Match!
Te Yu Chen
2Publications
1H-index
5Citations
Publications 2
Newest
#1Manoj Kumar ChandeH-Index: 1
#2Te Yu ChenH-Index: 1
Last.Cheng-Chi Lee (FJU: Fu Jen Catholic University)H-Index: 28
view all 3 authors...
Zhang and Xiao presented a multi-signature scheme for a specified group of verifiers and showed that forging their signature is mathematically equivalent to forge Harn's signature. However, Zhang and Xiao's scheme is not secure against the rogue-key attack. In this paper, we show how to mount a rogue-key attack on Zhang and Xiao's scheme and propose an improved multi-signature scheme for a specified group of verifiers. Our new scheme not only inherits the advantages of Zhang and Xiao's scheme, b...
Source
Sep 6, 2012 in ITC (International Test Conference)
#1Cheng-Chi Lee (FJU: Fu Jen Catholic University)H-Index: 28
#2Rui Xiang ChangH-Index: 1
Last.Lung Albert Chen (Asia University (Japan))H-Index: 4
view all 4 authors...
A new delegation-based authentication protocol was proposed by Lee and Yeh in 2005, claiming that they have provided users with Portable Communication Systems (PCS), which are anonymity and non-repudiation. However, they have also pointed out that their protocol has a weakness in off-line authentication processes. That is, a malicious who visits location register ( VLR ) can masquerade another mobile user to login to home location register ( HLR ). To solve this weakness, Lee et al. later on pro...
5 CitationsSource
1