Now 190 visitors
Today:62 Yesterday:376
Total: 734
413S 88P 97R
2026-04-06, Week 15 |
| Member Login |
| Welcome Message |
| Statistics & History |
| Committee |
| TACT Journal Homepage |
| Call for Paper |
| Paper Submission |
| Find My Paper |
| Author Homepage |
| Paper Procedure |
| FAQ |
| Registration & Invoice |
| Paper Archives |
| Outstanding Papers |
| Author Homepage |
| - Paper Procedure |
| - Journal Procedure |
| - Presentation Tips |
|
| Program & Proceedings |
| Program with Papers |
| Plenary Session |
| Tutorial Session |
|
| Presentation Platform |
| Hotel & Travel Info |
| About Korea |
| Accommodation |
| Transportation |
| VISA |
| Other Infomation |
|
| Photo Gallery |
| Scheduler Login |
| Seminar |
| Archives Login |
|
| Sponsors |

|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Save Q&A |
|
* Edit or answer any Q&A by selecting Q&A number Hyper Link below + Write button (Save) |
ICACT20220059 Question.1 Questioner: yongj@gsic.titech.ac.jp 2022-02-15 ¿ÀÈÄ 6:06:38 |
ICACT20220059 Answer.1 Answer by Auhor 20180922@sungshin.ac.kr 2022-02-15 ¿ÀÈÄ 6:06:38
Chrome Click!! |
| At the initial stage of key exchange in the proposed method, how the end clients can mitigate Man-In-The-Middle attacks? |
Thank you for the question.
The experimental environment and configuration of this paper do not specifically define the step of exchanging keys for AES or TenSEAL encryption. Therefore, key exchange proceeds in a normal way.
Accordingly, we will answer the Man-In-The-Middle Attack separately. In the case of homomorphic encryption proposed in this paper, unlike other encryption methods, even if operations such as anomaly detection exist in the middle, they can be maintained undecoded at any point in the middle. Therefore, it is stronger against Man-In-The-Middle attacks than other methods.
I hope I have answered your questions. |
ICACT20220059 Question.2 Questioner: tomayoon@ieee.org 2022-02-15 ¿ÀÈÄ 6:54:26 |
ICACT20220059 Answer.2 Answer by Auhor 20180922@sungshin.ac.kr 2022-02-15 ¿ÀÈÄ 6:54:26
Chrome Click!! |
| First of all, thank you for the good research paper and presentation contents. I would like to know more about the research environment used in this study, and also in detail about the equipment & operating systems, development languages and software libraries you used. |
Thank you for the question.
Intel(R) Core(TM) i7-8550U CPU and 16.0GB RAM of Windows 10 environment were used, and experiments were conducted in python language in PYCHARM development environment. We also used TenSEAL homomorphic encryption (https://github.com/OpenMined/TenSEAL) and Crypto library. |
ICACT20220059 Question.3 Questioner: tomayoon@ieee.org 2022-02-15 ¿ÀÈÄ 9:50:30 |
ICACT20220059 Answer.3 Answer by Auhor 20180922@sungshin.ac.kr 2022-02-15 ¿ÀÈÄ 9:50:30
Chrome Click!! |
| Will you tell us what is the major achievement of this paper, and also what is further study issue from this? Thanks in advance!! |
The main achievement of this paper is that it showed an experimental environment in which an homomorphic encryption method, which is not currently used due to speed problems in the communication environment, can be used. The homomorphic encryption method has the advantage of being safer than other encryption methods because it is possible to operate on ciphertexts without decryption.
As a follow-up study, it will be possible to learn the results of this study and propose a model that automatically proceeds with decision-making when transmitting data.
I hope I have answered your questions. |
ICACT20220059 Question.4 Questioner: vasaka.vis@mahidol.ac.th 2022-02-16 ¿ÀÀü 12:10:20 |
ICACT20220059 Answer.4 Answer by Auhor 20180922@sungshin.ac.kr 2022-02-16 ¿ÀÀü 12:10:20
Chrome Click!! |
| Thank you for your presentation :)
I have a few questions about this paper.
(1) The paper title mentioned about "End-to-End cryptographic communication", but why intermediate nodes in your paper have to do the traffic inspection?
Please kindly explain this. I don't get what kind of problem you are trying to solve.
(2) In your conclusion on Slide No. 16, you mentioned about the privacy protection.
How can we achieve the privacy protection if the intermediate nodes have to decrypt the ciphertext in the AES case?
It is not surprising to see the linear increase of AES transmission time in Slide 13 when you increased to 50 intermediate nodes, cause each of them must do the decryption.
Thank you.
|
Thank you for the good question.
(1) In the experiment of this paper, it is assumed that any operation, such as traffic inspection, can be performed at the intermediate node. So it's not really a process of inspecting traffic, it just shows that this can happen. This paper assumes this environment, which is not exactly the same as the actual network communication environment. However, we can prove that it is not impossible to utilize homomorphic encryption in end-to-end cryptographic communication.
(2) The purpose of this paper is to experimentally show the environment in which homomorphic encryption can be used, and AES is the object of comparison. Therefore, I would appreciate it if you understand that this paper focuses on homomorphic encryption. Accordingly, as you asked, AES cannot fully guarantee privacy.
I hope I have answered your questions. |
ICACT20220059 Question.5 Questioner: namacabale@gmail.com 2022-02-16 ¿ÀÈÄ 5:42:51 |
ICACT20220059 Answer.5 Answer by Auhor 20180922@sungshin.ac.kr 2022-02-16 ¿ÀÈÄ 5:42:51
Chrome Click!! |
| Dear Author, you have a very good research. Is there an existing technology almost similar to your proposal that has been deployed in real world environment? What does it lack that your work specifically addressed? Thank you and stay safe.
|
Thank you for asking a good question about our research.
Based on the research conducted before writing this paper, it seems that there are few systems that carry out encryption communication using homomorphic encryption methods in the real world environment. Therefore, compared to the current general communication environment, 1) In a real world environment, the same operation as traffic inspection is not performed every hop. However, in this paper, it is assumed that the operation proceeds at all hops. 2) Communication noise exists in the actual communication environment, but noise is not assumed in the environment of this study. In addition, there are several hops, but they do not express all the characteristics of the actual communication environment.
I hope I have answered your questions. Thank you. :) |
| |