Publications‎ > ‎

Journals

  • [63] Donghyun Choi, Hanjae Jeong, Dongho Won, and Seungjoo Kim,
    "Hybrid Key Management Architecture for Robust SCADA Systems (.pdf)",
    Journal of Information Science and Engineering, Vol.29, No.2, March 2013, pp.?-?. (SCI-E, SCOPUS
    )
  • [62] Donghyun Choi, Kwangwoo Lee, and Seungjoo Kim,
    "
    Efficient Authorized Domain DRM System without Revocation List (.pdf)",
    Information - An International Interdisciplinary Journal, International Information Institute, Vol.15, No.5, May 2012, pp.2333-2343. (SCI-E, IF:0.250
    )
  • [61] Seung-Hyun Seo, Kyu Young Choi, Jung Yeon Hwang, and Seungjoo Kim,
    "
    Efficient Certificateless Proxy Signature Scheme with Provable Security (.pdf)",
    Information Sciences, Volume 188, Elsevier Science Inc, 1 April 2012, pp.322-337. 
    (SCI
     , IF:2.833)
  • [60] Kwangwoo Lee, Dongho Won, and Seungjoo Kim,
    "
    A Secure and Efficient E-Will System Based on PKI (.pdf)",
    Information - An International Interdisciplinary Journal, International Information Institute, Vol.14, No.7, July 2011, pp.2187-2206.
     (SCI-E
     , IF:0.250)
  • [59] Heasuk Jo, Seungjoo Kim, and Dongho Won,
    "Advanced Information Security Management Evaluation System (.pdf)",
    KSII Transactions on Internet and Information Systems, Vol.5, No.6, June 2011, pp.1192-1213. (SCI-E
     , IF:0.372)
  • [58] Byunghee Lee, Kyungho Son, Dongho Won, and Seungjoo Kim,
    "Secure Data Deletion for USB Flash Memory (.pdf)",
    Journal of Information Science and Engineering, Vol.27, No.3, May 2011, pp.933-952. (SCI-E, SCOPUS
     , IF:0.175)
  • [57] Sungkyu Cho, Donghwi Shin, Heasuk Jo, Donghyun Choi, Dongho Won and Seungjoo Kim,
    "Secure and Efficient Code Encryption Scheme based on the Indexed Table (.pdf)",
    ETRI Journal, Vol.33, No.1, February 2011, pp.60-70. (SCI, SCOPUS
     , IF:0.897)
  • [56] Yunho Lee, Sangjoon Park, Masahiro Mambo, Seungjoo Kim, and Dongho Won,
    "Towards Trustworthy e-Voting using Paper Receipts (.pdf)",
    Elsevier Computer Standards & Interfaces, Volume 32, Issue 5-6, October 2010, pp.305-311. (SCI-E, SCOPUS, IF:1.257)
  • [55] Hanjae Jeong, Dongho Won, Seungjoo Kim,
    "Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol (.pdf)",
    Journal of Information Science and Engineering, Vol.26, No.5, September 2010, pp.1845-1858. (SCI-E, SCOPUS, IF:0.175)
  • [54] Donghyun Choi, Sungjin Lee, Dongho Won, and Seungjoo Kim
    "Efficient Secure Group Communications for SCADA (.pdf)",
    IEEE Transactions on Power Delivery, Vol.25, No.2, April 2010, pp.714-722. (SCI, SCOPUS, IF:1.353)
  • [53] Yunho Lee, Seungjoo Kim, Dongho Won,
    "Enhancement of two-factor authenticated key exchange protocols in public wireless LANs (.pdf)",
    Elsevier Computers and Electrical Engineering, Volume 36, Issue 1, January 2010, pp.213-223. (SCI-E, IF:0.837)
  • [52] Donghyun Choi, Hakman Kim, Dongho Won, and Seungjoo Kim,
    "Advanced Key Management Architecture for Secure SCADA Communications (.pdf)",
    IEEE Transactions on Power Delivery, Vol.24, No.3, July 2009, pp.1154-1163. (SCI, SCOPUS, IF:1.29)
  • [51] Junghyun Nam, Youngsook Lee, Seungjoo Kim, and Dongho Won,
    "Security Weakness in a Three-Party Pairing-Based Protocol for Password Authenticated Key Exchange (.pdf)",
    Information Sciences, Volume 177, Issue 6, Elsevier Science Inc, 15 March 2007, pp.1364-1375. (SCI, IF:2.147)
  • [50] Junghyun Nam, Seungjoo Kim, Sangjoon Park, and Dongho Won,
    "Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards (.pdf)",
    IEICE Trans. Fundamentals, Vol.E90-A, No.1, January 2007, pp.299-302. (SCI-E, IF:0.287)
  • [49] Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, and Howon Kim,
    "Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services (.pdf)",
    Proc. of KES 2006, 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, Springer-Verlag, LNAI 4251, Bournemouth, UK, 9-11 October 2006, pp.924-934. (SCI-E, Acceptance Ratio: 34%)
  • [48] Namje Park,, Seungjoo Kim, Dongho Won, and Howon Kim,
    "Security Analysis and Implementation leveraging Globally Networked Mobile RFIDs (.pdf)",
    Proc. of PWC 2006, IFIP TC6 11th International Conference on Personal Wireless Communications, Springer-Verlag, LNCS 4217, Albacete, Spain, 20-22 September 2006, pp.494-505. (SCI-E, Acceptance Ratio: 24%)
  • [47] Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won,
    "RFID system based MCLT system with Improved Privacy (.pdf)",
    Proc. of Trust 2006, Trustworthiness, Reliability and services in Ubiquitous and Sensor neTworks, Springer-Verlag, LNCS 4097, Seoul, Korea, 1-4 August 1-4 2006, pp.579-590. (SCI-E, Acceptance Ratio: 27%)
  • [46] Yunho Lee, Seungjoo Kim, and Dongho Won,
    "Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol (.pdf)",
    IEICE Trans. Fundamentals, Vol.E89-A, No.7, July 2006, pp.2084-2087. (SCI-E, IF:0.312)
  • [45] Younggyo Lee, Jeonghee Ahn, Seungjoo Kim, and Dongho Won,
    "A PKI System for Detecting the Exposure of a User's Secret Key (.pdf)",
    Proc. of EuroPKI 2006, European PKI Workshop: Research and Applications, Springer-Verlag, LNCS 4043, Politecnico di Torino, Sala Consiglio di Facolta, Torino (Italy), 19-20 June 2006, pp.248-250. (SCI-E, Acceptance Ratio: 44%)
  • [44] Youngsook Lee, Junghyun Nam, Seungjoo Kim, and Dongho Won,
    "Two Efficient and Secure Authentication Schemes Using Smart Cards (.pdf)",
    Proc. of ICCSA 2006, International Conference on Computational Science and Its Applications, Springer-Verlag, LNCS 3984, The Hilton Glasgow Hotel, Glasgow, UK, 8-11 May 2006, pp.858-866. (SCI-E, Acceptance Ratio: 27.10%)
  • [43] He Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, and Dongho Won,
    "Confidence Value based Multi Levels of Authentication for Ubiquitous Computing Environments (.pdf)",
    Proc. of ICCSA 2006, International Conference on Computational Science and Its Applications - Authentication Authorization Accounting (AAA) Workshop, Springer-Verlag, LNCS 3981, The Hilton Glasgow Hotel, Glasgow, UK, 8-11 May 2006, pp.954-963. (SCI-E, Acceptance Ratio: 27.10%)
  • [42] Junghyun Nam, Seungjoo Kim, and Dongho Won,
    "Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme (.pdf)",
    IEICE Trans. Fundamentals, Vol.E89-A, No.1, January 2006, pp.213-218. (SCI-E, IF:0.312)
  • [41] Junghyun Nam, Seungjoo Kim, and Dongho Won,
    "Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols using Passwords (.pdf)",
    IEICE Trans. Fundamentals, Vol.E89-A, No.1, January 2006, pp.209-212. (SCI-E, IF:0.312)
  • [40] Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, and Howon Kim,
    "WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment (.pdf)",
    Proc. of ICSE 2006, International Workshop on Web-based Internet Computing for Science and Engineering (in conjunction with APWeb 2006), Springer-Verlag, LNCS 3842, Harbin, China, 18 January 2006, pp.741-748. (SCI-E, Acceptance Ratio: 9%)
  • [39] Yunho Lee, Kwangwoo Lee, Seungjoo Kim, Dongho Won, and Hyungkyu Yang,
    "A Method for Deciding Quantization Steps in QIM Watermarking Schemes (.pdf)",
    Proc. of SecUbiq 2005, International Workshop on Security in Ubiquitous Computing Systems (in conjunction with EUC 2005), Springer-Verlag, LNCS 3823, Nagasaki, Japan, 6-9 December 2005, pp.965-975. (SCI-E, IF:0.402)
  • [38] Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Kim, and Dongho Won,
    "XML-Based Digital Signature Accelerator in Open Mobile Grid Computing (.pdf)",
    Proc. of GCC 2005, International Conference on Grid and Cooperative Computing, Springer-Verlag, LNCS 3795, Beijing, China, November 30 - December 3, 2005, pp.323-333. (SCI-E, IF:0.402)
  • [37] Hyunjue Kim, Junghyun Nam, Seungjoo Kim, and Dongho Won,
    "Secure and Efficient ID-based Group Key Agreement fitted for Pay-TV (.pdf)",
    Proc. of PCM 2005, The 2005 Pacific-Rim Conference on Multimedia, Springer-Verlag, LNCS 3768, Jeju Island, Korea, 13-16 November 2005, pp.117-128. (SCI-E, IF:0.402)
  • [36] Junghyun Nam, Jinwoo Lee, Seungjoo Kim, and Dongho Won,
    "
    DDH-based Group Key Agreement in a Mobile Environment (.pdf)",
    Journal of Systems and Software, Volume 78, Issue 1, Elsevier Science Inc, October 2005, pp.73-83. (SCI-E, IF:0.744)
  • [35] Junghyun Nam, Seungjoo Kim, and Dongho Won,
    "Secure Group Communications over Combined Wired and Wireless Networks (.pdf)",
    Proc. of TrustBus 2005, International Conference on Trust, Privacy, and Security in Digital Business (in conjunction with DEXA 2005), Springer-Verlag, LNCS 3592, Copenhagen, Denmark, 22-26 August 2005, pp.90-99. (SCI-E, IF:0.402)
  • [34] Namje Park, Kiyoung Moon, Howon Kim, Seungjoo Kim, and Dongho Won,
    "XML-based Security Acceleation Methods Supporting Fast Mobile Grid (.pdf)",
    Proc. of EC-Web 2005, International Conference on Electronic Commerce and Web Technologies (in conjunction with DEXA 2005), Springer-Verlag, LNCS 3590, Copenhagen, Denmark, 22-26 August 2005, pp.316-326. (SCI-E, IF:0.402)
  • [33] Junghyun Nam, Seungjoo Kim, and Dongho Won,
    "Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols (.pdf)",
    Proc. of WISA 2005, International Workshop on Information Security Applications, Springer-Verlag, LNCS 3786, Jeju Island, Korea, 22-24 August 2005, pp.1-9. (SCI-E, IF:0.402)
  • [32] Namje Park, Howon Kim, Kyoil Chung, Seungjoo Kim, and Dongho Won,
    "XKMS-based Key Management for Open LBS in Web Services Environment (.pdf)",
    Proc. of AWIC 2005, The 3rd Atlantic Web Intelligence Conference, Springer-Verlag, LNAI 3528, Poland, June 6-9, 2005, pp.367-373. (SCI-E, IF:0.402)
  • [31] Jin Kwak, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim, and Dongho Won,
    "RFID System with Fairness within the Framework of Security and Privacy (.pdf)",
    Proc. of ESAS 2005, European Workshop on Security and Privacy in Ad hoc and Sensor Networks, Springer-Verlag, LNCS 3813, Visegrad, Hungary, 13-14 July 2005, pp.142-152. (SCI-E, IF:0.402)
  • [30] Younggyo Lee, Injung Kim, Seungjoo Kim, and Dongho Won,
    "A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS (.pdf)",
    Proc. of EuroPKI 2005, European PKI Workshop: Research and Applications, Springer-Verlag, LNCS 3545, University of Kent, England, June 30 - July 1, 2005, pp.215-226. (SCI-E, IF:0.402)
  • [29] Junghyun Nam, Seungjoo Kim, and Dongho Won,
    "
    A Weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices" (.pdf),
    IEEE Communications Letters, Volume 9, Issue 5, May 2005, pp.429-431. (SCI, IF:1.058)
  • [28] Junghyun Nam, Hyunjue Kim, Seungjoo Kim, Dongho Won, and Hyungkyu Yang,
    "Practical and Provably-Secure Multicasting over High-Delay Networks (.pdf)",
    Proc. of ICCS 2005, International Conference on Computational Science 2005, Springer-Verlag, LNCS 3515, Atlanta, USA, 22-25 May 2005, pp.493-501. (SCI-E, IF:0.402)
  • [27] Namje Park, Howon Kim, Seungjoo Kim, Dongho Won,
    "Open Location-based Service using Secure Middleware Infrastructure in Web Services (.pdf)",
    Proc. of UWSI 2005, Ubiquitous Web Systems and Intelligence Workshop, Springer-Verlag, LNCS 3481, Singapore, 9-12 May  2005, pp.1146-1155. (SCI-E, IF:0.402)
  • [26] Seokhyang Cho, Junghyun Nam, Seungjoo Kim, and Dongho Won,
    "An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices (.pdf)",
    Proc. of ICCSA 2005, International Conference on Computational Science and Its Applications, Springer-Verlag, LNCS 3480, Singapore, 9-12 May 2005, pp.498-507. (SCI-E, IF:0.402)
  • [25] Keunwoo Rhee, Jin Kwak, Seungjoo Kim, and Dongho Won,
    "Challenge-Response based RFID Authentication Protocol for Distributed Database Environment (.pdf)",
    Proc. of SPC 2005, International Conference on Security in Pervasive Computing, Springer-Verlag, LNCS 3450, Boppard, Germany, 6-8 April 2005, pp.70-84. (SCI-E, IF:0.402)
  • [24] Jeeyeon Kim, Seungjoo Kim, Jin Kwak and Dongho Won,
    "
    Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords (.pdf)",
    Proc. of ICCSA 2004 (Part I), International Conference on Computational Science and Its Applications - Internet Communication Security Workshop, Springer-Verlag, LNCS 3043, S. Maria degli Angeli, Assisi(PG), Italy, 14-17 May 2004, pp.895-902. (SCI-E, IF:0.513)
  • [23] Junghyun Nam, Seokhyang Cho, Seungjoo Kim, and Dongho Won,
    "
    Simple and Efficient Group Key Agreement based on Factoring (.pdf)",
    Proc. of ICCSA 2004 (Part I), International Conference on Computational Science and Its Applications - Authentication Authorization Accounting (AAA) Workshop, Springer-Verlag, LNCS 3043, S. Maria degli Angeli, Assisi(PG),           Italy, 14-17 May  2004, pp.645-654. (SCI-E, IF:0.513)
  • [22] Ikkwon Yie, Seongan Lim, Seungjoo Kim, and Dongryeol Kim,
    "
    Prime Numbers of Diffie-Hellman Groups for IKE-MODP (.pdf)",
    Progress in Cryptology - IndoCrypt 2003, Springer-Verlag, LNCS 2904, India, 8-10 December 2003, pp.228-234. (SCI-E)
  • [21] Seungjoo Kim and Dongho Won
    "Threshold Entrusted Undeniable Signature (.pdf)," (Slides),
    Proc. of ICISC 2004, International Conference on Information Security and Cryptology, Springer-Verlag, LNCS 3506, Seoul, Korea, 2-3 December 2004, pp.195-203. (SCI-E, IF:0.513)
  • [20] Kilsoo Chun, Seungjoo Kim, Sangjin Lee, Soo Hak Sung, and Seonhee Yoon,
    "
    Differential and Linear Cryptanalysis for 2-round SPNs (.pdf)",
    Information Processing Letters, Volume 87, Issue 5, Elsevier, 15 September 2003, pp.277-282 (SCI-E, IF:0.473)
  • [19] Jeeyeon Kim, Hyunjo Kwon, Haeryong Park, Seungjoo Kim, and Dongho Won,
    "An Improvement of VeriSign's Key Roaming Service Protocol (.pdf)",
    Proc. of ICWE 2003, International Conference on Web Engineering, Springer-Verlag, LNCS 2722, Oviedo, Asturias, Spain, 14-18 July 2003, pp.281-288. (SCI-E)
  • [18] Seungjoo Kim, Masahiro Mambo, and Yuliang Zheng,
    "Rethinking chosen-ciphertext security under Kerckhoffs' assumption (.pdf)", (Slides),
    Proc. of CT-RSA 2003, Cryptographers' Track RSA Conference, Springer-Verlag, LNCS 2612, San Francisco, 13-17 April 2003, pp.227-243. (SCI-E)
  • [17] Jung-Yeun Lee, Jung Hee Cheon, and Seungjoo Kim,
    "An analysis of proxy signatures : Is a secure channel necessary ? (.pdf)",
    Proc. of CT-RSA 2003, Cryptographers' Track RSA Conference, Springer-Verlag, LNCS 2612, San Francisco, 13-17 April 2003, pp.68-79. (SCI-E)
  • [16] Sung-Ming Yen, Seungjoo Kim, Seongan Lim, and SangJae Moon,
    "RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis (.pdf)",
    IEEE Transactions on Computers - Special issue on CHES, Vol.52, No.4, April 2003, pp.461-472. (SCI, IF:1.919)
  • [15] Seungjoo Kim, Seongan Lim, and Dongho Won,
    "
    Cryptanalysis of flexible remote password authentication scheme of ICN'01 (of Springer LNCS 2093) (.pdf)",
    Electronics Letters 38(24), IEE Press, 21 November 2002, pp.1519-1520. (SCI, IF:1.072)
  • [14] Seongan Lim, Seungjoo Kim, Ikkwon Yie and Jaemoon Kim,
    "Comments on a signature scheme based on the third order LFSR proposed at ACISP 2001 (.pdf)",
    Progress in Cryptology - IndoCrypt 2001, Springer-Verlag, LNCS 2247, India, 16-20 December 2001, pp.308-315. (SCI-E, IF:0.415)
  • [13] Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, and Yuliang Zheng
    "Strong adaptive chosen-ciphertext attack with memory dump (Or : The importance of the order of decryption and validation) (.pdf)", (Slides),
    Eighth IMA Conference on Cryptography and Coding 2001, Springer-Verlag, LNCS 2260, Royal Agricultural College, Cirencester, UK, 17-19 December 2001, pp.114-127. (SCI-E, IF:0.415)
  • [12] Sung-Ming Yen, Seungjoo Kim, Seongan Lim, and Sangjae Moon,
    "A countermeasure against one physical cryptanalysis may benefit another attack (.pdf),"
    Proc. of ICISC 2001, International Conference on Information Security and Cryptology, Springer-Verlag, LNCS 2288, Seoul, Korea, 6-7 December 2001, pp.414-427. (SCI-E, IF:0.415)
  • [11] Sung-Ming Yen, Seungjoo Kim, Seongan Lim, and Sangjae Moon,
    "RSA speedup with residue number system immune against hardware fault cryptanalysis (.pdf),"
    Proc. of ICISC 2001, International Conference on Information Security and Cryptology, Springer-Verlag, LNCS 2288, Seoul, Korea, 6-7 December 2001, pp.397-413. (SCI-E, IF:0.415)
  • [10] Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim, and Hongsub Lee,
    "XTR extended to GF(p6m) (.pdf)",
    Eighth Annual Workshop on Selected Areas in Cryptography - SAC 2001, Springer-Verlag, LNCS 2259, Toronto (Canada), 16-17 August 2001, pp.301-312. (SCI-E, IF:0.415)
  • [9] Seungjoo Kim, Masahiro Mambo, Takeshi Okamoto, Hiroki Shizuya, Mitsuru Tada and Dongho Won,
    "
    On the security of the Okamoto-Tanaka ID-based key exchange scheme against active attacks (.pdf)", (Click here for conference version),
    IEICE Trans. Fundamentals, Vol.E84-A, No.1, January 2001, pp.231-238. (SCI-E, IF:0.346) 
    Note : See also helpful graphics from Hiroki Shizuya's web.
  • [8] Seongan Lim, Seungjoo Kim, Ikkwon Yie, and Hongsub Lee,
    "A Generalized Takagi-cryptosystem with a modulus of the form prqs (.pdf)",
    Bimal Roy, Eiji Okamoto (Eds.): Progress in Cryptology - IndoCrypt 2000, Springer-Verlag, LNCS 1977, Calcutta, India, 10-13 December 2000, pp.283-294. (SCI-E, IF:0.39)
  • [7] Marc Joye, Seungjoo Kim and Narn-Yih Lee,
    "Cryptanalysis of two group signature schemes (.pdf)(See also LCIS Tech. Report TR-99-6B.),
    Masahiro Mambo, Yuliang Zheng (Eds.): Proc. of ISW'99, Information Security Workshop, Springer-Verlag, LNCS 1729, Kuala Lumpur, Malaysia, 6-7 November 1999, pp.271-275. (SCI-E, IF:0.872)
  • [6] Seungjoo Kim, Insoo Lee, Masahiro Mambo and Sungjun Park,
    "On the difficulty of key recovery systems (.pdf)", (Slides),
    Masahiro Mambo, Yuliang Zheng (Eds.): Proc. of ISW'99, Information Security Workshop, Springer-Verlag, LNCS 1729, Kuala Lumpur, Malaysia, 6-7 November 1999, pp.207-224. (SCI-E, IF:0.872)
  • [5] Seungjoo Kim, Byungchun Kim and Sungjun Park,
    "
    Comments on password-based private key download protocol of NDSS'99 (.pdf)(Click here for Sung-Ming Yen's revised version),
    Electronics Letters 35(22), IEE Press, 7 September 1999, pp.1937-1938. (SCI, IF:1.164)
  • [4] Seungjoo Kim, Sangjoon Park, and Dongho Won,
    "Proxy signatures, revisited (.ps.zip and .pdf.zip)",
    Han, Okamoto, Quing (Eds.): Proc. of ICICS'97, International Conference on Information and Communications Security, Springer-Verlag, LNCS 1334, Beijing, China, 11-14 November 1997, pp.223-232. (SCI-E, IF:0.515)
  • [3] Seungjoo Kim, Sangjoon Park and Dongho Won,
     "Group signatures for hierarchical multigroups (.ps.zip and .pdf.zip)",
    Okamoto, Davida, Mambo (Eds.): Proc. of ISW'97, Information Security Workshop, Springer-Verlag, LNCS 1396, Tatsunokuchi, Ishikawa Japan, 17-19 September 1997, pp.273-281. (SCI-E, IF:0.515)
  • [2] Sangjoon Park, Seungjoo Kim and Dongho Won,
    "ID-based group signature (.pdf)",
    Electronics Letters 33(19), IEE Press, 11 September 1997, pp.1616-1617. (SCI, IF:1.005)
  • [1] Seungjoo Kim, Sungjun Park and Dongho Won,
    "Convertible group signatures (.ps.zip and .pdf.zip)",
    Kim, Matsumoto (Eds.): Advanced in Cryptology - AsiaCrypt'96, Springer-Verlag, LNCS 1163, Kyongju, Korea, 3-7 November 1996, pp.311-321. (SCI-E)
    • Note : Sangjoon Park pointed out some weaknesses in Sungjun Park's group signature schemes of JW-ISC'95 and ICEIC'95, while the authors were preparing the camera-ready manuscript for Asiacrypt'96 conference (so, we had no time to fix it up). Because our schemes are based on previous works of Sungjun Park, our proposed schemes are also vulnerable to Sangjoon Park's attack.