Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Young-Ran Lee is active.

Publication


Featured researches published by Young-Ran Lee.


ad hoc networks | 2013

EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks

Kyung-Ah Shim; Young-Ran Lee; Cheol-Min Park

In this paper, we propose an efficient identity-based broadcast authentication scheme, EIBAS, to achieve security requirements in wireless sensor networks. To minimize communication and computational costs, we use a pairing-optimal identity-based signature scheme with message recovery, where the original message of the signature is not required to be transmitted together with the signature, as it can be recovered according to the verification/message recovery process. The EIBAS scheme achieves a minimization of communication overhead, allowing the total energy consumption to be reduced by up to 48.5% compared to previous identity-based broadcast authentication schemes.


Applied Mathematics and Computation | 2004

Multi-party authenticated key agreement protocols from multi-linear forms

Young-Ran Lee; Hyang-Sook Lee; Ho-Kyu Lee

Joux [Lect. Notes Comput. Sci., Vol. 1838, 2000, pp. 385-394] presented a one round protocol for tripartitie key agreement and Al-Riyami and Paterson [Report 2002/035, http://eprint.iacr.org, 2002] developed a number of tripartitie, one round, authenticated protocols related to MTI and MQV protocols. Recently, Boneh and Silverleg [Applications of Multi-linear Forms to Cryptography, Contemporary Mathematics, Vol. 324, Am. Math. Soc., Providence, RI, 2003, pp. 71-90] studied multi-linear forms, which provides a one round multi-party key agreement protocol. In this paper, we propose (n+1) types of one round authenticated multi-party key agreement protocols from multi-linear forms based on the application of MTI and MQV protocols.


Applied Mathematics and Computation | 2005

Security flaws in authentication and key establishment protocols for mobile communications

Kyung-Ah Shim; Young-Ran Lee

Mobile electronic commerce has started recently to appear in the scene by exploiting the advantages of mobile computing and telecommunications in order to provide a large number of advanced services to mobile users. A variety of protocols suitable for applications in upcoming third-generation mobile systems such as UMTS have been proposed. In this paper, we identify security flaws with several authentication and key establishment protocols for mobile communications introducing a new kind of attack: known key-share attack. Our results show that the protocols do not provide authentication as intended.


Communications of The Korean Mathematical Society | 2005

IDENTITY BASED AUTHENTICATED KEY AGREEMENT FROM PAIRINGS

Hyang-Sook Lee; Young-Ran Lee

We present a new identity based authenticated key agreement protocol from pairings satisfying the required security attributes. The security of our protocol is based on the bilinear Di-e-Hellman assumption.


Communications of The Korean Mathematical Society | 2003

MULTIPARTY KEY AGREEMENT PROTOCOL BASED ON SYMMETRIC TECHNIQUES

Hyang-Sook Lee; Young-Ran Lee; Juhee Lee

In this paper, we propose multiparty key agreement protocols by generalizing the Bloms scheme based on 2 variable polynomials. Especially we develop three party and four party key agreement schemes with security. The advantage of the new schemes is to have small demands on storage space.


Fundamenta Informaticae | 2011

Security Pitfalls of the Certificateless Signature and Multi-Receiver Signcryption Schemes

Kyung-Ah Shim; Young-Ran Lee

Recently, Xiong et al. and Selvi et al. proposed a certificateless signature scheme secure in the standard model and a certificateless multi-receiver signcryption scheme secure in the random oracle model, respectively. In this paper, we show that they are insecure against malicious-butpassive KGC attacks. More specifically, the former does not achieve unforgeability and the latter does not satisfy confidentiality against type II adversaries.


Journal of Internet Technology | 2010

On the Existence of Short Certificateless Signatures

Kyung-Ah Shim; Young-Ran Lee

Certificateless cryptography eliminates the need of certificates in public key cryptosystems and solves the inherent key escrow problem in identity-based cryptosystems. In this paper we discuss the existence of short certificateless signature schemes provably secure in formal security models recently established, whose resulting signature consists of a single element of the underlying group by demonstrating key replacement attacks on Du-Wens and Tso et al.s short certificateless signature schemes.


IACR Cryptology ePrint Archive | 2004

An Authenticated Certificateless Public Key Encryption Scheme.

Young-Ran Lee; Hyang-Sook Lee


IACR Cryptology ePrint Archive | 2003

An Authenticated Group Key Agreement Protocol on Braid groups

Ho-Kyu Lee; Hyang-Sook Lee; Young-Ran Lee


IACR Cryptology ePrint Archive | 2002

Multi-Party Authenticated Key Agreement Protocols from Multilinear Forms.

Ho-Kyu Lee; Hyang-Sook Lee; Young-Ran Lee

Collaboration


Dive into the Young-Ran Lee's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ho-Kyu Lee

Ewha Womans University

View shared research outputs
Top Co-Authors

Avatar

Juhee Lee

Ewha Womans University

View shared research outputs
Researchain Logo
Decentralizing Knowledge