves to mitigate the possible risks of impersonation by the certificate authority (i.e., a trusted third party). The BAN logic analysis and the investigation for several key security features are conducted to verify that such a design is sufficiently secure. Since it is expected to raise the level of trust of voters in electronic voting, extra costs for re-verifying the results due to distrust will therefore be reduced.

A Study on the Factors affecting Passengers'Impulsive Decision Making Behavior in Food and Beverage Restaurant in Airports (공항 식음료 매장에서 공항이용객의 충동구매행동에 영향을 미치는 요인에 대한 연구)

  • Ko, Dong-Han;Kim, Geun-Su;Kim, Yong-Bum
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.27 no.1
    • /
    • pp.69-80
    • /
    • 2019
  • The purpose of this study is to investigate factors that affect menu navigation time and consumer trust in food and beverage(F&B) restaurants to analyze the menu's effect on impulse buying behavior. Based on the results of the analysis, this paper derives theoretical and practical implications to improve the growth and development of F&B restaurants located in airports. According to empirical analysis, it was proven menu browsing time has been found to strongly influence passengers' impulsive order behavior. A passenger with a strong "consumption ability" navigates the menu for a longer period, which increases the likelihood of impulsive purchases. Service appeal also has a significant influence on menu navigation time. Third-party certification did not appear to help build passenger confidence, thus yielding contradictory results compared to previous studies. Word of mouth had the strongest influence on trust formation. Finally, when passengers were satisfied with the menu items of F&B restaurants they had previously ordered, they tended to believe that the menu items they had not tried would also be good. In sum, impulsive menu orders have a direct impact on the profitability of F&B restaurants.

Digital Identity Trend for Digital Trust Society (디지털 신뢰 사회 실현을 위한 디지털 아이덴티티 동향)

  • Kwon, D.S.;Lee, H.;Park, J.D.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.3
    • /
    • pp.114-124
    • /
    • 2019
  • The Internet was designed for machines, not humans, and hence, nobody owns a digital identity. Instead, a digital identity is rented from a website and an application. This lack of unique and secure digital identities has resulted in confusion in the online/cyber world. Digital identities pose one of the oldest and most difficult problems with regard to the Internet. There is still no way to use digital credentials to prove, own, and control an online identity, namely a self-sovereign identity, in the same manner we do in the offline world, particularly without a trusted third party. This article discusses the current open standards for digital identities, proposes solutions pertaining to digital identities in the future, and introduces the concept of a blockchain-based self-sovereign digital identity without the need of trusted third parties.

Recognition of Japan politics about Dokdo and our strategy (일본 정치권의 독도인식과 우리의 대응전략)

  • Kim, Young-Pil
    • Strategy21
    • /
    • s.31
    • /
    • pp.164-189
    • /
    • 2013
  • Last December, the Abe government came back, and it is critical core of Northeast Asia. They visited to Yasukuni Shrine, denied to Korea's invasion and they are denying all of their invasion history. I'm afraid they want to take Dokdo. Dokdo is Korean territory, but Japan politics assert it belongs to them. To make matters worse, they are waiting an opportunity to invade. Ministry of Foreign Affair blue paper and Ministry of Defense white paper have claimed Dokdo as Japanese territory, and many right wing politicians are taking part in the Cabinet. Liberal Democratic Party of Japan is becoming more right wing politicians than before by Japan Restoration Party, and the others also have more right wing ideologies. It can't control Japan right wing political parties. They finally aim to take Dokdo. In this situation, we have to defend Dokdo. Japan must be very important partner for our nation's development. But it is necessary to trust between two countries. Dokdo is effective controlled by Korea. It is the best way how to keep Dokdo. During Dokdo is effective controlled by Korea, the Japanese Government has limited Dokdo's ownership. Now we don't have any way to keep Dokdo except more effective control. We have strategies about Japanese claim of Dokdo's ownership as follows. First, we can overpower Japan right wing politics as Japan conscientious force's ideology. Second, Japan politics say to Dokdo's ownership is based on The San Francisco Treaty. But it is not right. Third, we have to exchange a lot of local government and civic society in Japan. Finally, we must prepare thoroughly to bring the matter to the International Court of Justice.

  • PDF

A Study on Authentication ID using Identifier in Ad-hoc Network (Ad-hoc 네트워크에서 식별자를 이용한 인증 아이디에 관한 연구)

  • Moon, Jong-Sik;Byeon, Sang-Gu;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1202-1211
    • /
    • 2010
  • The connection between devices in Ad-hoc network a network based on trust. Because a temporary device frequently join or leave, the authentication and security technology should be prepared for malicious device of a third-party attacks. The authentication scheme with the existing certification and ID, and the security technology using symmetric key and the public key is used. Therefore, in this paper we proposed two devices not having shared information use to generate each other's authentication ID. The use of authentication ID can establish the mutual trust and, provide security and efficiency for communication uses to generate a symmetric key.