scispace - formally typeset
Search or ask a question
Author

Chan Yeob Yeun

Bio: Chan Yeob Yeun is an academic researcher from Royal Holloway, University of London. The author has contributed to research in topics: Digital signature & Authenticated encryption. The author has an hindex of 1, co-authored 1 publications receiving 14 citations.

Papers
More filters
Book ChapterDOI
TL;DR: It is shown that there are major differences between a digital signature scheme with message recovery and authenticated encryption scheme by proposing a digital signatures withmessage recovery scheme and signcryption scheme as an example for comparison.
Abstract: Mitchell and Yeun [8] showed that Chen’s scheme [2] is not a digital signature scheme with message recovery, whereas it should be called an authenticated encryption scheme. Also note that similar remarks have been made in [10] regarding schemes recently proposed by Zheng. Thus we will show that there are major differences between a digital signature scheme with message recovery and authenticated encryption scheme by proposing a digital signature with message recovery scheme and signcryption scheme as an example for comparison. The security of the schemes is based on intractability of solving the Diffie Hellman problem as well as finding a collision on one-way hash-function.

14 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A lightweight authentication protocol for RFID (Radio-Frequency Identification devices) has been proposed to overcome the drawbacks of existing solutions and to provide better performance in terms of low detection time, low CPU and memory consumption to strengthen the existing IoV environment.

188 citations

Proceedings ArticleDOI
01 Sep 2015
TL;DR: A structured and comprehensive overview of the recent research advances on VANETS security services is provided, surveying the state-of-the-art on security threats, vulnerabilities and security services, while focusing on important aspects that are not well-surveyed in the literature such as VANET security assessment tools.
Abstract: Vehicular ad hoc networks (VANET) are emerging as a prominent form of mobile ad hoc networks (MANETs) and as an effective technology for providing a wide range of safety applications for vehicle passengers. Nowadays, VANETs are of an increasing importance as they enable accessing a large variety of ubiquitous services. Such increase is also associated with a similar increase in vulnerabilities in these inter-vehicular services and communications, and consequently, the number of security attacks and threats. It is of paramount importance to ensure VANETs security as their deployment in the future must not compromise the safety and privacy of their users. The successful defending against such VANETs attacks prerequisite deploying efficient and reliable security solutions and services, and the research in this field is still immature and is continuously and rapidly growing. As such, this paper is devoted to provide a structured and comprehensive overview of the recent research advances on VANETS security services, surveying the state-of-the-art on security threats, vulnerabilities and security services, while focusing on important aspects that are not well-surveyed in the literature such as VANET security assessment tools.

84 citations

Journal ArticleDOI
TL;DR: A novel Broadcast based Secure Mobile Agent Protocol (BROSMAP) for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality and proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.
Abstract: Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP) for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.

44 citations

Book ChapterDOI
08 Dec 2007
TL;DR: Two new ID-based signature schemes with message recovery are proposed, one of which can deal with messages of fixed length and the second one that can dealWith messages of arbitrary length, and both are proven secure in the random oracle model.
Abstract: A digital signature with message recovery is a signature that the message itself is not required to be transmitted together with the signature. Comparing with other (non-short) digital signatures, it has the advantage of small data size of communication. This kind of signature schemes have been widely investigated a decade ago, but, no ID-based message recovery signature is proposed until 2005 by Zhang et al. Since, up to the present, no method can be used to shorten ID-based signatures directly, ID-based message recovery signatures are regarded as a useful method to shorten ID-based signatures, in contrast to proposing a short signature scheme. In this paper, two new ID-based signature schemes with message recovery are proposed. The first one can deal with messages of fixed length and the second one can deal with messages of arbitrary length. Similar to Zhang et al.'s schemes, our schemes shows the idea of shortening ID-based signatures. However, our schemes are more efficient than Zhang et al.'s schemes. In addition, after comparing with Boneh et al.'s short signature (which is not ID-based), we find that although the communication cost is still a little larger than that of a short signature, the computational cost of our scheme is less than that of Boneh et al.'s short signature in the verification phase and our schemes surpass a short signature scheme in the concept of ID-based property. Under the hardness of k-BDHI problem, our schemes are proven secure in the random oracle model.

42 citations

Journal ArticleDOI
TL;DR: The proposed model provides users with the means to assess service providers and decision making basis on who to interact with and assesses the honesty of witnesses to filter out false evaluations.

24 citations