9 research outputs found

    Collusion-resistant convertible ring signature schemes

    No full text
    A ring signature scheme provides signer ambiguity by hiding a signer in a ring of arbitrary members appropriately. A convertible ring signature scheme is an extension of a ring signature scheme that authenticates a signer and proves that a real signer and no one else generated a ring signature. In this paper, we first show that the recent convertible ring signature scheme proposed by Jeong et al. is vulnerable to collusion attacks. Second, we present a formal security model for a convertible ring signature with collusion resistance. The security notion of a convertible ring signature is intrinsically different from that of an ordinary ring signature due to the conversion property. For our collusion resistance, we consider full key exposure, that is, even an adversary who knows all secret keys will not be able to break the collusion resistance. Finally, we construct a novel convertible ring signature scheme with collusion resistance and prove the security of the scheme in the presented security model. We also compare our scheme with the existing ring signature schemes in the literature to show its advantages

    An enhanced (t,n) threshold directed signature scheme

    No full text
    A directed signature scheme is devised to achieve directivity for verification such that only a designated verifier can check the validity of a signature and, in times of trouble, any third party can verify the signature with the help of the signer or the designated verifier. A threshold directed signature scheme distributes responsibility and authority for generating a directed signature to several users via a threshold mechanism. Lu et al. recently proposed a novel (t,n)(t,n) threshold directed signature scheme. In this paper, we show that the scheme is vulnerable to a rogue-key attack which is mounted by an adversary who can arbitrarily select his or her public key. Through the rogue-key attack, the adversary can forge a signature on any message for a set of signers. In order to thwart such a rogue-key attack, we propose an enhanced (t,n)(t,n) threshold directed signature scheme with a reliable key registration protocol. The protocol guarantees that a user should have access to the secret key corresponding to the user’s public key. Under the computational Diffie-Hellman assumption, we prove that the improved scheme is secure, that is, it achieves existential unforgeability under the chosen message attack, invisibility, and transitivity in the registered key model. We stress that the security of our improved scheme does not depend on a specific broadcast channel for synchronous message transmission

    New Efficient Batch Verification for an Identity-Based Signature Scheme

    No full text
    Batch verification is a method to verify multiple digital signatures at a batch in time less than total individual verification time. Batch verification for an identity-based signature (IBS) scheme is attractive because a short public identity such as an e-mail address can be used as a verification key. In this paper, we first review the recent IBS scheme proposed in [44] and its batch verifier to show that the batch verifier is vulnerable to a forgery attack. In order to resist to the attack, we propose a new efficient batch verifier for the IBS scheme. The proposed batch verifier can deal with arbitrary number of signatures as a batch. We prove formally that the proposed batch verifier is secure. Then, we analyze the computation cost of the proposed batch verifier using concrete parameters and compare it with well-known batch verifiers. The comparison shows that our batch verifier can significantly outperform the existing batch verifiers in computation. We finally present a one-round three-party identity-based key agreement protocol as an application of our batch verifier, that requires only three pairing operations in verification

    Visualization of security event log collection across multiple networks and its application to a CSOC

    No full text
    We introduce VisIDAC presented in Song at al (In:Nguyen, P.Q.,Zhou, J. (eds.) Information Security—20th International Conference, ISC 2017, Security and Cryptology, vol. 10599. Springer International Publishing, 2017), which is a 3-D real-time visualization of security event log collection detected by intrusion detection systems installed in multiple networks. VisIDAC consists of three parallel plane-squares which represent global source networks, target networks, and global destination networks. Security events are displayed in different shapes, colors and spaces, according to their main features. It helps security operators to immediately understand the key properties of security events.We also apply VisIDAC to a public cyber security operations center, Science and Technology Cyber Security Center (S&T-CSC), and demonstrate its usefulness.VisIDACallows users to grasp more intuitively the overall flow of security events and their trend, makes it easy to recognize large-scale security events such as network scanning, port scanning, and distributed denial of service attacks, and is also effective to distinguish security event types: which target network they  are related to; whether they are inbound or outbound traffic; whether they are momentary or continuous; and what protocol and port number are mainly used

    Simplified small exponent test for batch verification

    No full text
    The Small Exponent Test (SET) for exponentiation is an essential batch-verification technique that is widely applied. In this paper, we propose a simplified SET that can securely batch-verify n   instances with only n−1n−1 randomizing exponents. We show that the structure of the proposed batch test is compact in the sense that it works with a minimal number of randomizing exponents for the SET. Thus, our test offers various advantages. Overall, compared to the original SET, the proposed simplified SET is more efficient for any sized batch instance. In particular, unlike the SET, our proposal performs well even when the size of a batch instance is small, e.g., n=1,2,3n=1,2,3, and 4. This feature can be also used to significantly reduce pairing computations in a signature scheme where several pairing equations are verified. In addition, our test can be combined easily and generically with existing batch techniques such as the use of sparse exponents, the bucket test for large batch sizes, or an automated tool to generate a batch algorithm. Finally, with our simplified test, an efficient identification algorithm can be constructed to discover incorrect instances in a batc

    Science and Technology Information Security

    No full text
    funder : 미래창조과학부funder : KAagency : 한국과학기술정보연구원agency : Korea Institute of Science and Technology Information○ 본 연구사업은 국가 과학기술분야 핵심 연구정보자원을 웜 • 바이러스 및 해킹 등의 사이버 침해위협으로부터 보호하여 안전한 연구 환경을 조성하기 위하여 추진되었음 ○ 과학기술사이버안전센터의 전주기적 보호활동을 통한 대상기관 침해사고 피해 최소화 및 사전 예방을 위하여 침해위협관리시스템 및 종합정보분석시스템 등 정보보호 기반을 활용하여 24시간 실시간 상황관제 활동, 과학기술분야 맞춤형 정보보호 기술에 대한 지속적 연구 및 정보보호 기술공유와 정보보호 커뮤니티 활동을 적극적으로 수행하였음 ○ 과학기술분야에 적합한 정보보호 활동을 수행하기 위하여 신규 침해공격시도를 탐지하기 위한 네트워크 분석 및 탐지패턴 개발, 상황관제시스템의 성능개선 등을 지속적으로 추진하여 과학기술사이버안전센터의 기술력을 향상시켰음 ○ 연구사업 수행결과는 과학기술 분야 정보보호를 위한 일원화된 체계 구축을 통한 관제 체제의 효율성 향상 및 중요 연구정보자원 이용자에 대한 안전한 연구 환경 제공에 기여하였으며, 핵심연구정보 자원에 대한 해킹으로 유발될 수 있는 막대한 경제적 손실을 최소화하고 안정성을 확보하여 국가 경쟁력 향상에 기여할 것으로 기대됨Ⅲ. The Contents and Results of Operation of this Research To protect core research information resources of national science and technology field, S&T-SEC have actively performed periodical security activities with 24-hour real-time situation monitoring utilizing the information security infrastructure, such as situation monitoring system, research on information security technologies appropriated for science & technology, and sharing of information security technologies. Through this operation of our research, we are contributing to minimize the damage of cyber emergency and to prevent spread of intrusion threats in the nationally critical situation as 「3.20 infection of computer systems of broadcasters and financial institutions」. Also, we are improving technical skill of "S&T-SEC" by continually promoting the development of detecting pattern for new harmful traffic and the performance improvement of security monitoring system

    Science and Technology Information Security

    No full text
    funder : 교육과학기술부agency : 한국과학기술정보연구원agency : Korea Institute of Science and Technology InformationⅠ. 연구목표 및 내용 본 연구는 공공 목적의 연구로서 첨예화 • 지능화되는 사이버 침해위협으로 부터 국가 과학기술분야의 핵심 연구정보자원을 보호하고자하는 목표를 달성하 기 위하여, 정보보호 대상기관의 침해사고 피해를 최소화하고 사전예방 능력 을 강화하는 전주기적 보호 활동을 수행하였다. 본 연구에서 수행한 연구 내용은 아래와 같다. ○ 과학기술 정보보호 기반 구축 및 활용 - 24시간 365일 “Non-Stop” 체제구축을 통한 상황관제・분석 및 침해공격 대응지원 ○ 안정적 과학기술 정보보호 기술연구・적용 - 과학기술 분야 정보보호 기반 안정화를 위한 침해공격시도 자동화 탐지 유형 기술연구 ○ 정보보호 기술정보 공유 및 서비스 활성화 - 웹 기반 사용자 애로지원 및 정보보호 기술 공유 활성화를 통한 수혜 기관 정보보호 역량 강화Ⅰ. The Goal and Contents of this Research The goal of this research is to protect core research information resources of national science and technology field from cyber intrusion threats such as worms, viruses and hacking. To achieve this goal, we performed periodical security activities for intrusion incident prevention and damage minimization of the organizations by operating "Science and Technology Information Security Center". The contents of this research are as follows. ○ Utilization of S&T-SEC infrastructure - Establishment of 24 hour and 365 days "Non-Stop" system for monitoring, analysis and response support against intrusion threats ○ Research and application on technologies for stable S&T-SEC - Research on technologies of automatic detection patterns for stabilization of S&T-SEC infrastructure ○ Activation of system for S&T-SEC collaboration and service - Web-based user support and Reinforcement of information security of S&T-SEC organizations through activation of sharing technologies for information security

    Science and Technology Information Security

    No full text
    funder : 미래창조과학부funder : KAagency : 한국과학기술정보연구원agency : Korea Institute of Science and Technology Information○ 본 연구사업은 국가 과학기술분야 핵심 연구정보자원을 웜・바이러스 및 해킹 등의 사이버 침해위협으로부터 보호하여 안전한 연구 환경을 조성하기 위하여 추진되었음 ○ 과학기술사이버안전센터의 전주기적 보호활동을 통한 대상기관 침해사고 피해 최소화 및 사전 예방을 위하여 침해위협관리시스템 및 종합정보분석시스템 등 정보보호 기반을 활용하여 24시간 실시간 상황관제 활동, 과학기술분야 맞춤형 정보보호 기술에 대한 지속적 연구 및 정보보호 기술공유와 정보보호 커뮤니티 활동을 적극적으로 수행하였음 ○ 과학기술분야에 적합한 정보보호 활동을 수행하기 위하여 신규 침해공격시도를 탐지하기 위한 네트워크 분석 및 탐지패턴 개발, 상황관제시스템의 성능개선 등을 지속적으로 추진하여 과학기술사이버안전센터의 기술력을 향상시켰음 ○ 연구사업 수행결과는 과학기술 분야 정보보호를 위한 일원화된 체계 구축을 통한 관제 체제의 효율성 향상 및 중요 연구정보자원 이용자에 대한 안전한 연구 환경 제공에 기여하였으며, 핵심연구정보 자원에 대한 해킹으로 유발될 수 있는 막대한 경제적 손실을 최소화하고 안정성을 확보하여 국가 경쟁력 향상에 기여할 것으로 기대됨Ⅲ. The Contents and Results of Operation of this Research To protect core research information resources of national science and technology field, S&T-SEC have actively performed periodical security activities with 24-hour real-time situation monitoring utilizing the information security infrastructure, such as situation monitoring system, research on information security technologies appropriated for science & technology, and sharing of information security technologies. Through this operation of our research, we are contributing to minimize the damage of cyber emergency and to prevent spread of intrusion threats in the nationally critical situation as 「3.20 infection of computer systems of broadcasters and financial institutions」. Also, we are improving technical skill of "S&T-SEC" by continually promoting the development of detecting pattern for new harmful traffic and the performance improvement of security monitoring system
    corecore