94 research outputs found

    Cryptanalysis of the Hwang-Shi Proxy Signature Scheme

    Get PDF
    [[abstract]]Recently, Hwang and Shi proposed an efficient proxy signature scheme without using one-way hash functions. In their scheme, an original signer needn't send a proxy certificate to a proxy signer through secure channels. However, there are two public key substitution methods that can be used to attack their scheme. In this article, we show that their scheme is vulnerable to the public key substitution attacks[[notice]]補正完畢[[journaltype]]國外[[incitationindex]]EI[[booktype]]紙本[[booktype]]電子版[[countrycodes]]NL

    Image Tamper Detection and Recovery by Intersecting Signatures

    Get PDF
    In this paper, we propose an exact image authentication scheme that can, in the best case, detect image tampering with the accuracy of one pixel. This method is based on constructing blocks in the image in such a manner that they intersect with one another in different directions. Such a technique is very useful to identify whether an individual image pixel has been tampered with. Moreover, the tampered region can be well recovered with the embedded recover data

    A remote user authentication scheme using hash functions

    No full text

    Research Issues and Challenges for Multiple Digital Signatures

    No full text
    [[abstract]]In this paper, we surveyed several well-known batch ver- i�cation multiple digital signatures. These schemes can batch verify multiple digital signatures which need only one veri�cation instead of t veri�cations. However, a num- ber of weaknesses of these schemes are pointed out. Ac- cording to our proposed issues and challenges, we com- pared and analyzed them. To sum up these schemes, a secure and e�cient multiple digital signatures scheme which needs only one veri�cation remains an open prob- lem

    Improved Yen-Joye's Authenticated Multiple-key Agreement Protocol

    No full text
    [[abstract]]An authenticated multiple-key agreement protocol is proposed. The protocol is not only secure against the unknown-key attack but also more efficient than other protocols

    An Efficient Multi-Round Anonymous Auction Protocol

    Get PDF
    [[abstract]]In this paper, we shall propose an efficient multi-round anonymous auction protocol. In the many literatures concerned, when more than one party bidding the same highest price for merchandise, all the bidders must re-participate in the auction again. It is inefficient. In this paper, the proposed protocol can make the auction easier. In our system, we first pick out the bidders offering the same highest price as the winners of the first round. Then, all the bidders need not re-participate in the auction again; only the winners of the first round have to come back for the second round

    A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography

    No full text
    [[abstract]]In this article, the authors shall propose a new method for the implementation of secure Bluetooth piconets. Two requirements for the systems must be considered, i.e., privacy and authentication. Privacy ensures that an eavesdropper cannot intercept conversations between two slaves in piconets. Authentication ensures that service is not obtained fraudulently in order to avoid charge for usage. Additionally, a new key distribution scheme is designed for practical implementation in low-cost and low-power Bluetooth piconets. The proposed method employs elliptic curve cryptography for the use in the Bluetooth network. We have proper solutions to Bluetooth devices registration and Bluetooth piconets establishment. Furthermore, compared with Seo and Lee’s protocol, the proposed scheme has a lower computation cost

    A New Anonymous Channel Protocol in Wireless Communications

    No full text
    [[abstract]]In this paper, the authors shall propose a new anonymous channel protocol for wireless communications. Compared with Juang et al.'s protocol and Jan et al.'s protocol, our protocol is more efficient. In addition, our protocol saves the trouble of employing public key cryptography in the anonymous channel ticket authentication phase just as Jan et al.'s protocol
    corecore