• Publications
  • Influence
ID-Based Blind Signature and Ring Signature from Pairings
Recently the bilinear pairing such as Weil pairing or Tate pairing on elliptic curves and hyperelliptic curves have been found various applications in cryptography. Several identity-based (simplyExpand
  • 499
  • 36
Strong Proxy Signature and its Applications
Proxy signature is a signature scheme that an original signer delegates his/her signing capability to a proxy signer, and then the proxy signer creates a signature on behalf of the original signer.Expand
  • 321
  • 29
Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings
Blind signature and proxy signature are very important technologies in secure e-commerce. Identity-based (simply ID-based) public key cryptosystem can be a good alternative for certificate-basedExpand
  • 271
  • 26
Secure Key Issuing in ID-based Cryptography
ID-based cryptosystems have many advantages over PKI based cryptosystems in key distribution, but they also have an inherent drawback of key escrow problem, i.e. users' private keys are known to theExpand
  • 140
  • 19
Enhancing Security of EPCGlobal Gen-2 RFID against Traceability and Cloning
In this paper, we present a synchronization-based communication protocol for RFID devices. We focus on the EPCGlobal Class-1 Gen-2 RFID tag which supports only simple cryptographic primitives likeExpand
  • 252
  • 17
Secure Mobile Agent Using Strong Non-designated Proxy Signature
It is expected that mobile agent will be widely used for electronic commerce as an important key technology. If a mobile agent can sign a message in a remote server on behalf of a customer withoutExpand
  • 230
  • 15
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme
Cloned fake RFID tags and malicious RFID readers pose a major threat to RFID-based supply chain management system. Fake tags can be attached to counterfeit products and medicines. Malicious readersExpand
  • 67
  • 13
Mutual Authentication Protocol for Low-cost RFID
I am grateful to Prof. Adi Shamir of the Weizmann Institute in Israel for his precious comments and kind advice on our protocol during his visit to ICU during Asiacryt2004.
  • 175
  • 12
Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer
We investigate the receipt-freeness issue of electronic voting protocols. Receipt-freeness means that a voter neither obtains nor is able to construct a receipt proving the content of his vote.Expand
  • 149
  • 12
Hidden attribute-based signatures without anonymity revocation
  • J. Li, K. Kim
  • Mathematics, Computer Science
  • Inf. Sci.
  • 1 May 2010
We propose a new notion called hidden attribute-based signature, which is inspired by the recent developments in attribute-based cryptosystem. With this technique, users are able to sign messagesExpand
  • 142
  • 9