Tzonelih Hwang’s research while affiliated with National Cheng Kung University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (233)


Secure Authentication in an IoT-Based Healthcare Environment with Strong Anonymity and Unclonable Device
  • Conference Paper

September 2023

·

24 Reads

·

Tzonelih Hwang

Proposed TPALQKD protocol
Proposed TPALQD protocol
Three-party authenticated lightweight quantum key distribution without pre-shared key between participants
  • Article
  • Publisher preview available

August 2023

·

34 Reads

·

2 Citations

Quantum Information Processing

This paper proposes a three-party authenticated lightweight quantum key distribution (TPALQKD) protocol. By utilizing a semi-honest third party (TP), the proposed protocol enables two lightweight participants to share a secret key without pre-share keys or establish any quantum channel between them. Compared with existing similar research, the proposed TPALQKD protocol reduces the quantum burden of participants, lowers the trustworthiness level required for the TP, and improves qubit efficiency. Furthermore, the proposed TPALQKD protocol has been extended to a quantum dialogue. The security analysis shows that the proposed protocol is robust against collective attacks.

View access options






The relationships among n, m, and l.
Double C-NOT Attack on a Single-State Semi-Quantum Key Distribution Protocol and Its Improvement

August 2022

·

20 Reads

·

4 Citations

Recently, Zhang et al. proposed a single-state semi-quantum key distribution protocol to help a quantum participant share a secret key with a classical participant. However, this study shows that an eavesdropper can use a double C-NOT attack to obtain parts of the final shared key without being detected by the participants. To avoid this problem, a modification is proposed here.


Untraceable and Unclonable Sensor Movement in the Distributed IoT Environment

January 2022

·

6 Reads

·

1 Citation

IEEE Sensors Journal

This disruptive era has a significant impact on the developing technologies in human beings, such as Internet of Things (IoT). IoT allows people and devices to transmit their data, hence intelligent environments, such as intelligent healthcare system, smart transportation, smart city, etc, are invented. Unfortunately, the wireless-based communication used by IoT offers opportunities for an adversary to eavesdrop, delete, and alter the data transmitted to each device. In additional, the adversary can perform severe attacks, such as cloning, impersonation, and others. On the other hand, IoT opens a new challenge for achieving the security properties in preserving privacy in untraceable and unclonable device movement. This paper proposes the unclonable and untraceable sensor movement in the distributed IoT environments to resolve the aforementioned problems. The informally and formally analyses are used to ensure that our proposed protocol has achieved security features and withstood from various attacks. A comparison with the related protocols in the computational complexity will make our proposed protocol suitable for the IoT environment.


The proposed ASQKD protocol
Measure-resend authenticated semi-quantum key distribution with single photons

August 2021

·

23 Reads

·

9 Citations

Quantum Information Processing

This paper proposes a new measure-resend ASQKD protocol. The proposed ASQKD protocol uses only single photons, needs fewer pre-shared keys and even provides better qubit efficiency than the state-of-the-art ASQKD protocols. The security proof shows the robustness of the proposed protocol under the collective attack.


Citations (73)


... Based on thorough comparisons and performance-and security-focused findings, it can be concluded that the suggested MFA approach protects user credentials from unauthorized parties and is resistant to threats that have [50] Chen and Chen [51] Sudhakar et al. [52] Google 2-step [6] Cho et al. [63] Vermadel et al's OffPAD [22] Aman et al. [49] Nyangaresi and Yenurkar [61] Saqib et al. [64] Han et al. [53] Proposed Model: SMFA This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and content may change prior to final publication. ...

Reference:

SMFA: Strengthening Multi-Factor Authentication With Steganography for Enhanced Security
Provably Secure Authentication for the Internet of Vehicles

Journal of King Saud University - Computer and Information Sciences

... The proposed protocol adopts this definition. In the same year, Liu et al. [37] followed this definition to design a three-party lightweight QKD protocol. Notably, the current research on lightweight semi-quantum or lightweight quantum environment concepts proposed by Hwang et al. predominantly focus on three-party systems [23,25,27,[36][37][38]. ...

Three-party authenticated lightweight quantum key distribution without pre-shared key between participants

Quantum Information Processing

... Subsequent semi-quantum research based on these unitary operations introduced the concept of lightweight semi-quantum [33][34][35], further reducing the quantum capabilities required by classical users. In 2023, Hwang et al. [36] defined the environmental settings for lightweight quantum protocols, indicating that lightweight quantum operations include: (1) reflecting photons without disturbance, (2) performing unitary operations on single photons, (3) measuring photons in a Z-basis, and (4) preparing photons in a Z-basis. In lightweight quantum protocols, at least one user can use only two of these four lightweight quantum operations. ...

Lightweight Mediated Quantum Key Distribution
  • Citing Article
  • June 2023

Optik

... The revocation algorithm employs ABE to encrypt and decrypt parameters related to revocation, ensuring both forward and backward secrecy [22]. The algorithm mentioned earlier utilizes the "Action_list" to carry out either partial or complete revocation. ...

A Secure Lightweight Authentication Scheme in IoT Environment with Perfect Forward and Backward Secrecy
  • Citing Conference Paper
  • October 2022

... In 2023, Shi [32] proposed an SQD that utilizes the properties of hyperentangled Bell states to communicate. Also, in 2023, Shi [33] found that the scheme in [31] could not resist the double CNOT attack [5,[33][34][35][36][37][38][39][40][41] and proposed a corresponding improvement method to effectively improve the security of the original protocol. ...

Double C-NOT Attack on a Single-State Semi-Quantum Key Distribution Protocol and Its Improvement

... The environment for SQKD protocols, based on the capabilities of classical users, can be divided into three types: measure-resend [17][18][19][20][21][22][23][24][25][26][27][28], randomization-based [17,18,21,24], and measurement-free [29]. That is, the classical users possess the capabilities (1), (2), and (4); (1), (3), and (4); and (2), (3), and (4) for the measure-resend, randomization-based, and measurement-free environments, respectively. ...

Measure-resend authenticated semi-quantum key distribution with single photons

Quantum Information Processing

... Bidirectional controlled quantum teleportation may be employed to transport quantum states in a quantum network. Communication in quantum network, indispensably, necessitates the diverse kind of exchange of quantum Page 3 of 14 118 states possessed by parties such as asymmetric bidirectional quantum teleportation [30][31][32] cyclic quantum teleportation [33,34], cyclic controlled quantum teleportation [35][36][37], multidirectional quantum teleportation in DV-regime [38,39]. ...

On the Controlled Cyclic Quantum Teleportation of an Arbitrary Two-Qubit Entangled State by Using a Ten-Qubit Entangled State

International Journal of Theoretical Physics

... TP is generally assumed to be semi-honest; that is, she may be curious about the 'classical' users' private data and may attempt to eavesdrop, but she will not collude with any 'classical' user. In recent years, SQPC has gradually gained attention from researchers and many works have been proposed [14][15][16][17][18][19][20][21][22][23][24][25][26][27][28]. ...

Efficient semi-quantum private comparison using single photons

Quantum Information Processing