Abstract
Fraud (swindling money, property, or authority by fictionizing, counterfeiting, forging, or imitating things, or by feigning persons privately) forms its threats against public security and network security. Anti-fraud is essentially the identification of a person or thing. In this paper, the authors first propose the concept of idology - a systematic and scientific study of identifications of persons and things, and give the definitions of a symmetric identity and an asymmetric identity. Discuss the converting symmetric identities (e.g., fingerprints) to asymmetric identities. Make a comparison between a symmetric identity and an asymmetric identity, and emphasize that symmetric identities cannot guard against inside jobs. Compare asymmetric RFIDs with BFIDs, and point out that a BFID is lightweight, economical, convenient, and environmentalistic, and more suitable for the anti-counterfeit and source tracing of consumable merchandise such as food, drugs, and cosmetics. The authors design the structure of a united verification platform for BFIDs and the composition of an identification system, and discuss the wide applications of BFIDs in public security and network security - antiterrorism and dynamic passwords for example.
This work is supported by MOST with Project 2007CB311100 and 2009AA01Z441.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Schuman, M.: Why Alibaba’s Massive Counterfeit Problem Will Never be Solved. Forbes, 23 November 2015
Levy, A.: Amazon’s Chinese Counterfeit Problem is Getting Worse. CNBC, 8 July 2016
Walsh, D.: Fake Diplomas, Real Cash: Pakistani Company Axact Reaps Millions. The New York Times, 17 May 2015
Vedelago, C., Houston, C.: Australia Flooded with Fake $50 Notes So Good They Fool Banks. Sydney Morning Herald, 28 February 2016
Mäntysaari, P.: The Law of Corporate Finance: General Principles and EU Law. Volume III: Funding, Exit, Takeovers. Springer, Heidelberg (2010)
Horowitz, M.: Router security - subnets and IP addresses, 3 June 2015. http://routersecurity.org/ipaddresses.php
Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Prentice-Hall, New Jersey (2010)
McDowell, M.: Avoiding social engineering and phishing attacks. US Computer Emergency Readiness Team, 22 October 2009. https://www.us-cert.gov/ncas/tips/ST04–014. Accessed 06 Feb 2013
Bicknell, D.E., Laporte, G.M.: Forged and counterfeit documents. In: Wiley Encyclopedia of Forensic Science. Wiley, September 2009
Lichter, S.: Federal and state wiretap act regulation of keyloggers in the workplace. Harvard J. Law Technol. (2012)
Editors of the American Heritage Dictionaries: American Heritage Dictionary of the English Language, 5th edn. Houghton Mifflin Harcourt Publishing, November 2011
Editors of the American Heritage Dictionaries: American Heritage Roget’s Thesaurus. Houghton Mifflin Harcourt Publishing, July 2013
Yu, H., Li, N.: The Around Five Millenniums of China (in Chinese). Huawen Press, Beijing (2009)
Oracle: Attestation of Identity Information, May 2006. http://www.economist.com
Paton, W.R. (Translator): Polybius: The Histories, vol. III, Books 5–8 (Loeb Classical Library No. 138). Harvard University Press, January 1923
Ran, Q.: The Chinese History Illustrated by Pictures (in Chinese). Higher Education Press, Beijing (2011)
Meggs, P.B.: A History of Graphic Design, 3rd edn. Wiley, New York (1998)
Richardson, G.: Brand names before the industrial revolution (NBER Working Paper No. 13930). National Bureau of Economic Research, April 2008
McGrew, S.P.: Holographic Technology for Anti-counterfeit Security: Present and Future. Holo-pack & Holo-print Asia, Singapore (1996)
Yang, C.: Investigation into the shady deal in anti-counterfeit industry (in Chinese). Bus. Circles 4, 48–50 (2002)
Denso Adc: QR Code Essentials, 31 March 2011. www.denso-adc.com/pdf/qrcode
Jain, A., Hong, L., Pankanti, S.: Biometric identification. Commun. ACM 43(2), 91–98 (2000)
Olsen, R.D.: The chemical composition of palmar sweat. Fingerprint Ident. Mag. 53(10), 3–7, 14–16, 23 (1972)
Hueske, E.: Firearms and Fingerprints (Essentials of Forensic Science Set, 7-Volumes). Infobase Publishing, New York (2008)
Schneier, B.: Fake anti-counterfeiting holograms, 13 February 2007. https://www.schneier.com/blog/archives/2007/02/fake_anticounte.html
Su, S., Li, N., Lü, S.: Drug anti-forgery and tracing system based on lightweight asymmetric identities. In: Chau, M., Wang, G.Alan, Chen, H. (eds.) PAISI 2015. LNCS, vol. 9074, pp. 82–90. Springer, Cham (2015). doi:10.1007/978-3-319-18455-5_6
Walton, C.A.: Portable radio frequency emitting identifier. U.S. Patent 4384288, 17 May 1983
Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski, B.S., Koç, ç, Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003). doi:10.1007/3-540-36400-5_33
Stajano, F.: Security in pervasive computing. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 6–8. Springer, Heidelberg (2004). doi:10.1007/978-3-540-39881-3_3
Hu, X.: An innovation the same sharp as a sword is created through the ten years (in Chinese). Inf. Securi. Commun. Priv. 6, 27–29 (2012)
Zou, W., Liu, S.: A Staffer of CSRC Who Was Involved the Inside Dealing and the Forging of Official Documents and Stamps Is Required to Aid in the Investigation (in Chinese). Beijing Youth Daily, 26 August 2015
ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)
Blake, I.F., Seroussi, G., Smart, N.P.: Elliptic Curves in Cryptography. Cambridge University Press, Cambridge, UK (1999)
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Su, S., Lü, S.: A public key cryptosystem based on three new provable problems. Theor. Comput. Sci. 426–427, 91–117 (2012)
Su, S., Lü, S., Fan, X.: Asymptotic granularity reduction and its application. Theor. Comput. Sci. 412(39), 5374–5386 (2011)
Davis, M.: The Undecidable: Basic Papers on Undecidable Propositions, Unsolvable Problems and Computable Functions. Dover Publications, Mineola (2004)
Sipser, M.: Introduction to the Theory of Computation. PWS Publishing, Boston (1997)
Menezes, A.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Boston (1993)
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1996)
Su, S., Xie, T., Lü, S.: A provably secure non-iterative hash function resisting birthday attack. Theor. Comput. Sci. 654, 128–142 (2016)
Su, S., Lü, S.: REESSE1+ • Reward • Proof by experiment • A new approach to proof of P ! = NP. Cornell University Library (2009). http://arxiv.org/pdf/0908.0482. Accessed 2014
Yang, A.: Math 25: introduction to number theory (Class 20 Notes). Department of Mathematics, Dartmouth College, November 2011. http://www.math.dartmouth.edu/~m25f11/notes/class20.pdf
Cohen, H.: A Course in Computational Algebraic Number Theory. Springer (2000)
Chaum, D., Heijst, E., Pfitzmann, B.: Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 470–484. Springer, Heidelberg (1992). doi:10.1007/3-540-46766-1_38
Menezes, A., Oorschot, P.V., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, London, UK (2001)
Su, S., Cai, Y., Shen, C.: The banknote anti-forgery system based on digital signature algorithms. In: Yang, C.C., et al. (eds.) ISI 2008. LNCS, vol. 5075, pp. 44–49. Springer, Heidelberg (2008). doi:10.1007/978-3-540-69304-8_5
Dai, Y., Su, S.: A diploma anti-forgery system based on lightweight digital signatures. In: CIS2014, IEEE, November 2014
Izadi, E.: (Under Paris Terror Attack) There’s a Booming Black Market for Fake Syrian Passports. Washington Post, 21 November 2015
Deering, S., Hinden, R.: Internet Protocol Version 6 (IPv6) Specification (RFC 2460). The Internet Society, December 1998
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)
Acknowledgment
The authors would like to thank the Acad. Jiren Cai, Acad. Zhongyi Zhou, Acad. Changxiang Shen, Acad. Zhengyao Wei, Acad. Binxing Fang, Acad. Guangnan Ni, Acad. Andrew C. Yao, Acad. Jinpeng Huai, Acad. Wen Gao, Prof. Jie Wang, Rese. Hanliang Xu, Rese. Dengguo Feng, Rese. Dali Liu, Rese. Qiquan Guo, Rese. Rui Yu, Prof. Zhiying Wang, Prof. Ron Rivest, Prof. Moti Yung, Prof. Dingzhu Du, Acad. Xiangke Liao, Acad. Wenhua Ding, Prof. Huaimin Wang, Prof. Jianfeng Ma, Prof. Heyan Huang, Prof. Zhong Chen, Prof. Jiwu Jing, Prof. Gongxuan Zhang, Prof. Yixian Yang, Prof. Maozhi Xu, Prof. Bing Chen, Prof. Xuejia Lai, Prof. Yongfei Han, Prof. Yupu Hu, Prof. Ping Luo, Acad. Wei Li, Acad. Xicheng Lu, Prof. Dingyi Pei, Prof. Huanguo Zhang, Prof. Mulan Liu, Prof. Bogang Lin, Prof. Renji Tao, Prof. Quanyuan Wu, and Prof. Zhichang Qi for their important suggestions, corrections, and helps.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Su, S., Zheng, J., Lü, S., Huang, Z., Li, Z., Tang, Z. (2017). Idology and Its Applications in Public Security and Network Security. In: Wang, G., Chau, M., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2017. Lecture Notes in Computer Science(), vol 10241. Springer, Cham. https://doi.org/10.1007/978-3-319-57463-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-57463-9_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57462-2
Online ISBN: 978-3-319-57463-9
eBook Packages: Computer ScienceComputer Science (R0)