본문 바로가기 주메뉴 바로가기
검색 검색영역닫기 검색 검색영역닫기 ENGLISH 메뉴 전체보기 메뉴 전체보기

논문

4

An Existential Unforgeable Signature Scheme Based on Multivariate Quadratic Equations

산업수학전략연구부 | Kyung-Ah Shim*, Cheol-Min Park, Namhun Koo | International Conference on the Theory and Application of Cryptology and Information Security(ASIACRYPT 2017) 10624 (2017)

A multivariate quadratic public-key cryptography (MQ-PKC) is one of the most promising alternatives for classical PKC after the eventual coming of a quantum computer. We propose a new MQ-signature scheme, ELSA, based on a hidden layer of quadratic equations which is an important role in dramatically reducing the secret key size and computational complexity in signing. We prove existential unforgeability of our scheme against an adaptive chosen-message attack under the hardness of the MQ-problem induced by a public key of ELSA with a specific parameter set in the random oracle model. We analyze the security of ELSA against known attacks and derive a concrete parameter based on the security analysis. Performance of ELSA on a recent Intel processor is the fastest among state-of-the-art signature schemes including classical ones and Post-Quantum ones. It takes 6.3   μ s and 13.39   μ s for signing and verification, respectively. Compared to Rainbow, the secret size of the new scheme has reduced by a factor of 88% maintaining the same public key size.

자세히보기

3

Structure Shapes Dynamics and Directionality in Diverse Brain Networks: Mathematical Principles and Empirical Confirmation in Three Species

산업수학전략연구부 | Joon-Young Moon, Junhyeok Kim, Tae-Wook Ko, Minkyung Kim, Yasser Iturria-Medina, Jee-Hyun Choi, Joseph Lee, George A. Mashour & UnCheol Lee | Scientific reports 7(46606) (2017)

Identifying how spatially distributed information becomes integrated in the brain is essential to understanding higher cognitive functions. Previous computational and empirical studies suggest a significant influence of brain network structure on brain network function. However, there have been few analytical approaches to explain the role of network structure in shaping regional activities and directionality patterns. In this study, analytical methods are applied to a coupled oscillator model implemented in inhomogeneous networks. We first derive a mathematical principle that explains the emergence of directionality from the underlying brain network structure. We then apply the analytical methods to the anatomical brain networks of human, macaque, and mouse, successfully predicting simulation and empirical electroencephalographic data. The results demonstrate that the global directionality patterns in resting state brain networks can be predicted solely by their unique network structures. This study forms a foundation for a more comprehensive understanding of how neural information is directed and integrated in complex brain networks.

자세히보기

2

Basic Principles and Practical Applications of the Cahn-Hilliard Equation

산업수학전략연구부 | Junseok Kim, Seunggyu Lee,Yongho Choi,Seok-Min Lee and Darae Jeong | Mathematical Problems in Engineering 2016(9532608) (2016)

The celebrated Cahn–Hilliard (CH) equation was proposed to model the process of phase separation in binary alloys by Cahn and Hilliard. Since then the equation has been extended to a variety of chemical, physical, biological, and other engineering fields such as spinodal decomposition, diblock copolymer, image inpainting, multiphase fluid flows, microstructures with elastic inhomogeneity, tumor growth simulation, and topology optimization. Therefore, it is important to understand the basic mechanism of the CH equation in each modeling type. In this paper, we review the applications of the CH equation and describe the basic mechanism of each modeling type with helpful references and computational simulation results.

자세히보기

1

A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks

산업수학전략연구부 | kyung-Ah Shim | IEEE Communications Surveys and Tutorials 18(1). 577-601 (2016)

Cryptographic primitives are fundamental building blocks for designing security protocols to achieve confidentiality,authentication, integrity and non-repudiation. It is not toomuch to say that the selection and integration of appropriate cryptographic primitives into the security protocols determines the largest part of the efficiency and energy consumption of the wireless sensor network (WSN). There are a number of surveys on security issues on WSNs, which, however, did not focus on public-key cryptographic primitives in WSNs. In this survey, we provide a deeper understanding of public-key cryptographic primitives in WSNs including identity-based cryptography and discuss their main directions and some open research issues that can be further pursued. We investigate state-of-the-art software implementation results We investigate state-of-the-art software implementation results of public-key cryptographic primitives in terms of execution time, energy consumption and resource occupation on constrained wireless devices choosing popular IEEE 802.15.4-compliant WSN hardware platforms, used in real-life deployments. This survey provides invaluable insights on public-key cryptographic primitives on WSN platforms, and solutions to find tradeoffs between ost, performance and security for designing security protocols in WSNs.

자세히보기

이 페이지에서 제공하는 정보에 대해 만족하십니까?

컨텐츠담당자     성과평가팀: 배자호   042- 717- 5762