Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yong-Sork Her is active.

Publication


Featured researches published by Yong-Sork Her.


international conference on information technology and applications | 2005

Some remarks on security of receipt-free e-auction

Yong-Sork Her; Kenji Imamoto; Kouichi Sakurai

Recently, a receipt-free scheme is rising for a secure e-auction. The goal of a receipt-free scheme in an e-auction is to prevent a bid-rigging. If the bid-rigging happens in the e-auction, the winner can get the bidding item with an unreasonably low price. The first receipt-free scheme for the e-auction was proposed by Abe and Suzuki. Chen, Lee and Kim also proposed the extended receipt-free scheme. In this paper, we point out that the proposed receipt-free schemes do not prevent perfectly the bid-rigging attack. Moreover, we indicate that a bid-collision is a possible cause of an e-auction. In the strict sense, the bid-collusion is different from the bid-rigging. In this paper, we do not present the scheme which can prevent the bid-collision attack. We compare the bid-rigging attack with the bid-collusion attack, and analyze the security of the existed receipt-free schemes in a viewpoint of the bid-rigging attack and the bid-collusion attack.


international symposium on information theory | 2003

On the security of yet another reduced version of 3-pass HAVAL

Yong-Sork Her; Kouichi Sakurai

In this paper, we find collisions for the first and third passes of 3-pass HAVAL (following HAVAL) which is not using the second pass and not successive two passes. To find a collision in HAVAL, we introduce the scheme of S.W.Park et al.


annual conference on computers | 2003

Attacks for Finding Collision in Reduced Versions of 3-PASS and 4-PASS HAVAL

Yong-Sork Her; 容碩 許; Kouichi Sakurai; 幸一 櫻井; Shin-Hwan Kim; ヨウソク キョ; コウイチ サクライ


SLRC Papers Database | 2004

Receipt-free Sealed-bid Auction Based on Mix-net and Pseudo ID

Yong-Sork Her; Kenji Imamoto; Kouichi Sakurai; 容碩 許; 健二 今本; 幸一 櫻井


workshop on information security applications | 2005

E-voting System with Ballot-Cancellation Based on Double-Encryption

Yong-Sork Her; 容碩 許; Kenji Imamoto; 健二 今本; Kouichi Sakurai; 幸一 櫻井


Research reports on information science and electrical engineering of Kyushu University | 2005

Analysis and Comparison of Cryptographic Techniques in E-voting and E-auction

Yong-Sork Her; Kenji Imamoto; Kouichi Sakurai


Research reports on information science and electrical engineering of Kyushu University | 2003

Analysis and Design of SHA-V and RIPEMD-V with Variable Output-Length

Yong-Sork Her; 容碩 許; Koichi Sakurai; 幸一 櫻井


Proc.of the 2002 Symposium on Cryptography and Information Security | 2002

The Analysis of Current State and Future on the E-voting System

Yong-Sork Her; 容碩 許; Kouichi Sakurai; 幸一 櫻井


Proc. of International Workshop on Information & Electrical Engineering | 2002

Design and Analysis Cryptographic Hash Function for The Next Generation

Yong-Sork Her; 容碩 許; Kouichi Sakurai; 幸一 櫻井; ヨウソク キョ


Archive | 2006

1-out-of-L Electronic Voting with Ballot-Cancellation Property Using Double Encryption *

Yong-Sork Her; Kenji Imamoto; Kouichi Sakurai

Collaboration


Dive into the Yong-Sork Her's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge