- 영문명
- A Polynomial-based Study on the Protection of Consumer Privacy
- 발행기관
- 한국IT서비스학회
- 저자명
- 박연희(Yanji Piao) 김민지(Minji Kim)
- 간행물 정보
- 『한국IT서비스학회지』한국IT서비스학회지 제19권 제1호, 145~158쪽, 전체 14쪽
- 주제분류
- 경제경영 > 경영학
- 파일형태
- 발행일자
- 2020.03.30

국문 초록
영문 초록
With the development and widespread application of online shopping, the number of online consumers has increased. With one click of a mouse, people can buy anything they want without going out and have it sent right to the doors. As consumers benefit from online shopping, people are becoming more concerned about protecting their privacy. In the group buying scenario described in our paper, online shopping was regarded as intra-group communication. To protect the sensitive information of consumers, the polynomial-based encryption key sharing method (Piao et al., 2013; Piao and Kim, 2018) can be applied to online shopping communication.
In this paper, we analyze security problems by using a polynomial-based scheme in the following ways : First, in Kamal’s attack, they said it does not provide perfect forward and backward secrecy when the members leave or join the group because the secret key can be broken in polynomial time. Second, for simultaneous equations, the leaving node will compute the new secret key if it can be confirmed that the updated new polynomial is recomputed. Third, using Newton s method, attackers can successively find better approximations to the roots of a function. Fourth, the Berlekamp Algorithm can factor polynomials over finite fields and solve the root of the polynomial. Fifth, for a brute-force attack, if the key size is small, brute force can be used to find the root of the polynomial, we need to make a key with appropriately large size to prevent brute force attacks. According to these analyses, we finally recommend the use of a relatively reasonable hash-based mechanism that solves all of the possible security problems and is the most suitable mechanism for our application. The study of adequate and suitable protective methods of consumer security will have academic significance and provide the practical implications.
목차
1. Introduction
2. Related Works
3. Security Analysis
4. Discussion and Result
5. Conclusions
References
해당간행물 수록 논문
참고문헌
최근 이용한 논문
교보eBook 첫 방문을 환영 합니다!
신규가입 혜택 지급이 완료 되었습니다.
바로 사용 가능한 교보e캐시 1,000원 (유효기간 7일)
지금 바로 교보eBook의 다양한 콘텐츠를 이용해 보세요!
