The search functionality is under construction.

Author Search Result

[Author] Minkyu KIM(4hit)

1-4hit
  • Comment on the Security of an Order-Preserving Encryption Scheme Using Pseudo-Random Function

    Minkyu KIM  Je HONG PARK  Dongyoung ROH  

     
    WRITTEN DISCUSSION-Fundamental Theories for Communications

      Vol:
    E99-B No:9
      Page(s):
    2108-2111

    Since the first formal cryptographic study of order-preserving encryption (OPE) by Boldyreva et al., few OPE schemes with provable security have been published. In this paper, we analyze the security of Jho et al.'s OPE scheme, and show that it is not POPF-CCA secure in opposition to what they claim.

  • Fabrication of the Wireless Systems for Controlling Movements of the Electrical Stimulus Capsule in the Small Intestines

    YeonKwan MOON  JyungHyun LEE  HeeJoon PARK  JuGab LEE  JaeJong RYU  SangHyo WOO  MinKyu KIM  ChulHo WON  TaeWan KIM  JinHo CHO  HyunChul CHOI  

     
    PAPER-Biological Engineering

      Vol:
    E90-D No:2
      Page(s):
    586-593

    Diseases of the gastro-intestinal tract are becoming more prevalent. New techniques and devices, such as the wireless capsule endoscope and the telemetry capsule, that are able to measure the various signals of the digestive organs (temperature, pH, and pressure), have been developed for the observation of the digestive organs. In these capsule devices, there are no methods of moving and grasping them. In order to make a swift diagnosis and to give proper medication, it is necessary to control the moving speed of the capsule. This paper presents a wireless system for the control of movements of an electrical stimulus capsule. This includes an electrical stimulus capsule which can be swallowed and an external transmitting control system. A receiver, a receiving antenna (small multi-loop), a transmitter, and a transmitting antenna (monopole) were designed and fabricated taking into consideration the MPE, power consumption, system size, signal-to-noise ratio and the modulation method. The wireless system, which was designed and implemented for the control of movements of the electrical stimulus capsule, was verified by in-vitro experiments which were performed on the small intestines of a pig. As a result, we found that when the small intestines are contracted by electrical stimuli, the capsule can move to the opposite direction, which means that the capsule can go up or down in the small intestines.

  • Dynamic Rendering Quality Scaling Based on Resolution Changes

    MinKyu KIM  SunHo KI  YoungDuke SEO  JinHong PARK  ChuShik JHON  

     
    LETTER-Computer Graphics

      Pubricized:
    2015/09/17
      Vol:
    E98-D No:12
      Page(s):
    2353-2357

    Recently in the mobile graphic industry, ultra-realistic visual qualities with 60fps and limited power budget for GPU have been required. For graphics-heavy applications that run at 30 fps, we easily observed very noticeable flickering artifacts. Further, the workload imposed by high resolutions at high frame rates directly decreases the battery life. Unlike the recent frame rate up sampling algorithms which remedy the flickering but cause inevitable significant overheads to reconstruct intermediate frames, we propose a dynamic rendering quality scaling (DRQS) that includes dynamic rendering based on resolution changes and quality scaling to increase the frame rate with negligible overhead using a transform matrix. Further DRQS reduces the workload up to 32% without human visual-perceptual changes for graphics-light applications.

  • Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption

    Minkyu KIM  Atsushi FUJIOKA  Berkant USTAOLU  

     
    PAPER-Public Key Cryptography

      Vol:
    E95-A No:1
      Page(s):
    29-39

    LaMacchia, Lauter and Mityagin [19] proposed a novel security definition for authenticate key exchange (AKE) that gives an adversary the power to obtain ephemeral information regarding a target test session. To demonstrate feasibility of secure protocols in the new definition, henceforth called eCK, the authors described a protocol called NAXOS. NAXOS combines an ephemeral private key x with a static private key a to generate an ephemeral public key X (more precisely in what we call the NAXOS' approach X = gH(x,a)). Thus no one is able to query the discrete logarithm of X without knowing both the ephemeral and static private keys. This idea is crucial in the security argument to guard against leaked ephemeral secrets belonging to the test session. Another important assumption is the gap assumption that allows the protocol to remain secure even in the presence of malicious insiders. Both ideas have been successfully used in creating various protocols secure in the eCK model. In this paper, we construct two eCK-secure protocols without the above mentioned ideas. KFU1 is secure under the GDH assumption without using the NAXOS' approach. KFU2 builds upon KFU1 and drops the gap requirement, thus it is secure under the CDH assumption. Efficiency and security of the proposed protocols are comparable to the well-known HMQV [15] protocol. Furthermore, unlike HMQV and NAXOS the use of the random oracle in KFU1 and KFU2 is restricted to the key derivation function making them more suitable for practical applications.