Tzong-Chen Wu

Tzong-Chen Wu
National Taiwan University of Science and Technology · Department of Information Management

About

165
Publications
13,728
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,678
Citations

Publications

Publications (165)
Article
Members of the International Association for Cryptologic Research explore regional work and collaboration activities.
Article
Full-text available
The state-owned enterprises based iron and steel industry in China encountered the sharply decreasing business performance of large steel works resulted from the reform in 1990. Delphi Method is utilized for analyzing the strategies and approaches of innovative business model, and the MEFAS model is proposed for innovation management in roller indu...
Article
Electronic medical records (EMR) have gradually replaced paper-based medical records with the advance of information technology in recent years. For preserving the same legal effect with paper-based medical records, it is important for EMR to maintain its content integrity and access history by using digital signature technology. In 2014, Yu et al....
Article
Tungsten is difficult and costly to maintain, so steel mills are constantly developing recycling technologies for tungsten carbide roll collars, which comprise 85% tungsten, in order to reduce tungsten consumption. However, some key technological barriers have not yet been overcome. This article aims to propose a successful recycling technology bre...
Article
English auctions become tremendously popular on the Internet today. This paper presents a new English auction scheme that can be realized in the public network environments without any additional secure channel. Our scheme not only satisfies security requirements of anonymity, traceability, no framing, fairness, public verifiability, unlinkability...
Article
Secure authentication of low cost Radio Frequency Identification (RFID) tag with limited resources is a big challenge, especially when we simultaneously consider anonymity, un-traceability, and forward secrecy. The popularity of Internet of Things (IoT) further amplifies this challenge, as we should authenticate these mobile tags in the partial-dis...
Article
This paper presents an anonymous authentication scheme for roaming service in global mobility networks, in which the foreign agent cannot obtain the identity information of the mobile user who is sending the roaming request. In addition, the home agent does not have to maintain any verification table for authenticating the mobile user. We give form...
Article
In 2006, Shieh and Wang proposed a remote mutual authentication and key agreement scheme, in which a user can login to a remote server with his password and smartcard. In Shieh and Wang's scheme, it requires only hash functions operations during the login and key agreement phase. However, Hölbl et al. demonstrated some attacks on Shieh and Wang's s...
Article
Missing data is an inherent feature of most surveys or assessments that involve human subjects. In a sensor-driven Computerized Adaptive Test (CAT), not reached item is a kind of missing data issue which causes serious ability estimation problem. Previous studies tried to resolve this issue from the perspective of scoring rule. This study utilized...
Article
An authentication scheme is one of the most basic and important security mechanisms for satellite communication systems because it prevents illegal access by an adversary. Lee et al. recently proposed an efficient authentication scheme for mobile satellite communication systems. However, we observed that this authentication scheme is vulnerable to...
Article
The certificateless signature (CLS) scheme is a special signature scheme that solves the key escrow problem in identity-based signature schemes. In CLS schemes, the private key is generated cooperatively by the key generator center (KGC) and signer, such that a malicious KGC cannot masquerade as the signer and sign a message. He et al. in 2011 prop...
Conference Paper
We propose an Android App copy protection mechanism based on dynamic loading. In our proposed mechanism, a legal user has to pass the authentication process for getting a separated class as he/she wants to execute all functionalities of the Android App. That is, the pirate user cannot execute all functionalities of the App even though he/she has ro...
Conference Paper
As more enterprises and companies utilize cloud environments and services to reduce IT costs, cloud service providers have to minimize their operation cost of data centers in order to gain advantages when competing with each other. In this study, an efficient virtual machine provisioning mechanism for cloud data center is introduced. Based on Cloud...
Article
Full-text available
In recent years, many researches have demonstrated several RFID-based solutions to enhance patient medication safety and avoid human errors. Although RFID-based procedure is more efficient than traditional process, patient's information may be attacked (or stolen) during the data transmission period. This will cause inappropriate medication use and...
Article
Full-text available
A proxy signature scheme is useful and convenient because it allows a proxy signer to sign a message on behalf of an entity. This study proposes a novel efficient proxy signature scheme for mobile devices using bilinear pairings. The computational cost of the proposed signature scheme is extremely low, and the length of the proposed signature is l...
Article
Full-text available
Handover authentication protocol enables a mobile node to switch from one base station to another without loss or interruption of service when the node exits the transmission area of his or her current base station. This paper proposes a secure prime-order handover authentication protocol based on bilinear pairings. The proposed protocol adapts the...
Conference Paper
During these years, the research field of certificateless signature (CLS) scheme without bilinear pairings is promptly investigated as the key escrow problem in identity-based cryptography can be solved via this concept. In this paper, we demonstrate that a certificateless signature scheme proposed by Gong and Li cannot fulfil its security claims....
Article
Full-text available
Smart card based authentication scheme has been widely utilized for various transaction-oriented services such as electronic currency exchange, social insurance payment and e-commerce payment charge in modern society. How to develop a smart card based authentication scheme to support initiator untraceability and defend against major security threat...
Article
Full-text available
A multi-server authentication scheme is a useful authentication mechanism in which a remote user can access the services of multiple servers after registering with the registration center (RC). This study shows that the password-based multi-server authentication scheme proposed by Yeh and Lo is vulnerable to undetectable password-guessing attack an...
Article
In 2008, Cao et al. proposed an identity-based multi-user broadcast authentication scheme (called IMBAS) for wireless sensor networks. The IMBAS consists of one elliptic curve-based signature scheme, called variant of Bellare-Namprempre-Neven' Identity-Based Signature (vBNN-IBS), for user broadcast authentication; a new Schnorr signature with parti...
Conference Paper
Full-text available
An identity-based sequential aggregate signature (IBSAS) scheme provides a shorter aggregate signature for multiple signers in which each signer has signed his/her own message and all generated signatures are aggregated in sequence. During aggregate signature verification process, a verifier can identify the generated order and the validity of sign...
Article
Full-text available
We investigate the optimal scheduling of retrieval jobs for double-deep type Automated Storage and Retrieval Systems (AS/RS) in the Flexible Manufacturing System (FMS) used in modern industrial production. Three types of evolutionary algorithms, the Genetic Algorithm (GA), the Immune Genetic Algorithm (IGA), and the Particle Swarm Optimization (PSO...
Article
Full-text available
This paper proposes a novel ID-based aggregate proxy signature scheme that realizes a warrant-based delegation for an original signer to transfer his/her signing power to a given set of proxy signers. Our proposed scheme allows n distinct proxy signers to sign n distinct messages in such a way that these n individual signatures can be aggregated in...
Article
Yang and Chang (2009) proposed a three-party authenticated key exchange protocol for securing communications in mobile-commerce environments. Their protocol reduces computation and communication costs by employing elliptic curve cryptosystems. However, Tan (2010) pointed out that Yang and Chang (2009)’s protocol cannot withstand impersonation and p...
Article
In this study, we introduce how these new tools improved the information security of users' operating system and assisted enterprises or organizations to comply with ISMS and ISO standards; this study also used case studies to explain what improvement and advantages that these tools brought to users' information security of these enterprises or org...
Article
Introduction. This paper proposes the development of the concept of design-fits and theoretical profiles for aligning information systems design and business strategies in terms of March and Smith's four main information technology artefacts: constructs, models, methods and instantiations. Method.The main research strategy adopted is an interpretat...
Article
A Gateway-oriented Password-based Authenticated Key Exchange (GPAKE) scheme allows a client to establish an authenticated session key with a gateway via the help of an authentication server, where the client has pre-shared a password with the server. The desirable security properties of a GPAKE include session key semantic security, key privacy aga...
Article
A group key agreement protocol is a group communication mechanism that allows a set of parties to determine a group key used for encrypting/decrypting subsequent communication messages through an insecure channel. Based on the rapid development of wireless and mobile technologies, researchers have proposed several group key protocols for mobile env...
Article
Along with the development of Information Technology, online transactions through Internet have become more popular for the reasons of convenience and efficiency. In order to provide secure and reliable online transactions, an effective electronic payment protocol is crucial. In this paper, we propose a novel electronic payment protocol for digital...
Article
Nowadays information and communication security has recently emerged as one of the most important tasks in the field of network management, operations and maintenance. The information security issue is of particular importance to the Taiwan Academic Network, a network which connects the networks of educational and research institutions in Taiwan. I...
Conference Paper
In the past couple of years, user privacy has become one of the major information security concerns for mobile device users when Internet access is available through mobile wireless environment. Several anonymous authentication protocols for mobile wireless environment have been proposed to meet mobile user requirements on security and privacy. In...
Conference Paper
In recent years, smart card based authentication has been massively adopted in the electronic health care and medical treatment services in which the user and administrator can agree a robust session key based on human-memorable passwords with the hospital server. In this paper, we investigate the robustness of an eHealth care system with smart car...
Article
Full-text available
Portable devices, with wireless communication capability, are used widely in everyday life. Preventing personal sensitive information from being revealed to an adversary through insecure wireless communication channels has therefore become a serious concern. This study proposes a novel ECC-based authentication protocol for portable communication sy...
Article
Full-text available
In order to protect privacy of RFID tag against malicious tag tracing activ-ities, most RFID authentication protocols support forward/backward security properties by updating the same secret values held at both tag end and database end asynchronously during each authentication session. However, in real network environments an adversary may easily i...
Article
It has been over 3 years since Vietnam became the 150th member of the World Trade Organization (WTO) in January 2007. Does the choice of entry mode provide a means to handle institutional changes like WTO accession in Vietnam? This study analyzes a sample of 2627 Foreign Direct Investment (FDI) firms (including those from Korea, Taiwan, Singapore,...
Article
Full-text available
In 2008, a convertible multi-authenticated encryption (CMAE) scheme for group communications is proposed by Ting-Yi Chang. Chang¡¦s mechanism enables multiple signers to generate a multi-authenticated cipher text associated with the targeted message or document. After receiving this multi-authenticated cipher text, multiple verifiers can recover an...
Article
Full-text available
A group key agreement scheme is to establish a secret key shared among some participants for secure group-oriented applications. Many authenticated group key agreement schemes have been proposed, but few of them provide user anonymity for wire-less mobile networks. Considering the user privacy issues and the characteristics of wireless mobile netwo...
Article
This is the first time in the steel industry that the steel mill applies the electro slag remelting to high-tungsten HSS roll collars for the second remelting after centrifugal casting. Such successful innovation in high-tungsten HSS roll collars dramatically enhances the life span of HSS roll collars more than that of ordinary alloy steel cast rol...
Article
Secure multicast is one of the important services in heterogeneous sensor networks for efficient transmission and rapid response in the case that certain sensitive or emergent applications are required. Key management is one of the crucial considerations for achieving secure multicast. This paper presents an efficient ECC-based key management schem...
Article
A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the range of a specified reader so that an off-line verifier can verify the proofs later. This proof has found several interesting applications. However, many existing RFID yoking schemes are vulnerable to replay attacks. To overc...
Article
Wireless Sensor Networks (WSNs)-based technology has invaded the Medicine and Healthcare scopes. The potential to replace wired iatrical equipments with wireless ones in the hospital will change the whole healthcare system out of question. The objective of this paper is to survey the research on the WSN-based healthcare systems to enhance further u...
Article
In 1999, Harn proposed a multisignature scheme with distinguished signing authorities (also called a multisignature scheme with document decomposition). In such schemes, a document could be partitioned into subdocuments, and each signer only has the authority to sign one specific subdocument in accordance with his signing responsibility and knowled...
Conference Paper
This research discusses the interactive synchronous e-learning system and its implications for corporate knowledge management. Using a case study of a Taiwanese Telecom company, qualitative data was gathered on the architecture, mechanisms, and KM implications of an interactive synchronous e-learning system in a business context. Following a case a...
Article
Medication error can easily cause serious health damage to inpatients in hospital. Consequently, the whole society has to spend huge amount of extra resources for additional therapies and medication on those affected inpatients. In order to prevent medication errors, secure inpatient medication administration system is required in a hospital. Using...
Conference Paper
Full-text available
While many past studies focus on “smart home” research, little is known about this stream of research. Begun as an effort to assess the trends and contribution on the field of “smart home”, this study surveys 465 smart home publications appearing in 194 journals from 1997 to October 2010. In this study, we define the keywords and do the inquiry to...
Article
Full-text available
Owing to the low cost and convenience of identifying an object without physical contact, Radio Frequency Identification (RFID) systems provide innovative, promising and efficient applications in many domains. An RFID grouping protocol is a protocol that allows an off-line verifier to collect and verify the evidence of two or more tags simultaneousl...
Article
Full-text available
A conference key establishment protocol allows a group of conferees to agree on a secret key shared among them for secure group communication. This paper proposes a three-level conference key establishment protocol based on the Universal Mobile Telecommunications System (UMTS) framework to establish a group-level key, home location register (HLR) l...
Article
Full-text available
While many past studies focus on "smart home" research, little is known about this stream of research. Begun as an effort to assess the trends and contribution on the field of "smart home", this study surveys 465 smart home publications appearing in 194 journals from 1997 to October 2010. In this study, we define the keywords and do the inquiry to...
Article
Full-text available
We propose a new secret key traitor tracing scheme using bilinear maps, in which the size of the enabling-block in a broadcast message is independent of the number of subscribers. The proposed traitor tracing scheme can identify malicious subscribers (also called traitors) from a pirate decoder, which is collusively made by k or fewer traitors. Fur...
Article
Full-text available
Access to secret data should be managed to allow authorized people only. An authenticated encryption scheme can be used to protect valuable information or secret data for data confidentiality, authentication, non-repudiation and integrity. In this pa-per, the authors propose a new supervising authenticated encryption scheme for multilevel security...
Article
The rapid development in electronic commerce and information technology drives the traditional physical product trading evolved to digital product trading. With the effect of the multi-agents system in the Internet environment and the promotions of Government, digital product industry grows fast. The authors proposed a digital product transaction m...
Article
Manufactured product items are usually transported from the factory to distributors first and then distributed to retailers before selling to customers. Since RFID technology is widely adopted for supply chain management, ownership transaction is able to record inside the attached RFID tag when a product item with its RFID tag was sold and transpor...
Article
Full-text available
While many past studies focus on quality research – especially using ‘Kano's model’, little is known about the stream of ‘Kano's model’. Begun as an effort to gauge the contribution to the field of ‘Kano's model’, this study reviews 94 academic articles related to Kano's model and appeared in 52 SSCI and SCI journals from 1998 to April 2012. In thi...
Article
Recently, Yoon et al. and Wang et al. independently proposed a dynamic ID authentication scheme and claimed that their schemes can withstand the risk of ID-theft, and several attacks. In this paper, we first demonstrate that both of the proposed schemes cannot achieve the security requirement for user anonymity and resist an impersonation attack ye...
Article
Traditionally researchers have assumed that the channels between Radio Frequency Identification (RFID) readers and backend servers are secure or that RFID readers can afford cornputationally-expensive cryptographic schemes. However, as RFID i heing integrated into legacy ytemri li/ce Enterprise Reourie Planning (ERP,) and low-cost RFID readers are...
Article
Smart home services have been quite popular for some time and many kinds of technologies can be applied to enhance smart home services. Conventionally, active radio frequency identification (RFID) has been widely used in smart home services to identify users, and there was less consideration for intelligence in these services. However, it is inconv...
Article
Full-text available
This paper proposes a new secure broadcasting scheme to realize the property of "information granularity", wherein a receiver with a higher security clearance level has the natural capability to recover a larger amount of information from the broadcasted message block. Based on the intractability of the product of the ℓ-weak Bilinear DiffieHellman...
Article
Full-text available
The digital signature is a very important subject for network security. Considering multiple signers and multiple verifiers, Xie and Yu (2004) pointed out that the multisignature scheme of Laih and Yen (1996) is vulnerable to a harmful attack. An attack can occur when a specified group of verifiers cooperate to forge a multisignature by secret key...
Conference Paper
Full-text available
In 2004, Bresson et al. proposed an authentication and group key agreement protocol for unbalanced wireless networks. Tseng recently proposed a novel secure protocol to improve Bresson et al.'s protocol. However, both protocols are insecure against the so-called impersonation attacks. This paper proposes a mutual authenticated group key agreement p...
Article
Cryptographic key assignment schemes in the partially ordered hierarchy allow a higher security class to derive the cryptographic key of a lower security class for key management, supervising, and etc. A "time- bound" cryptographic key assignment scheme can allow each security class to own distinct secret keys for different time periods and the hig...
Article
Full-text available
The authors designed the current study to examine the psychometric properties of the Chinese version of the workaholism battery (J. T. Spence & A. S. Robbins, 1992). Using the back-translation strategy recommended by R. Brislin (1980), the authors translated the original scale developed by Spence and Robbins. Factor analyses of responses from 1,235...
Article
A mobile peer-to-peer network (MOPNET) has drawn increasing attentions for its communication convenience and ease of resource sharing in an unfixed infrastructure. The essential requirements for applications in a MOPNET are to enforce trust of transmitted data and security of peers. However, most of mutual anonymity protocols for a MOPNET lack inte...
Conference Paper
Information technology (IT)-enabled organizational transformations are emphasized in a great deal of research. However, IT-enabled management control systems (MCS) transformations to facility management for steering an organization toward its strategic objectives have become relevant and important, yet underexplored. To address this gap, the presen...
Conference Paper
A convertible authenticated encryption (CAE) scheme is a technique which allows the signer to generate a valid authenticated ciphertext on the chosen message so that only the designated recipient can recover and verify the message. In case of a dispute, the recipient has the ability to convert the authenticated ciphertext into ordinary signature th...
Article
Welcome message from workshop organizers: FutureTech 2010
Article
This paper presents a two level ECC-based group key agreement scheme with privacy-preservation, where a group manager can easily setup a secure protocol in a public network to let the intended group members share an authenticated session key without disclosing their identities in the subsequent communication. To protect privacy, the proposed scheme...
Conference Paper
Full-text available
In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that...
Conference Paper
A gateway-oriented password-based authenticated key exchange (GPAKE) scheme allows a client to establish an authenticated session key with a gateway via the help of an authentication server, where the client has pre-shared a password with the server. The desirable security properties of a GPAKE include session key semantic security, key privacy aga...
Article
A password-based three-party encrypted key exchange (3PEKE) is a protocol that enables any pair of two registered clients to establish session keys with the help of a trusted server such that each client shares only one password with the server. This approach greatly improves the scalability of key agreement protocol in distributed environments and...
Article
Low cost Radio Frequency Identification (RFID) like EPC Gen 2 is one kind of most popular RFIDs in the market. However, as studied by several researchers, Gen 2 is not secure. Therefore, many researchers have devoted to improving the security. However, in addition to the fact the security of these improved schemes are still questionable, these solu...
Article
In recent years huge potential benefits from novel applications in mobile ad hoc networks (MANET) have been discussed extensively. However, without robust security mechanisms and systems to provide safety shell through the MANET infrastructure, MANET applications can be vulnerable and hammered by malicious attackers easily. In order to detect misbe...
Article
In 2004, Bresson et al. proposed a mutual authentication and group key agreement protocol for unbalanced wireless networks. Tseng recently proposed a novel secure protocol to improve Bresson et al.'s protocol. However, both protocols are based on certificate-based public key systems and insecure against the so-called impersonation attacks. They mig...
Conference Paper
Current NAC technologies implement a pre-connect phase where the status of a device is checked against a set of policies before being granted access to a network, and a post-connect phase that examines whether the device complies with the policies that correspond to its role in the network. In order to enhance current NAC technologies, we propose a...
Article
The authors propose a recursive protocol for group-oriented authentication with key exchange, in which a group of n entities can authenticate with each other and share a group session key. The proposed protocol has the following characteristics: First, it requires O(n) rounds of messages, O(log n) completion time, O(log n) waiting time, and O(n log...
Conference Paper
A password-based three-party encrypted key exchange (3PEKE) is a protocol enables any pair of two registered clients to establish session keys via the help of a trusted server such that each client shares only one password with the server. This approach greatly improves the scalability of key agreement protocol in distributed environments, and prov...
Conference Paper
Recently, a new class of crime scenes has become more prevalent. In a variety of criminal activities technologies are used to maintain records, communication, and commit crimes. For this reason, the challenge to investigative professionals is how to retrieve the digital evidence from storage devices and how to take the suspect to court. Digital evi...
Article
A convertible authenticated encryption (CAE) scheme allows the signer to generate a valid authenticated ciphertext on his chosen message such that only the designated recipient can retrieve the message. Further, the recipient has the ability to convert the authenticated ciphertext into ordinary signature in case of a dispute or repudiation. The pre...
Conference Paper
Full-text available
Establishing secure communication among a group of phys- ically collocated people is a challenge. This problem can be reduced to establishing authentic public keys among all the participants - these public keys then serve to establish a shared secret symmetric key for encryption and authenti- cation of messages. Unfortunately, in most real-world se...
Conference Paper
The rapidly evolving age of information network is changing our lives without our awareness. With the development of information communication technology (ICT) and cybercrime (Internet crime) intelligence, modern judicature (including criminal, civil and administrative) must carry out litigation by using technology; especially in dealing with organ...
Conference Paper
This study aimed at enhancing the interoperability of a SOC (security operation center) to heterogeneous IDSes (intrusion detection systems) by designing a few EDMEF (intrusion detection message exchange format) templates. The adopted approach based on the specification of IDMEF and the need of incident detection. The resulted templates have two ty...
Article
In this paper, we will propose two identity-based society oriented signature schemes that allow a group of co-signers to collaboratively generate a single signature for a message. The first proposed scheme is designated with known signers and the second scheme is with anonymous signers. Both schemes make use of pairings on elliptic curves in constr...
Conference Paper
We propose a joint window nonadjacent form for the simultaneous scalar multiplication on an elliptic curve. That algorithm is useful for digital signature verification applications and smart card applications. We also give an analysis of the joint Hamming weight.
Chapter
Password-only authenticated key agreement (or PAKA for short) protocols allow communication parties to mutually authenticate with each other and share an authenticated secret key by only using easy-to-remember passwords. In this paper, we present a point-to-point PAKA protocol (or 2-PAKA for short) based on self-certified approach. The proposed 2-P...
Article
Full-text available
A structured multisignature scheme is an order-sensitive multisignature scheme that allows participating signers to sign messages in compliance with a specified signing order. It has been shown that the Burmester et al. order-sensitive multisignature scheme cannot prevent all signers producing a valid multisignature without following the specified...
Article
Elaborating on Shamir’s (t, n) threshold scheme and ElGamal’s digital signature scheme, we propose a group-oriented signature with distinguished signing authorities. The proposed scheme works under the following restrictions: (1) the signing document can be divided into any t smaller subdocuments in such a way that each subdocument is meaningful an...
Conference Paper
Full-text available
At the conference Asiacrypt 2001, Rivest, Shamir and Tauman firstly addressed the concept of ring signature. We propose an identity-based ring signature scheme from bilinear pairings. As compared with the Zhang-Kim scheme (presented at the conference Asiacrypt 2002), our scheme is more efficient in computation and requires fewer pairing operations.
Article
Full-text available
Recently, W. C. Ku and S. D. Wang [Cryptanalysis of modified authenticated key agreement protocol, Elect. Lett. 36, 1770-1771 (2000)] showed that Y. M. Tseng’s [Weakness in simple authenticated key agreement protocol, Elect. Lett. 36, 48-49 (2000)] modified authenticated key agreement protocol is vulnerable to two attacks and proposed an improvemen...
Article
Full-text available
In this paper, the authors propose a new structured multisignature scheme that considers the signing order among co-signers. The proposed scheme can resolve signing structures of serial, parallel, and the mix of them. Moreover, the size and the verification of a structured multisignature is the same as those of an individual signature generated by...
Article
Shieh et al. proposed two multisignature schemes for message recovery -the parallel multisignature scheme and the serial multisignature scheme - for authenticating delegates in mobile code systems. In this paper, we will show that Shieh et al.'s multisignature schemes are vulnerable to insider forgery attacks hence cannot achieve the security requi...
Article
Recently, H. M. Sun, N. Y. Lee and T. Hwang [Threshold proxy signatures, IEE Proc. Comput. Digital Techniques 146, 259-263 (1999)] pointed out some weaknesses of Zhang’s threshold proxy signature scheme and a disadvantage of Kim’s threshold proxy signature scheme. They further proposed a new (t,n) threshold proxy signature scheme based on Zhang’s s...
Article
Full-text available
The authors give a counterexample to show that the RSA-based cryptosystem with low exponent proposed by Lee and Chang (Computer Communications 21 (1998)) is vulnerable to the low exponent attack with respect to their suggested lower boundary for the size of the public encryption key. That is, an eavesdropper can recover the plaintext from the ciphe...
Article
ElGamal's cryptoscheme has a security weakness where, if an encrypter or a signer uses the same randomly chosen integer more than once for generating a ciphertext or a signature, then the scheme may be broken under such fortuitous awareness. This paper presents two modifications of ElGamal's cryptoscheme that can eliminate the weakness. The first m...
Article
Recently, Wang et al. proposed a (t,n) threshold signature scheme with (k,l) threshold shared verification and a group-oriented authenticated encryption scheme with (k,l) threshold shared verification. However, this article will show that both the schemes violate the requirement of the (k,l) threshold shared verification. Further, two improvements...
Article
Full-text available
The authors propose two multi-proxy signature schemes for partial delegation, in which the original signer can delegate his signing power to a set of proxy signers. One of the proposed schemes is designated on the proxy-unprotected approach and the other is on the proxy-protected approach. Both proposed schemes satisfy the basic properties for part...

Network