Hung Yu Chien | National Chi Nan University (original) (raw)

Papers by Hung Yu Chien

Research paper thumbnail of Convertible Authenticated Encryption Scheme Without Using Conventional One-Way Function

Informatica (lithuanian Academy of Sciences), 2003

An authenticated encryption allows the designated recipient to verify the authenticity while reco... more An authenticated encryption allows the designated recipient to verify the authenticity while recovering the message. To protect the recipient's benefit in case of a later dispute, a convertible authenticated encryption scheme allows the recipient to convert the authenticated encryption into an ordinary signature so that it becomes a publicly verifiable. This paper shows a universal forgery attack on Araki et al.'s convertible authenticated encryption scheme, and proposes a new convertible authenticated encryption scheme. Without using any conventional one-way function, the proposed scheme simplifies its security assumption on only a public hard problem -the discrete logarithm problem.

Research paper thumbnail of A hybrid authentication protocol for large mobile network

Journal of Systems and Software, 2003

ABSTRACT As the rapid development of wireless LAN and mobile network layer protocol Mobile-IP, a ... more ABSTRACT As the rapid development of wireless LAN and mobile network layer protocol Mobile-IP, a mobile user is allowed to access the service at the visited domain after he has been authenticated. The designing criteria of the inter-domain authentication protocols include: the scalability, the communication efficiency and the computational efficiency, and the robustness of security. In this article, we first show the weakness of some existing protocols against the session key compromise, and then propose a new and efficient inter-domain authentication protocol. Based on public key, challenge–response and hash chaining, this new approach simultaneously achieves several practical merits: (1) good scalability, (2) low communication cost and low computational cost, and (3) resistance to the session key compromise attack.

Research paper thumbnail of Improved ID-based security framework for ad hoc network

Ad Hoc Networks, 2008

As mobile devices with wireless communication capacity become more and more popular, the study on... more As mobile devices with wireless communication capacity become more and more popular, the study on ad hoc networks that offer convenient infrastructure-free communication has arose the attention from both the academic and the industry. However, the previous security schemes proposed for ad hoc networks either suffer from the structure support problems or have security flaws. This paper examines the weaknesses of a Bohio-Miri's recent work, and then proposes our new schemes to enhance the security and the performance. The security of the proposed protocols is proved in the random oracle model.

Research paper thumbnail of SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity

IEEE Transactions on Dependable and Secure Computing, 2007

As low-cost RFIDs become more and more popular, it is imperative to design ultralightweight RFID ... more As low-cost RFIDs become more and more popular, it is imperative to design ultralightweight RFID authentication protocols to resist all possible attacks and threats. However, all of the previous ultralightweight authentication schemes are vulnerable to various attacks. In this paper, we propose a new ultralightweight RFID authentication protocol that provides strong authentication and strong integrity protection of its transmission and of updated data. The protocol requires only simple bit-wise operations on the tag and can resist all the possible attacks. These features make it very attractive to low-cost RFIDs and very low-cost RFIDs.

Research paper thumbnail of On the Security of Methods for Protecting Password Transmission

Informatica (lithuanian Academy of Sciences), 2001

proposed a password transmission scheme and a password change scheme over an insecure network. Th... more proposed a password transmission scheme and a password change scheme over an insecure network. Their proposed solutions do not require the use of any symmetric-key or public-key cryptosystems. However, this article points out that their schemes have several security flaws for practical applications. A slight improvement on their schemes is proposed in this paper to remove the security flaws.

Research paper thumbnail of A Remote Authentication Scheme Preserving User Anonymity

Many smart card-based remote authentication schemes have been proposed, due to its convenience an... more Many smart card-based remote authentication schemes have been proposed, due to its convenience and secure computation of the smart card. However, these schemes didn't protect the users' identities while authenticating the users, even though user anonymity is an important issue in many ...

Research paper thumbnail of Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing

... the bilinear pairing, BDH assumption, ID-based public key infrastructure (PKI) and a framewor... more ... the bilinear pairing, BDH assumption, ID-based public key infrastructure (PKI) and a framework about UAV ... Each node i U (an MBN nodes, a UAV node or a ground MANET node ... They can use this key to authenticate each other and encrypt the communications between them. ...

Research paper thumbnail of Two RFID-based Solutions to Enhance Inpatient Medication Safety

Journal of Medical Systems, 2011

Owing to the low cost and convenience of identifying an object without physical contact, Radio Fr... more Owing to the low cost and convenience of identifying an object without physical contact, Radio Frequency Identification (RFID) systems provide innovative, promising and efficient applications in many domains. An RFID grouping protocol is a protocol that allows an off-line verifier to collect and verify the evidence of two or more tags simultaneously present. Recently, Huang and Ku (J. Med. Syst, 2009) proposed an efficient grouping protocol to enhance medication safety for inpatients based on low-cost tags. However, the Huang–Ku scheme is not secure; an attacker can easily make up fake grouping records to cheat the verifier. This weakness would seriously endanger the safety of inpatient medication safety. This paper will show the weaknesses, and then propose two RFID-based solutions to enhance medication safety for two different scenarios. The proposed schemes are practical, secure and efficient for medication applications.

Research paper thumbnail of New hierarchical assignment without Public Key cryptography

Computers & Security, 2003

ABSTRACT The access privileges in many distributed systems can be effectively organized as a hier... more ABSTRACT The access privileges in many distributed systems can be effectively organized as a hierarchical tree. Distributing distinct cryptographic keys to distinct entities, according to their privileges, provides a good solution to the hierarchical access control problem. Many existing key assignment schemes use public key cryptography, which requires lots of costly public key operations and thus leads to a limited degree of deployment. In this paper, we shall propose a new key assignment protocol that employs only a low cost smart card with little memory to perform simple arithmetic operations. Our approach greatly reduces the computational load and the implementation cost. Compared with Lin’s scheme, which is a very efficient scheme without using any public key cryptography, our new scheme further reduces the computational cost by as much as 66% and the quantity of public data by 50%.

Research paper thumbnail of An Efficient and Practical Solution to Remote Authentication: Smart Card

Computers & Security, 2002

The security of the schemes has been improved in several ways. Traditionally, if a user wants to ... more The security of the schemes has been improved in several ways. Traditionally, if a user wants to login to a computer system, he has to submit his identity and its corresponding password to the system. The system then compares the received data with the ones in its stored ...

Research paper thumbnail of Author's personal copy Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices

and sharing with colleagues.

Research paper thumbnail of Convertible Authenticated Encryption Scheme Without Using Conventional One-Way Function

Informatica (lithuanian Academy of Sciences), 2003

An authenticated encryption allows the designated recipient to verify the authenticity while reco... more An authenticated encryption allows the designated recipient to verify the authenticity while recovering the message. To protect the recipient's benefit in case of a later dispute, a convertible authenticated encryption scheme allows the recipient to convert the authenticated encryption into an ordinary signature so that it becomes a publicly verifiable. This paper shows a universal forgery attack on Araki et al.'s convertible authenticated encryption scheme, and proposes a new convertible authenticated encryption scheme. Without using any conventional one-way function, the proposed scheme simplifies its security assumption on only a public hard problem -the discrete logarithm problem.

Research paper thumbnail of A hybrid authentication protocol for large mobile network

Journal of Systems and Software, 2003

ABSTRACT As the rapid development of wireless LAN and mobile network layer protocol Mobile-IP, a ... more ABSTRACT As the rapid development of wireless LAN and mobile network layer protocol Mobile-IP, a mobile user is allowed to access the service at the visited domain after he has been authenticated. The designing criteria of the inter-domain authentication protocols include: the scalability, the communication efficiency and the computational efficiency, and the robustness of security. In this article, we first show the weakness of some existing protocols against the session key compromise, and then propose a new and efficient inter-domain authentication protocol. Based on public key, challenge–response and hash chaining, this new approach simultaneously achieves several practical merits: (1) good scalability, (2) low communication cost and low computational cost, and (3) resistance to the session key compromise attack.

Research paper thumbnail of Improved ID-based security framework for ad hoc network

Ad Hoc Networks, 2008

As mobile devices with wireless communication capacity become more and more popular, the study on... more As mobile devices with wireless communication capacity become more and more popular, the study on ad hoc networks that offer convenient infrastructure-free communication has arose the attention from both the academic and the industry. However, the previous security schemes proposed for ad hoc networks either suffer from the structure support problems or have security flaws. This paper examines the weaknesses of a Bohio-Miri's recent work, and then proposes our new schemes to enhance the security and the performance. The security of the proposed protocols is proved in the random oracle model.

Research paper thumbnail of SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity

IEEE Transactions on Dependable and Secure Computing, 2007

As low-cost RFIDs become more and more popular, it is imperative to design ultralightweight RFID ... more As low-cost RFIDs become more and more popular, it is imperative to design ultralightweight RFID authentication protocols to resist all possible attacks and threats. However, all of the previous ultralightweight authentication schemes are vulnerable to various attacks. In this paper, we propose a new ultralightweight RFID authentication protocol that provides strong authentication and strong integrity protection of its transmission and of updated data. The protocol requires only simple bit-wise operations on the tag and can resist all the possible attacks. These features make it very attractive to low-cost RFIDs and very low-cost RFIDs.

Research paper thumbnail of On the Security of Methods for Protecting Password Transmission

Informatica (lithuanian Academy of Sciences), 2001

proposed a password transmission scheme and a password change scheme over an insecure network. Th... more proposed a password transmission scheme and a password change scheme over an insecure network. Their proposed solutions do not require the use of any symmetric-key or public-key cryptosystems. However, this article points out that their schemes have several security flaws for practical applications. A slight improvement on their schemes is proposed in this paper to remove the security flaws.

Research paper thumbnail of A Remote Authentication Scheme Preserving User Anonymity

Many smart card-based remote authentication schemes have been proposed, due to its convenience an... more Many smart card-based remote authentication schemes have been proposed, due to its convenience and secure computation of the smart card. However, these schemes didn't protect the users' identities while authenticating the users, even though user anonymity is an important issue in many ...

Research paper thumbnail of Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing

... the bilinear pairing, BDH assumption, ID-based public key infrastructure (PKI) and a framewor... more ... the bilinear pairing, BDH assumption, ID-based public key infrastructure (PKI) and a framework about UAV ... Each node i U (an MBN nodes, a UAV node or a ground MANET node ... They can use this key to authenticate each other and encrypt the communications between them. ...

Research paper thumbnail of Two RFID-based Solutions to Enhance Inpatient Medication Safety

Journal of Medical Systems, 2011

Owing to the low cost and convenience of identifying an object without physical contact, Radio Fr... more Owing to the low cost and convenience of identifying an object without physical contact, Radio Frequency Identification (RFID) systems provide innovative, promising and efficient applications in many domains. An RFID grouping protocol is a protocol that allows an off-line verifier to collect and verify the evidence of two or more tags simultaneously present. Recently, Huang and Ku (J. Med. Syst, 2009) proposed an efficient grouping protocol to enhance medication safety for inpatients based on low-cost tags. However, the Huang–Ku scheme is not secure; an attacker can easily make up fake grouping records to cheat the verifier. This weakness would seriously endanger the safety of inpatient medication safety. This paper will show the weaknesses, and then propose two RFID-based solutions to enhance medication safety for two different scenarios. The proposed schemes are practical, secure and efficient for medication applications.

Research paper thumbnail of New hierarchical assignment without Public Key cryptography

Computers & Security, 2003

ABSTRACT The access privileges in many distributed systems can be effectively organized as a hier... more ABSTRACT The access privileges in many distributed systems can be effectively organized as a hierarchical tree. Distributing distinct cryptographic keys to distinct entities, according to their privileges, provides a good solution to the hierarchical access control problem. Many existing key assignment schemes use public key cryptography, which requires lots of costly public key operations and thus leads to a limited degree of deployment. In this paper, we shall propose a new key assignment protocol that employs only a low cost smart card with little memory to perform simple arithmetic operations. Our approach greatly reduces the computational load and the implementation cost. Compared with Lin’s scheme, which is a very efficient scheme without using any public key cryptography, our new scheme further reduces the computational cost by as much as 66% and the quantity of public data by 50%.

Research paper thumbnail of An Efficient and Practical Solution to Remote Authentication: Smart Card

Computers & Security, 2002

The security of the schemes has been improved in several ways. Traditionally, if a user wants to ... more The security of the schemes has been improved in several ways. Traditionally, if a user wants to login to a computer system, he has to submit his identity and its corresponding password to the system. The system then compares the received data with the ones in its stored ...

Research paper thumbnail of Author's personal copy Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices

and sharing with colleagues.