摘要:
Provided are a key establishment method and system using commutative linear functions. In the method, a server defines a set of linear functions that use elements of a first finite field as coefficients and satisfy a commutative rule, selects a first linear function from the set, and selects a predetermined element from a second finite field. Next, the server selects a second linear function corresponding to each of nodes from the set, generates a predetermined combination function based on the first and second linear functions, generates a value of the second linear function using the selected element as a factor, and transmits the combination function and the value of the second linear function to a corresponding node. Each node receives the value of the second linear function from a server, exchanges the received values with the other nodes, computes a value using the exchanged value as a factor of the combination function, and establishes the computed value as a shared key between the nodes. Therefore, each node can perform key establishment with a small amount of computation and low memory consumption, while guaranteeing end-to-end security.
摘要:
Provided is a forensic index method by distributed processing, including: generating data to be divided by dividing data to be indexed according to predetermined division setting for distributed processing; allocating the generated data to be divided to a plurality of data processing units according to the predetermined division setting, extracting an index by filtering the allocated data to be divided in the plurality of data processing units, and generating divided index data including the extracted index; and generating an index database by merging the generated divided index data.
摘要:
There are provided an apparatus and a method for privacy protection in association rule mining among data mining technologies. An apparatus for privacy protection in association rule mining according to an embodiment of the present invention comprises: a fake transaction inserter that generates fake transactions of a predetermined number each having a predetermined length and inserts the fake transactions between a plurality of transactions comprised in an original data set to generate a first virtual data set; and a distortion transaction generator that generates a second virtual data set by converting data of the transaction of the first virtual data set with a predetermined probability.
摘要:
A method of user-authenticated quantum key distribution according to the present invention shares a position having the same basis without making public basis information using previously shared secret keys and authenticates a quantum channel by confirming whether there is the same measured outcome at that position, in order to secure unconditional security of BB84 quantum key distribution (QKD) protocols vulnerable to man-in-the-middle attack.
摘要:
A system and method for data analysis and digital forensics is provided. The system for data analysis and digital forensics may include: an online data forensic server for collecting and analyzing usage history information from an object device, which is subject to data collection, downloading and collecting data on the Internet based on the usage history information, requesting issuance of a timestamp token for the collected data, and receiving the issued timestamp token; a timestamp token issuing server for issuing the timestamp token for the collected data in response to the request for issuance of the timestamp token and proving the issued timestamp token to the online data forensic server; and a storage device for storing the collected data.
摘要:
A mobility technology for strengthening safety for an invasion of privacy caused by leakage of contact information is provided. A privacy protection system may include an acquisition attempt detecting unit to detect an external communication terminal that attempts to acquire contact information included in the profile, and an access controller to provide the detected external communication terminal with a right to use the contact information, and to determine whether the contact information is to be provided.
摘要:
Provided are methods of storing and searching for data in encrypted form. The method of storing data in encrypted form includes: encrypting desired data from among data stored in a database; dividing an entire region of the stored data into a plurality of bucket regions and allocating an index to each of the bucket regions; identifying order information in a bucket region to which the encrypted data belongs; and storing the encrypted data, index information of the bucket region to which the encrypted data belongs, and the identified order information in an external server. When a database containing important data of at least one user is stored in an external server using the above storing method, the security and efficiency of the database can be increased.
摘要:
An order-preserving encryption apparatus includes an initializer for setting a total space of a ciphertext with respect to a total space of a plaintext by considering security of the ciphertext, and setting a secret key for encryption and a pseudo-random number generator for generation of a pivot. Further, the order-preserving encryption apparatus includes a pivot generator for applying the secret key to the established pseudo-random number generator to generate a pivot for the plaintext to be encrypted. Further, the order-preserving encryption apparatus includes a ciphertext generator for generating information about size of a bit constituting the ciphertext by comparing the generated pivot and the plaintext; and a plaintext adjusting unit for adjusting a magnitude of the total plaintext space and a magnitude of the plaintext according to the ciphertext.
摘要:
A digital forensic apparatus for analyzing user activities includes: a collection unit for collecting analysis information related to user activities from a device as an investigation target for analyzing the user activities; and an analysis unit for analyzing the analysis information collected by the collection unit to determine activity information of a user from each type of the analysis information, and for causing the activity information to be arranged and displayed in temporal order.
摘要:
A system and method for data analysis and digital forensics is provided. The system for data analysis and digital forensics may include: an online data forensic server for collecting and analyzing usage history information from an object device, which is subject to data collection, downloading and collecting data on the Internet based on the usage history information, requesting issuance of a timestamp token for the collected data, and receiving the issued timestamp token; a timestamp token issuing server for issuing the timestamp token for the collected data in response to the request for issuance of the timestamp token and proving the issued timestamp token to the online data forensic server; and a storage device for storing the collected data.