[go: up one dir, main page]

Skip to main content

Idology and Its Applications in Public Security and Network Security

  • Conference paper
  • First Online:
Intelligence and Security Informatics (PAISI 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10241))

Included in the following conference series:

  • 782 Accesses

Abstract

Fraud (swindling money, property, or authority by fictionizing, counterfeiting, forging, or imitating things, or by feigning persons privately) forms its threats against public security and network security. Anti-fraud is essentially the identification of a person or thing. In this paper, the authors first propose the concept of idology - a systematic and scientific study of identifications of persons and things, and give the definitions of a symmetric identity and an asymmetric identity. Discuss the converting symmetric identities (e.g., fingerprints) to asymmetric identities. Make a comparison between a symmetric identity and an asymmetric identity, and emphasize that symmetric identities cannot guard against inside jobs. Compare asymmetric RFIDs with BFIDs, and point out that a BFID is lightweight, economical, convenient, and environmentalistic, and more suitable for the anti-counterfeit and source tracing of consumable merchandise such as food, drugs, and cosmetics. The authors design the structure of a united verification platform for BFIDs and the composition of an identification system, and discuss the wide applications of BFIDs in public security and network security - antiterrorism and dynamic passwords for example.

This work is supported by MOST with Project 2007CB311100 and 2009AA01Z441.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Schuman, M.: Why Alibaba’s Massive Counterfeit Problem Will Never be Solved. Forbes, 23 November 2015

    Google Scholar 

  2. Levy, A.: Amazon’s Chinese Counterfeit Problem is Getting Worse. CNBC, 8 July 2016

    Google Scholar 

  3. Walsh, D.: Fake Diplomas, Real Cash: Pakistani Company Axact Reaps Millions. The New York Times, 17 May 2015

    Google Scholar 

  4. Vedelago, C., Houston, C.: Australia Flooded with Fake $50 Notes So Good They Fool Banks. Sydney Morning Herald, 28 February 2016

    Google Scholar 

  5. Mäntysaari, P.: The Law of Corporate Finance: General Principles and EU Law. Volume III: Funding, Exit, Takeovers. Springer, Heidelberg (2010)

    Book  Google Scholar 

  6. Horowitz, M.: Router security - subnets and IP addresses, 3 June 2015. http://routersecurity.org/ipaddresses.php

  7. Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Prentice-Hall, New Jersey (2010)

    Google Scholar 

  8. McDowell, M.: Avoiding social engineering and phishing attacks. US Computer Emergency Readiness Team, 22 October 2009. https://www.us-cert.gov/ncas/tips/ST04–014. Accessed 06 Feb 2013

  9. Bicknell, D.E., Laporte, G.M.: Forged and counterfeit documents. In: Wiley Encyclopedia of Forensic Science. Wiley, September 2009

    Google Scholar 

  10. Lichter, S.: Federal and state wiretap act regulation of keyloggers in the workplace. Harvard J. Law Technol. (2012)

    Google Scholar 

  11. Editors of the American Heritage Dictionaries: American Heritage Dictionary of the English Language, 5th edn. Houghton Mifflin Harcourt Publishing, November 2011

    Google Scholar 

  12. Editors of the American Heritage Dictionaries: American Heritage Roget’s Thesaurus. Houghton Mifflin Harcourt Publishing, July 2013

    Google Scholar 

  13. Yu, H., Li, N.: The Around Five Millenniums of China (in Chinese). Huawen Press, Beijing (2009)

    Google Scholar 

  14. Oracle: Attestation of Identity Information, May 2006. http://www.economist.com

  15. Paton, W.R. (Translator): Polybius: The Histories, vol. III, Books 5–8 (Loeb Classical Library No. 138). Harvard University Press, January 1923

    Google Scholar 

  16. Ran, Q.: The Chinese History Illustrated by Pictures (in Chinese). Higher Education Press, Beijing (2011)

    Google Scholar 

  17. Meggs, P.B.: A History of Graphic Design, 3rd edn. Wiley, New York (1998)

    Google Scholar 

  18. Richardson, G.: Brand names before the industrial revolution (NBER Working Paper No. 13930). National Bureau of Economic Research, April 2008

    Google Scholar 

  19. McGrew, S.P.: Holographic Technology for Anti-counterfeit Security: Present and Future. Holo-pack & Holo-print Asia, Singapore (1996)

    Google Scholar 

  20. Yang, C.: Investigation into the shady deal in anti-counterfeit industry (in Chinese). Bus. Circles 4, 48–50 (2002)

    Google Scholar 

  21. Denso Adc: QR Code Essentials, 31 March 2011. www.denso-adc.com/pdf/qrcode

  22. Jain, A., Hong, L., Pankanti, S.: Biometric identification. Commun. ACM 43(2), 91–98 (2000)

    Article  Google Scholar 

  23. Olsen, R.D.: The chemical composition of palmar sweat. Fingerprint Ident. Mag. 53(10), 3–7, 14–16, 23 (1972)

    Google Scholar 

  24. Hueske, E.: Firearms and Fingerprints (Essentials of Forensic Science Set, 7-Volumes). Infobase Publishing, New York (2008)

    Google Scholar 

  25. Schneier, B.: Fake anti-counterfeiting holograms, 13 February 2007. https://www.schneier.com/blog/archives/2007/02/fake_anticounte.html

  26. Su, S., Li, N., Lü, S.: Drug anti-forgery and tracing system based on lightweight asymmetric identities. In: Chau, M., Wang, G.Alan, Chen, H. (eds.) PAISI 2015. LNCS, vol. 9074, pp. 82–90. Springer, Cham (2015). doi:10.1007/978-3-319-18455-5_6

    Chapter  Google Scholar 

  27. Walton, C.A.: Portable radio frequency emitting identifier. U.S. Patent 4384288, 17 May 1983

    Google Scholar 

  28. Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski, B.S., Koç, ç, Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003). doi:10.1007/3-540-36400-5_33

    Chapter  Google Scholar 

  29. Stajano, F.: Security in pervasive computing. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 6–8. Springer, Heidelberg (2004). doi:10.1007/978-3-540-39881-3_3

    Chapter  Google Scholar 

  30. Hu, X.: An innovation the same sharp as a sword is created through the ten years (in Chinese). Inf. Securi. Commun. Priv. 6, 27–29 (2012)

    Google Scholar 

  31. Zou, W., Liu, S.: A Staffer of CSRC Who Was Involved the Inside Dealing and the Forging of Official Documents and Stamps Is Required to Aid in the Investigation (in Chinese). Beijing Youth Daily, 26 August 2015

    Google Scholar 

  32. ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  33. Blake, I.F., Seroussi, G., Smart, N.P.: Elliptic Curves in Cryptography. Cambridge University Press, Cambridge, UK (1999)

    Book  MATH  Google Scholar 

  34. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  35. Su, S., Lü, S.: A public key cryptosystem based on three new provable problems. Theor. Comput. Sci. 426–427, 91–117 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  36. Su, S., Lü, S., Fan, X.: Asymptotic granularity reduction and its application. Theor. Comput. Sci. 412(39), 5374–5386 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  37. Davis, M.: The Undecidable: Basic Papers on Undecidable Propositions, Unsolvable Problems and Computable Functions. Dover Publications, Mineola (2004)

    MATH  Google Scholar 

  38. Sipser, M.: Introduction to the Theory of Computation. PWS Publishing, Boston (1997)

    MATH  Google Scholar 

  39. Menezes, A.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Boston (1993)

    Book  MATH  Google Scholar 

  40. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1996)

    MATH  Google Scholar 

  41. Su, S., Xie, T., Lü, S.: A provably secure non-iterative hash function resisting birthday attack. Theor. Comput. Sci. 654, 128–142 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  42. Su, S., Lü, S.: REESSE1+ • Reward • Proof by experiment • A new approach to proof of P ! = NP. Cornell University Library (2009). http://arxiv.org/pdf/0908.0482. Accessed 2014

  43. Yang, A.: Math 25: introduction to number theory (Class 20 Notes). Department of Mathematics, Dartmouth College, November 2011. http://www.math.dartmouth.edu/~m25f11/notes/class20.pdf

  44. Cohen, H.: A Course in Computational Algebraic Number Theory. Springer (2000)

    Google Scholar 

  45. Chaum, D., Heijst, E., Pfitzmann, B.: Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 470–484. Springer, Heidelberg (1992). doi:10.1007/3-540-46766-1_38

    Google Scholar 

  46. Menezes, A., Oorschot, P.V., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, London, UK (2001)

    MATH  Google Scholar 

  47. Su, S., Cai, Y., Shen, C.: The banknote anti-forgery system based on digital signature algorithms. In: Yang, C.C., et al. (eds.) ISI 2008. LNCS, vol. 5075, pp. 44–49. Springer, Heidelberg (2008). doi:10.1007/978-3-540-69304-8_5

    Chapter  Google Scholar 

  48. Dai, Y., Su, S.: A diploma anti-forgery system based on lightweight digital signatures. In: CIS2014, IEEE, November 2014

    Google Scholar 

  49. Izadi, E.: (Under Paris Terror Attack) There’s a Booming Black Market for Fake Syrian Passports. Washington Post, 21 November 2015

    Google Scholar 

  50. Deering, S., Hinden, R.: Internet Protocol Version 6 (IPv6) Specification (RFC 2460). The Internet Society, December 1998

    Google Scholar 

  51. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgment

The authors would like to thank the Acad. Jiren Cai, Acad. Zhongyi Zhou, Acad. Changxiang Shen, Acad. Zhengyao Wei, Acad. Binxing Fang, Acad. Guangnan Ni, Acad. Andrew C. Yao, Acad. Jinpeng Huai, Acad. Wen Gao, Prof. Jie Wang, Rese. Hanliang Xu, Rese. Dengguo Feng, Rese. Dali Liu, Rese. Qiquan Guo, Rese. Rui Yu, Prof. Zhiying Wang, Prof. Ron Rivest, Prof. Moti Yung, Prof. Dingzhu Du, Acad. Xiangke Liao, Acad. Wenhua Ding, Prof. Huaimin Wang, Prof. Jianfeng Ma, Prof. Heyan Huang, Prof. Zhong Chen, Prof. Jiwu Jing, Prof. Gongxuan Zhang, Prof. Yixian Yang, Prof. Maozhi Xu, Prof. Bing Chen, Prof. Xuejia Lai, Prof. Yongfei Han, Prof. Yupu Hu, Prof. Ping Luo, Acad. Wei Li, Acad. Xicheng Lu, Prof. Dingyi Pei, Prof. Huanguo Zhang, Prof. Mulan Liu, Prof. Bogang Lin, Prof. Renji Tao, Prof. Quanyuan Wu, and Prof. Zhichang Qi for their important suggestions, corrections, and helps.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shenghui Su .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Su, S., Zheng, J., Lü, S., Huang, Z., Li, Z., Tang, Z. (2017). Idology and Its Applications in Public Security and Network Security. In: Wang, G., Chau, M., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2017. Lecture Notes in Computer Science(), vol 10241. Springer, Cham. https://doi.org/10.1007/978-3-319-57463-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-57463-9_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-57462-2

  • Online ISBN: 978-3-319-57463-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics