Icons / Logo / Facebook Created with Sketch. Icons / Logo / Google Created with Sketch. Icons / Logo / ORCID Created with Sketch. Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch. Match!
Te Yu Chen
2Publications
1H-index
3Citations
Publications 2
Newest
Manoj Kumar Chande1
Estimated H-index: 1
,
Te Yu Chen1
Estimated H-index: 1
,
Cheng-Chi Lee27
Estimated H-index: 27
Zhang and Xiao presented a multi-signature scheme for a specified group of verifiers and showed that forging their signature is mathematically equivalent to forge Harn's signature. However, Zhang and Xiao's scheme is not secure against the rogue-key attack. In this paper, we show how to mount a rogue-key attack on Zhang and Xiao's scheme and propose an improved multi-signature scheme for a specified group of verifiers. Our new scheme not only inherits the advantages of Zhang and Xiao's scheme, b...
Published on Sep 6, 2012 in ITC (International Test Conference)
Cheng-Chi Lee27
Estimated H-index: 27
(FJU: Fu Jen Catholic University),
Rui Xiang Chang1
Estimated H-index: 1
+ 1 AuthorsLung Albert Chen3
Estimated H-index: 3
(Asia University (Japan))
A new delegation-based authentication protocol was proposed by Lee and Yeh in 2005, claiming that they have provided users with Portable Communication Systems (PCS), which are anonymity and non-repudiation. However, they have also pointed out that their protocol has a weakness in off-line authentication processes. That is, a malicious who visits location register ( VLR ) can masquerade another mobile user to login to home location register ( HLR ). To solve this weakness, Lee et al. later on pro...
1