Search For:

Displaying 1-3 out of 3 total
On Homomorphic Signatures for Network Coding
Found in: IEEE Transactions on Computers
By Aaram Yun, Jung Hee Cheon, Yongdae Kim
Issue Date:September 2010
pp. 1295-1296
In this paper, we examine homomorphic signatures that can be used to protect the integrity of network coding. In particular, Yu et al. proposed an RSA-based homomorphic signature scheme recently for this purpose. We show that their scheme in fact does not ...
Measuring the mixing time of social graphs
Found in: Proceedings of the 10th annual conference on Internet measurement (IMC '10)
By Aaram Yun, Abedelaziz Mohaisen, Yongdae Kim
Issue Date:November 2010
pp. 383-389
Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. For example, it is widely believed that social networks are fast mixing, and many recently proposed designs of such systems make c...
On protecting integrity and confidentiality of cryptographic file system for outsourced storage
Found in: Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09)
By Aaram Yun, Chunhui Shi, Yongdae Kim
Issue Date:November 2009
pp. 67-76
A cryptographic network file system has to guarantee confidentiality and integrity of its files, and also it has to support random access. For this purpose, existing designs mainly rely on(often ad-hoc) combination of Merkle hash tree with a block cipher m...