Branding/Logomark Created with Sketch. minus Created with Sketch. arrow-point-to-down Created with Sketch. Citation Created with Sketch. Combined Shape Created with Sketch. Icon/Copy Created with Sketch. 2AC24B92-E380-4A24-A7FB-E0AC4B6F468D Created with sketchtool. ADDA8D13-C2F5-4358-9B0E-1C359912CA41 Created with sketchtool.
Loading Scinapse...
Byoungcheon Lee
Information and Communications University
Citations
1264
H-index
16
Publications 44
Most Citations
Byoungcheon Lee16
Estimated H-index: 16
(Information and Communications University),
Heesun Kim (Information and Communications University), Kwangjo Kim21
Estimated H-index: 21
(Information and Communications University)
Proxy signature is a signature scheme that an original signer delegates his/her signing capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer. In this paper we show various attack scenarios against previous proxy signature schemes, which shows that proxy signature schemes should be designed very carefully. Based on these weaknesses, we provide...
Cited 254 Source
Byoungcheon Lee16
Estimated H-index: 16
(Information and Communications University),
Heesun Kim1
Estimated H-index: 1
(Electronics and Telecommunications Research Institute),
Kwangjo Kim21
Estimated H-index: 21
(Information and Communications University)
It is expected that mobile agent will be widely used for electronic commerce as an important key technology. If a mobile agent can sign a message in a remote server on behalf of a customer without exposingh is/her private key, it can be used not only to search for special products or services, but also to make a contract with a remote server. To construct mobile agents, [KBC00] used an RSA-based u...
Ref 15Cited 189 Download Pdf Cite this paper
Byoungcheon Lee16
Estimated H-index: 16
(Queensland University of Technology),
Kwangjo Kim21
Estimated H-index: 21
(Information and Communications University),
Colin Boyd25
Estimated H-index: 25
(Queensland University of Technology)
... (3 others)
ID-based cryptosystems have many advantages over PKI based cryptosystems in key distribution, but they also have an inherent drawback of key escrow problem, i.e. users' private keys are known to the key generation center (KGC). Therefore secure key issuing (SKI) is an important issue in ID-based cryptography. In multiple authority approach (Boneh & Franklin 2001, Chen et al. 2002), key generation ...
Byoungcheon Lee16
Estimated H-index: 16
(Information and Communications University),
Kwangjo Kim21
Estimated H-index: 21
(Information and Communications University)
We investigate the receipt-freeness issue of electronic voting protocols. Receipt-freeness means that a voter neither obtains nor is able to construct a receipt proving the content of his vote. [Hirt01] proposed a receipt-free voting scheme by introducing a third-party randomizer and by using divertible zero-knowledge proof of validity and designated-verifier re-encryption proof. This scheme satis...
Ref 26Cited 103 Download Pdf Cite this paper
Kwangjo Kim21
Estimated H-index: 21
(Information and Communications University),
Byoungcheon Lee16
Estimated H-index: 16
(Queensland University of Technology),
Ed Dawson16
Estimated H-index: 16
(Queensland University of Technology)
... (3 others)
It had been thought that it is difficult to provide receipt-freeness in mixnet-based electronic voting schemes. Any kind of user chosen randomness can be used to construct a receipt, since a user can prove to a buyer how he had encrypted the ballot. In this paper we propose a simple and efficient method to incorporate receipt-freeness in mixnet-based electronic voting schemes by using the well kno...
Ref 51Cited 99 Download Pdf Cite this paper
Byoungcheon Lee16
Estimated H-index: 16
(Information and Communications University),
Kwangjo Kim21
Estimated H-index: 21
(Information and Communications University)
Cited 71 Source
Joonsang Baek18
Estimated H-index: 18
(Information and Communications University),
Heesun Kim (Information and Communications University), Kwangjo Kim21
Estimated H-index: 21
(Information and Communications University)
... (1 others)
As an application for electronic commerce, a mobile agent is now used to search for special products or services and is executed for a specific job designated by a customer in the server's environment on behalf of a customer. On the way of performing its role, a mobile agent can be vulnerable to several cryptographic attacks. These attacks can be more serious when done by malicious servers. Among ...
Ref 9Cited 62 Source
Ed Dawson16
Estimated H-index: 16
(Queensland University of Technology),
Riza Aditya5
Estimated H-index: 5
(Queensland University of Technology),
Byoungcheon Lee16
Estimated H-index: 16
(Queensland University of Technology)
... (2 others)
All the currently existing homomorphic e-voting schemes are based on additive homomorphism. In this paper a new e-voting scheme based on multiplicative homomorphism is proposed. In the tallying phase, a decryption is performed to recover the product of the votes, instead of the sum of them (as in the additive homomorphic e-voting schemes). Then, the product is factorized to recover the votes. The ...
Ref 50Cited 46 Download Pdf Cite this paper
Kwangjo Kim21
Estimated H-index: 21
(Information and Communications University),
Byoungcheon Lee16
Estimated H-index: 16
(Information and Communications University),
Joongsoo Ma7
Estimated H-index: 7
(Information and Communications University)
In public auction, all bid values are published, but each bidder participates in auction protocol in anonymous way. Recently, Omote and Miyaji [OM01] proposed a new model of public auction in which any bidder can participate in plural rounds of auction with one-time registration. They have introduced two managers, registration manager (RM) and auction manager (AM), and have used efficient tools su...
Ref 10Cited 33 Download Pdf Cite this paper
Byoungcheon Lee16
Estimated H-index: 16
(Queensland University of Technology),
Xiaofeng Chen22
Estimated H-index: 22
(Information and Communications University),
Kwangjo Kim21
Estimated H-index: 21
(Information and Communications University)
Bid-rigging is a dangerous attack in electronic auction. Abe and Suzuki firstly introduced the idea of receipt-free to prevent this at- tack. In this paper we point out that Abe and Suzuki's scheme only provides receipt-freeness for losing bidders. We argue that it is more important to provide receipt-freeness for winners and propose a new receipt-free sealed bid auction scheme using the homomorph...
Ref 37Cited 32 Download Pdf Cite this paper
12345