Now 188 visitors
Today:62 Yesterday:376
Total: 737 413S 88P 97R
2026-04-06, Week 15
Member Login
Welcome Message
Statistics & History
Committee
TACT Journal Homepage
Call for Paper
Paper Submission
Find My Paper
Author Homepage
Paper Procedure
FAQ
Registration & Invoice
Paper Archives
Outstanding Papers
Program & Proceedings
Presentation Platform
Hotel & Travel Info
Photo Gallery
Scheduler Login
Seminar
Archives Login
Sponsors




















IEEE/ICACT20220059 Question.1
Questioner: yongj@gsic.titech.ac.jp    2022-02-15 ¿ÀÈÄ 6:06:38
IEEE/ICACT20220059 Answer.1
Answer by Auhor 20180922@sungshin.ac.kr   2022-02-15 ¿ÀÈÄ 6:06:38
At the initial stage of key exchange in the proposed method, how the end clients can mitigate Man-In-The-Middle attacks? Thank you for the question. The experimental environment and configuration of this paper do not specifically define the step of exchanging keys for AES or TenSEAL encryption. Therefore, key exchange proceeds in a normal way. Accordingly, we will answer the Man-In-The-Middle Attack separately. In the case of homomorphic encryption proposed in this paper, unlike other encryption methods, even if operations such as anomaly detection exist in the middle, they can be maintained undecoded at any point in the middle. Therefore, it is stronger against Man-In-The-Middle attacks than other methods. I hope I have answered your questions.

Select Voice