Hyunrok Lee

Learn More
This manuscript has been published without reviewing and editing as received from the authors: posting the manuscript to SCIS 2006 does not prevent future submissions to any journals or conferences with proceedings. Abstract— In this paper, we present a synchronization-based communication protocol for RFID devices. We focus on the EPCGlobal Class-1 Gen-2(More)
— Radio frequency identification (RFID) is the latest technology to play an important role for object identification as a ubiquitous infrastructure. However, current low-cost RFID tags are highly resource-constrained and cannot support its long-term security, so they have potential risks and may violate privacy for their bearers. To remove security(More)
Lee et al. [4] proposed two new authenticated multiple key exchange protocols based on Elliptic Curve Cryptography (ECC) and bilinear pairings. In this paper, we show an impersonation attack on their pairing-based authenticated key exchange protocol. We demonstrate that any attacker can impersonate an entity to share multiple session keys with another(More)
Keywords: On-line/off-line Threshold signatures Double-trapdoor Chameleon hashing Key exposure problem a b s t r a c t The ''hash–sign–switch " paradigm was firstly proposed by Shamir and Tauman with the aim to design an efficient on-line/off-line signature scheme. Nonetheless, all existing on-line/off-line signature schemes based on this paradigm suffer(More)
Group key management presents a fundamental challenge in secure dynamic group communications. In this paper, we propose an efficient group authenticated key agreement protocol (EGAKA), which is designed to be fully distributed and fault-tolerant, provides efficient dynamic group membership management, mutual authentication among group members and is secure(More)
This manuscript has been published without reviewing and editing as received from the authors: posting the manuscript to SCIS 2007 does not prevent future submissions to any journals or conferences with proceedings. Abstract— RFID(Radio Frequency Identification) is now being used in everything for economic feasibility and convenience. In contrast, RFID tags(More)
— The services on the Internet were previously focused on the server-oriented system, but recently changed into a kind of distributed computing, peer-to-peer (simply P2P) systems which can be applied to instant messaging, collaborate computing, etc. Like a real face-to-face trust relationship , each peer with complicated trust relationship faced complex(More)
In this whitepaper, we present a synchronization-based communication protocol for EPCGlobal Class-1 Gen-2 RFID devices. The Class-1 Gen-2 RFID tag supports only simple cryptographic primitives like Pseudo-random Number Generator (PRNG) and Cyclic Redundancy Code (CRC). Our protocol is secure in a sense that it prevents the cloned tags and malicious readers(More)
Receipt-freeness is an essential security property in electronic voting to prevent vote buying or coercion. In this paper, we propose a new approach to construct receipt-free electronic voting schemes. We first introduce the notion of linkable ring signature for designated verifiers which preserves all properties of a normal linkable ring signature while(More)
It is considered to be the most suitable solution for large scale elections to design an electronic voting scheme using blind signatures and anonymous channels. Based on this framework, Okamoto first proposed a receipt-free voting scheme [23] for large scale elections. However , in the following paper, Okamoto [24] proved that the scheme [23] is not(More)