• Title/Summary/Keyword: trusted channel

Search Result 17, Processing Time 0.022 seconds

A New Universally Verifiable and Receipt-free Electronic Voting Scheme Using Only One-way Untappable Channels (일방향 도청 불가능한 채널만을 이용하여 전체검증과 매표방지를 제공하는 새로운 전자선거 기법)

  • 조진현;김상진;오희국
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.49-61
    • /
    • 2003
  • Electronic voting schemes must provide universal verifiability and receipt-freeness, as well as basic properties such as privacy, eligibility, to make the election fair and transparent. But it is difficult to provide both universal verifiability and receipt-freeness because they are mutually contradictory in their objective. To date, most electronic voting schemes provide only one of these properties and those few that provide both properties are not practical due to heavy computational load. In this paper, we present an efficient electronic voting scheme that provides both properties. The proposed scheme uses a trusted third party called HR(Honest Randomizer) and requires only one-way untappable channels from HRs to voters. Among the schemes that assume only one-way untappable channel this scheme requires the least amount of computation. Among the schemes that provide both properties, this scheme uses the weakest physical assumption. We also discuss the security of the system and compare our scheme with other related schemes.

Test on the Security and Performance on the Basis of the Access Control Policy Implemented by Secure OS (안전한 운영체제 접근제어 정책에 대한 보안성 및 성능 시험)

  • Kim, Jeong-Nyeo;Sohn, Sung-Won;Lee, Chelo-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.10D no.5
    • /
    • pp.773-780
    • /
    • 2003
  • SecuROS(Secure & Reliable Operating System) prevents and blocks possible system cracking by implementing additional security functions in FreeBSD 4.3 operating system (OS) kernel, including access control, user authentication, audit trail, encryption file system and trusted channel. This paper describes access control technique, which is one of core technologies of SecuROS, introduces the implementations of DAC, MAC and RBAC, all of which are corresponding access control policies, and show security and results of performance measurement on the basis of application of access control policies. Finally, security and performance between conventional OS environment and environment adopting access control policy is described.

The Qualitative Study on Outdoor Sportswear Purchase Behavior -Focusing on Functional Fabric Awareness Level and Benefits Sought- (아웃도어 스포츠웨어 구매행동에 관한 질적 연구 -기능성 인지수준과 추구 혜택을 중심으로-)

  • Rhee, Young-Ju;Lee, Eun-Ok
    • The Research Journal of the Costume Culture
    • /
    • v.19 no.5
    • /
    • pp.1088-1101
    • /
    • 2011
  • The purpose of this study was to examine the outdoor sportswear purchase behavior, outdoorwear sportswear brand preference, functional fabric awareness, and benefits sought. The research was performed through in-depth interview during February to March 2011. Data were collected from 10 consumers who had purchased outdoor sportswear and experienced camping in 6 months. First, the results from study showed that functionality/comfortability, design, color, and brand name were important factors in selecting outdoor sportswear. Offline stores were the main place to purchase, however, internet shopping mall and portal online community were another shopping channel as well. Second, respondents preferred imported outdoor sportswear brand to national brand. According to the study, the respondents trusted the imported outdoor sportswear quality based on the brand name, value, and brand history more than national brand. Third, consumers who had low functional fabric awareness were more likely to evaluate apparel products based on the brand name. Knowledge levels for textile functions were high in elastic, UV protection, air permeable, and antibacterial properties. The essential features for camping were water absorbing and quick dry, water resistance, wind proof, UV protection, and fire retardant properties. Finally the results showed that there were two sportswear benefit soughts: functionality and status ostentation.

Determinants of Access to Green Finance in Vietnam: An Empirical Research

  • LE, Lam Hai;PHAM, Anh Hoang Thi
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.9
    • /
    • pp.79-89
    • /
    • 2021
  • Green finance plays an important role in environmental protection missions and fighting climate change. The Environment Fund in Vietnam is the main channel of preferential capital offered to firms for environmental protection. Unfortunately, it was previously unknown which criteria influenced these companies' ability to obtain green financing. Using a survey method, we collected data through a structured questionnaire of 203 respondents that represent firms that had received concessional loans from 26 Environment Funds. A Multiple Linear Regression model was used to examine the determinants of access to concessional loans for environmental protection. We found relationships between age, size, ownership type, and industry sector, and access to green finance. Third-party guarantees were a significant factor in financing through Environment Funds. Moreover, we found commercial environmental projects face fewer green financing obstacles. Surprisingly, showing audited financial statements does not mitigate the information asymmetry between firms and these financial institutions. These findings suggest that Environment Funds should classify environmental project types to develop appropriate lending policies. In emerging markets, enterprises need to build a trusted relationship with financial institutions so that they can replace asset-based lending techniques, thereby increasing the firms' accessibility to green finance.

Yi et al.'s Group Key Exchange Protocol : A Security Vulnerability and its Remediation (Yi등이 제안한 그룹 키 교환 프로토콜의 보안 취약성 및 개선 방법)

  • Lee, Young-Sook;Kim, Jee-Yeon;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.4
    • /
    • pp.91-98
    • /
    • 2012
  • A group key exchange (GKE) protocol is designed to allow a group of parties communicating over a public network to establish a common secret key. As group-oriented applications gain popularity over the Internet, a number of GKE protocols have been suggested to provide those applications with a secure multicast channel. Among the many protocols is Yi et al.'s password-based GKE protocol in which each participant is assumed to hold their individual password registered with a trusted server. A fundamental requirement for password-based key exchange is security against off-line dictionary attacks. However, Yi et al.'s protocol fails to meet the requirement. In this paper, we report this security problem with Yi et al.'s protocol and show how to solve it.

Performance Analysis of MAP Algorithm by Robust Equalization Techniques in Nongaussian Noise Channel (비가우시안 잡음 채널에서 Robust 등화기법을 이용한 터보 부호의 MAP 알고리즘 성능분석)

  • 소성열
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.9A
    • /
    • pp.1290-1298
    • /
    • 2000
  • Turbo Code decoder is an iterate decoding technology, which extracts extrinsic information from the bit to be decoded by calculating both forward and backward metrics, and uses the information to the next decoding step Turbo Code shows excellent performance, approaching Shannon Limit at the view of BER, when the size of Interleaver is big and iterate decoding is run enough. But it has the problems which are increased complexity and delay and difficulty of real-time processing due to Interleaver and iterate decoding. In this paper, it is analyzed that MAP(maximum a posteriori) algorithm which is used as one of Turbo Code decoding, and the factor which determines its performance. MAP algorithm proceeds iterate decoding by determining soft decision value through the environment and transition probability between all adjacent bits and received symbols. Therefore, to improve the performance of MAP algorithm, the trust between adjacent received symbols must be ensured. However, MAP algorithm itself, can not do any action for ensuring so the conclusion is that it is needed more algorithm, so to decrease iterate decoding. Consequently, MAP algorithm and Turbo Code performance are analyzed in the nongaussian channel applying Robust equalization technique in order to input more trusted information into MAP algorithm for the received symbols.

  • PDF

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.