• Title/Summary/Keyword: user-tracing

Search Result 90, Processing Time 0.027 seconds

A Traitor Tracing Using an Efficient Key Renewal in Embedded System (임베디드 시스템에서 효율적인 키 갱신을 적용한 Traitor Tracing)

  • Park, Jong-Hyuk;Lee, Deok-Gyu;Yeo, Sang-Soo;Kim, Tai-Hoon;Lee, Seung;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.245-254
    • /
    • 2008
  • If the broadcast message is sent, first of all, the privileged users will decode the session key by using his or her personal key, which the user got previously. The user willget the digital information through this session key. As shown above, the user will obtain messages or session keys using the keys transmitted from a broadcaster, which process requires effective ways for the broadcaster to generate and distribute keys. In addition, when a user wants to withdraw or sign up, an effective process to renew a key is required. It is also necessary to chase and check users' malicious activities or attacking others. This paper presents a method called Traitor Tracing to solve all these problems. Traitor tracing can check attackers and trace them. It also utilizes a proactive way for each user to have effective renewal cycle to generate keys.

  • PDF

New Revocable E-cash System Based on the Limited Power of TTP

  • Yan Xie;Fangguo Zhang;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.266-269
    • /
    • 2002
  • As a simulation or replacement of analog money in cyber space, the e-cash was introduced by using cryptographic primitives. Since a perfect anonymity system causes some illegal activities, such as money laundering, blackmailing, and illegal purchase, a revocable electronic system was paid a great attention to control the anonymity. In general, Trust Third Party(TTP) is introduced to detect any dubious user and coin, namely user tracing and coin tracing. In this paper we propose a new revocable anonymity e-cash system, and verify the security requirement as well. In our scheme a user first withdraws the e-coin from bank by using blind signature, and then TTP verifies the bank's signature and records the tracing information.

  • PDF

Traitor Tracing using an Efficient Key Renewal (효율적인 키 갱신 주기를 적용한 Traitor Tracing)

  • Lee, Deok-Gyu;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.799-802
    • /
    • 2007
  • Broadcast encryption has been applied to transmit digital information such as multimedia, software and paid TV programs on the open networks. This paper presents a method called Traitor Tracing to solve all these problems. Traitor tracing can check attackers and trace them. It also utilizes a proactive way for each user to have effective renewal cycle to generate keys.

  • PDF

The Elderly's Error Characteristics in Some Human Interactions (자극에 대한 상호작용 관점에서의 노인의 오류 특성)

  • Jung, Kwang-Tae
    • Journal of the Ergonomics Society of Korea
    • /
    • v.30 no.1
    • /
    • pp.109-115
    • /
    • 2011
  • In this research, three topics were studied for the elderly. The first was the elderly's error characteristics for tracing task and the second was for depth perception. The characteristics were compared with the young's. Twenty two old people and twenty two young people participated in the tracing experiment, respectively. In the depth perception experiment, twenty three old people and twenty two young people participated. A depth perception apparatus and a tracing one were used in the experiment. In the depth perception error, a significant difference was not detected on gender. However significant differences were detected with age and viewing distance. In the tracing error, significant difference was detected with age, also. The third experiment was push-button operation and fifteen old people participated in the experiment. As the result, operation time error was increased with the button size and the moving distance. The result of this study will be able to be considered in its user interface design to reduce the elderly's error while using a product.

Implement of Finger-Gesture Remote Controller using the Moving Direction Recognition of Single (단일 형상의 이동 방향 인식에 의한 손 동작 리모트 컨트롤러 구현)

  • Jang, Myeong-Soo;Lee, Woo-Beom
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.91-97
    • /
    • 2013
  • A finger-gesture remote controller using the single camera is implemented in this paper, which is base on the recognition of finger number and finger moving direction. Proposed method uses the transformed YCbCr color-difference information to extract the hand region effectively. The number and position of finger are computer by using a double circle tracing method. Specially, a user continuous-command can be performed repeatedly by recognizing the finger-gesture direction of single shape. The position information of finger enables a user command to amplify a same command in the User eXperience. Also, all processing tasks are implemented by using the Intel OpenCV library and C++ language. In order to evaluate the performance of the our proposed method, after applying to the commercial video player software as a remote controller. As a result, the proposed method showed the average 89% recognition ratio by the user command-mode.

A Research on User Tracing Technologies in Tor (Tor 사용자 추적 기술 동향에 관한 연구)

  • Han, KyungHyun;Hwang, Seong Oun
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.111-117
    • /
    • 2022
  • Anonymous networks are designed to protect information and communication by avoiding monitoring or tracking traffic. In recent years, however, cybercriminals have evaded law enforcement tracking by exploiting the characteristics of anonymous networks. In this paper, we investigate related research focusing on Tor, one of the anonymous networks. This paper introduces how Tor provides anonymity, and how tracing technologies can track users against Tor. In addition, we compare and analyze tracing techniques, and explain how a researcher can establish an experimental environment.

Cryptanalysis of Kim et al.'s Traitor Tracing Scheme on ACISP02

  • Fangguo Zhang;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.99-101
    • /
    • 2002
  • At ACISP'02, H.J. Kim et al.[1] proposed a new traitor tracing scheme. However, this paper show that the proposed scheme is to be insecure by presenting a conspiracy attack. Using our attack, any two subscribers can collaborate to derive the secret key of the data supplier and tell or sell it to any body. Thus, the unauthorized user can always decrypt the encrypted session key with the decrypted session key. Also the two subscribers cannot be traced by the data supplier

  • PDF

Security Analysis on 'Privacy-Preserving Contact Tracing Specifications by Apple and Google' and Improvement with Verifiable Computations ('애플과 구글의 코로나 접촉 추적 사양'에 대한 보안성 평가 및 검증 가능한 연산을 이용한 개선)

  • Kim, Byeong Yeon;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.291-307
    • /
    • 2021
  • There has been global efforts to prevent the further spread of the COVID-19 and get society back to normal. 'Contact tracing' is a crucial way to detect the infected person. However the contact tracing makes another concern about the privacy violation of the personal data of infected people, released by governments. Therefore Google and Apple are announcing a joint effort to enable the use of Bluetooth technology to help governments and health agencies reduce the spread of the virus, with user privacy and security central to the design. However, in order to provide the improved tracing application, it is necessary to identify potential security threats and investigate vulnerabilities for systematically. In this paper, we provide security analysis of Privacy-Preserving COVID-19 Contact Tracing App with STRIDE and LINDDUN threat models. Based on the analysis, we propose to adopt a verifiable computation scheme, Zero-knowledge Succinctness Non-interactive Arguments of Knowledges (zkSNARKs) and Public Key Infrastructure (PKI) to ensure both data integrity and privacy protection in a more practical way.

A Study on the RTMD(Requirement Tracing Matrix Design) Base on UML (UML기반의 요구사항 추적 매트릭스 설계)

  • Heo, Kwae-Bum;Kim, Young-Gyu;Yang, Dong-Il
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.3
    • /
    • pp.419-431
    • /
    • 2011
  • Design traceability has been widely recognized as being an integral aspect of software development. Also many projects for software application development have failed because that the projects did not analyze user requirements sufficiently and reflected them in the projects adequately. This thesis proposes a specification and tracing technique for object-oriented analysis and design. The subject of this study is the artifacts of UML development methodology. Therefore, to improve the quality of the software development cycle, in short, the system requirement of customers will be able to respond quickly.

A Study on GUI Program Development for Steam Tracing System Selection (스팀 트레이싱 시스템 사양 선정 GUI 프로그램 개발에 관한 연구)

  • Choi, Yo Han;Lee, Kwang-Hee;Lee, Chul-Hee;Park, Gwang Ho
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.20 no.4
    • /
    • pp.94-105
    • /
    • 2021
  • A graphical user interface (GUI) program for steam tracing system selection was developed by using a theoretical model. We derived the model on the basis of the one-dimensional heat transfer theory of conduction and convection through a composite wall. Computational fluid dynamics (CFD) and experiments were performed for validation at steam temperatures of 120.4[℃] and 158.9[℃]. The temperature of a pipe's outer surface obtained through CFD matched well with that predicted by the proposed model for both conditions. By contrast, the experiment results showed a small error at 120.4[℃] and a large error at 158.9[℃] because of the melting of the heat transfer compound and water phase transition. Thus, the steam temperature range of the proposed model is below 120.4[℃].