342 Hits in 2.0 sec

A New Knapsack Public-Key Cryptosystem Based On Permutation Combination Algorithm

Min-Shiang Hwang, Cheng-Chi Lee, Shiang-Feng Tzeng
2009 Zenodo  
Hwang, Cheng-Chi Lee, and Shiang-Feng Tzeng I World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering Vol:3, No:9, 2009 2291 International  ...  original sequence, the Permutation Combination Algorithm can generate a series of permutations developed from the original A New Knapsack Public-Key Cryptosystem Based on Permutation Combination Algorithm Min-Shiang  ... 
doi:10.5281/zenodo.1330019 fatcat:te32itk52rdgvajl6tzvtksdpa


2011 Parallel Processing Letters  
In this article, we proposed a batch verification scheme for multiple proxy signatures to reduce the proxy signature verification time. The proposed scheme is not only efficient because it does not verify each individual proxy signature separately, but also secure because it can detect forged multiple proxy signatures without failure.
doi:10.1142/s0129626411000084 fatcat:xvl76zjsszhyvnf6y2utpfeuvq

Generalization of proxy signature based on elliptic curves

Min-Shiang Hwang, Shiang-Feng Tzeng, Chwei-Shyong Tsai
2004 Computer Standards & Interfaces  
In the past, proxy signature schemes were usually proposed to deal with one or two separate proxy conditions each. To make a difference, in this paper, the authors shall present a generalized version of proxy signature scheme. Compared to earlier proxy signature schemes, our novel scheme can be applied to every possible proxy situation. The proposed scheme allows the original group of original signers to delegate their signing capability to a designated proxy group. The proxy group of proxy
more » ... group of proxy signers can cooperatively generate a proxy signature on behalf of the original group. Any verifier can verify the proxy signature on the message with the knowledge of the identities of the actual original signers and the actual proxy signers. With this article, we also aim to demonstrate how to specify proxy signature schemes on elliptic curve over finite fields. In addition, some possible attacks have also been considered, and our security analysis will show that none of them can successfully break the proposed scheme.
doi:10.1016/s0920-5489(03)00075-8 fatcat:63jqs76lufbwhnhbmotcptolse

Improved Non‐Repudiable Threshold Proxy Signature Scheme with Known Signers

Chwei‐Shyong Tsai, Shiang‐Feng Tzeng, Min‐Shiang Hwang
2003 Informatica  
Pagerinta neatsisakomo slenkstinio igaliotojo parašo schema su žinomais parašo pateikėjais Chwei-Shyong TSAI, Shiang-Feng TZENG, Min-Shiang HWANG m.  ...  ., 2001; Hwang et al., 2000; Hwang et al., 2002b; Kim et al., 1997; Sun, 1999; Zhang, 1997) .  ... 
doi:10.15388/informatica.2003.029 fatcat:awgkmwcxpbcptdkq2mrquedmtm

A new convertible authenticated encryption scheme with message linkages

Shiang-Feng Tzeng, Yuan-Liang Tang, Min-Shiang Hwang
2007 Computers & electrical engineering  
Message recovery phase 72 Please cite this article as: Shiang-Feng Tzeng et al., A new convertible authenticated encryption scheme ..., Computers and Electrical Engineering (2006), doi:10.1016/j.compeleceng  ... 
doi:10.1016/j.compeleceng.2006.02.005 fatcat:hgjzggz2fzdmbdztir66vzkzsm

A Fair Non-Transfer Exchange Protocol

Cheng-Chi Lee, Min-Shiang Hwang, Shu-Yin Hsiao
2009 Zenodo  
Hwang is with the Department of Management Information Systems, National Chung Hsing University, e-mail: S. Y.  ... 
doi:10.5281/zenodo.1072119 fatcat:tbkbm6m7dvbsflcxdzkabtsjjy

Improvement of signature scheme based on factoring and discrete logarithms

Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang
2005 Applied Mathematics and Computation  
Laih and Kuo proposed two efficient signature schemes based on discrete logarithms and factorization. However, their schemes require many keys for a signing document. In this article, we shall propose an improvement of Laih and KuoÕs signature schemes. The improved scheme will outperform their schemes in the number of keys.
doi:10.1016/j.amc.2003.12.008 fatcat:4vddaudwmncfre5sbu6utvwh6a

A new digital signature scheme based on factoring and discrete logarithms

Shiang-Feng Tzeng, Cheng-Ying Yang, Min-Shiang Hwang
2004 International Journal of Computer Mathematics  
In 1996, Lee and Hwang [14] pointed out that Harn's digital signature scheme [11] would not be secure if the DL problem could be solved.  ... 
doi:10.1080/00207160310001614954 fatcat:ucphg73prrd7vcrubhvziaylqq

Multilevel secure database encryption with subkeys

Min-Shiang Hwang, Wei-Pang Yang
1997 Data & Knowledge Engineering  
In this paper, we propose a multilevel database encryption system with subkeys. This new system is called the record-oriented cryptosystem which encrypts each record with different field-subkeys according to a security class of the data element. Each field is decrypted individually by the field-subkeys of which security class is higher than or equal to that of the encrypted field-subkeys. This system is based on the Chinese Remainder Theorem. Our scheme can protect the finest level of
more » ... level of granularity such as relation level, attribute level, tuple level, or data element level in the relational database model.
doi:10.1016/s0169-023x(96)00040-7 fatcat:lf6awxoo5bbfjokyxv4y4antd4

Digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem

Shiang-Feng Tzeng, Min-Shiang Hwang
2004 Computer Standards & Interfaces  
Without increasing communication cost, Hwang et al. [12] proposed an authenticated encryption scheme with message linkages based on Horster et al.'s scheme.  ... 
doi:10.1016/s0920-5489(03)00069-2 fatcat:ch4qiwkfubhntimkeyyeinez3m


2009 International Journal of Foundations of Computer Science  
Hwang & S.-F. Tzeng C. C. Lee, M.-S. Hwang & S.-F. Tzeng C. C. Lee, M.-S. Hwang & S.-F. Tzeng  ...  Hwang & S.-F. Tzeng MFig. 2 . 2 = c(ry A ) xB mod p (c,r,s) s = k + x A h(M, r) The proposed scheme.  ... 
doi:10.1142/s0129054109006607 fatcat:eemupcpjffgutdhfsnzklp6uwu

An improved address ownership in mobile IPv6

Min-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong
2008 Computer Communications  
doi:10.1016/j.comcom.2008.05.011 fatcat:wdtjnbtndzec7gxunizb54n5xy

Improved Yen–Joye's authenticated multiple-key agreement protocol

Min-Shiang Hwang, Chih-Wei Lin, Cheng-Chi Lee
2002 Electronics Letters  
Hwang, Chih-Wei Lin and Cheng-Chi Lee  ...  (4) Improved YenJoye's authenticated I-(Lm) multiple-key agreement protocol Now, define 6 = d/(m( 1 + d )) and P = ym( 1 + d ), where d = E,/No, then the error probability can be written as Min-Shiang  ... 
doi:10.1049/el:20020998 fatcat:ch75jwyyifggxjiiowif3ttkvm

Password Authenticated Key Exchange and Protected Password Change Protocols

Ting-Yi Chang, Min-Shiang Hwang, Chou-Chen Yang
2017 Symmetry  
Unfortunately, in 2003, Lin and Hwang [15] and Yang et al.  ...  On the other hand, the public-key cryptosystem exists in the Lin-Hwang scheme and Yang et al.'s scheme.  ... 
doi:10.3390/sym9080134 fatcat:wsnwfz6dzjft7h5ryrnxjesoli

A Reversible Hiding Technique Using LSB Matching for Relational Databases

Min-Shiang Hwang, Ming-Ru Xie, Chia-Chun Wu
2020 Informatica  
Hwang has published over 300+ articles on the above research fields in international journals. Funding M.-R.  ...  Hwang was a dean of College of Computer Science, Asia University (AU), Taichung, Taiwan. He is currently a chair professor with Department of Computer Science and Information Engineering, AU.  ... 
doi:10.15388/20-infor411 fatcat:67lnhyq22nhwtl3u5p34jyrshi
« Previous Showing results 1 — 15 out of 342 results