Branding/Logomark Created with Sketch. minus Created with Sketch. arrow-point-to-down Created with Sketch. Citation Created with Sketch. Combined Shape Created with Sketch. Icon/Bookmark-empty Created with Sketch. Icon/Copy Created with Sketch. Icon/Collection Icon/Close Copy 7 Icon/List Created with Sketch.
Loading Scinapse...
Byoungcheon Lee
Information and Communications University
46Publications
8H-index
1,291Citations
Publications 46
Newest
Byoungcheon Lee8
Estimated H-index: 8
Ref 2 Source Cite this paper
Byoungcheon Lee8
Estimated H-index: 8
In ubiquitous computing environment it is common that a user owns and uses multiple computing devices, but managing cryptographic keys in those devices is a complicated matter. If certificate-based cryptography (PKI) is used such that each device has independent certificate, then user has to be involved in multiple certificate issuing processes with certification authorities (CA) and has to keep multiple private keys securely. If a single user certificate is copied and shared in multiple user de...
Ref 7 Download Pdf Cite this paper
Byoungcheon Lee8
Estimated H-index: 8
Secret signatures, proposed by Lee \textit{et al.} \cite{LCYY07,LLK09}, provide signature privacy and public provability at the same time. Using these schemes a signer can send his signature secretly to a designated receiver such that only the designated receiver can verify the signature. Moreover, if any argument occurs between them, the validity of the secret signature can be proven publicly either by the signer or the receiver. But in these schemes one of the drawback is that the signer has t...
Ref 7 Source Cite this paper
Divyan M. Konidala9
Estimated H-index: 9
(KAIST),
Made Harta Dwijaksara1
Estimated H-index: 1
(KAIST),
Kwangjo Kim8
Estimated H-index: 8
(KAIST)
... more
Credit/debit card payment transactions do not protect the privacy of the customer. Once the card is handed over to the merchant for payment processing, customers are "no longer in control" on how their card details and money are handled. This leads to card fraud, identity theft, and customer profiling. Therefore, for those customers who value their privacy and security of their payment transactions, this paper proposes a choice--an alternate mobile payment model called "Pre-Paid Mobile HTTPS-bas...
Ref 15Cited 10 Download Pdf Cite this paper
Divyan M. Konidala9
Estimated H-index: 9
(KAIST),
Daeyoung Kim6
Estimated H-index: 6
(KAIST),
Chan Yeob Yeun8
Estimated H-index: 8
(Khalifa University)
... more
The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. We can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection from malicious readers. There has also been much talk of a very popular RFID application: a refrigerator/bookshelf that can scan and list out the details of its items on its di...
Ref 4Cited 18 Download Pdf Cite this paper
Xiaofeng Chen9
Estimated H-index: 9
(Xidian University),
Qianhong Wu7
Estimated H-index: 7
(Wuhan University),
Fangguo Zhang7
Estimated H-index: 7
(Sun Yat-sen University)
... more
It is considered to be the most suitable solution for large scale elections to design an electronic voting scheme using blind signatures and anonymous channels. Based on this framework, Okamoto first proposed a receipt-free voting scheme [30] for large scale elections. However, in the following paper, Okamoto [31] proved that the scheme [30] was not receipt-free and presented two improved schemes. One scheme requires the help of the parameter registration committee and the other needs a stronger...
Ref 38Cited 19 Download Pdf Cite this paper
Byoungcheon Lee8
Estimated H-index: 8
Certificate-based cryptography and ID-based cryptography have been designed under different theoretical backgrounds and they have their own advantages and drawbacks, but there have been few works which try to provide them together in an efficient way. Chen et al. [4] considered a hybrid scheme of public key infrastructure (PKI) and ID-based encryption (IBE), and also discussed various trust relationship among multiple authorities, but they have not discussed more in-depth implementation issues o...
Ref 17Cited 7 Download Pdf Cite this paper
Divyan M. Konidala9
Estimated H-index: 9
,
Made Harta Dwijaksara1
Estimated H-index: 1
,
Kwangjo Kim8
Estimated H-index: 8
... more
Source
Byoungcheon Lee8
Estimated H-index: 8
,
Jin Li9
Estimated H-index: 9
(Illinois Institute of Technology),
Kwangjo Kim8
Estimated H-index: 8
(KAIST)
Secret signature, proposed by Lee et al. [11], is a new signature scheme which provides signature privacy and public provability together. Using the secret signature scheme a signer can send his signature secretly to a specific receiver such that only the designated receiver can verify the signature. If any argument occurs between them, the validity of the secret signature can be proven publicly either by the signer or the receiver. Thus it can be used as an important cryptographic primitive to ...
Ref 18Cited 2 Source Cite this paper
Byoungcheon Lee8
Estimated H-index: 8
,
Kim-Kwang Raymond Choo9
Estimated H-index: 9
(Australian Institute of Criminology),
Jeongmo Yang3
Estimated H-index: 3
... more
Digital signatures provide authentication and nonrepudiation in a public way in the sense that anyone can verify the validity of a digital signature using the corresponding public key. In this paper, we consider the issues of (1) signature privacy and (2) the corresponding public provability of signature. We propose a new digital signature variant, secret signature, which provides authentication and nonrepudiation to the designated receiver only. If required, the correctness of the secret signat...
Ref 35Cited 3 Download Pdf Cite this paper
12345