International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 20000 results
Cryptanalysis on “Secure untraceable off-line electronic cash system”
Eprint
https://eprint.iacr.org/2014/063
Yalin Chen Jue-Sam Chou*
Recently, Baseri et al. proposed a secure untraceable off-line electronic cash system. They claimed that their scheme could achieve security requirements of an e-cash system such as, untraceability, anonymity, unlinkability,...
received 28 Jan 2014
A Novel ID-based Electronic Cash System from Pairings
Eprint
https://eprint.iacr.org/2009/339
Jue-Sam Chou*1 Yalin Chen2 Ming-Hsun Cho3 Hung-Min Sun4
Recently, Chen et al. and Juang et al. each proposed one and two e-cash payment systems respectively. They claimed that their schemes are secure. However, in this paper, we will present the shortcomings of their schemes and...
received 8 Jul 2009
Crypto-analyses on “user efficient recoverable off-line e-cashs scheme with fast anonymity revoking”
Eprint
https://eprint.iacr.org/2014/046
Yalin Chen1 Jue-Sam Chou*2
Recently, Fan et al. proposed a user efficient recoverable off-line e-cash scheme with fast anonymity revoking. They claimed that their scheme could achieve security requirements of an e-cash system such as, anonymity,...
received 18 Jan 2014
Cryptanalysis of Hwang-Chang’s a Time-Stamp Protocol for Digital Watermarking
Eprint
https://eprint.iacr.org/2007/004
*Jue-Sam Chou Yalin Chen Chung-Ju Chan
In 2005, Hwang et al. [17] proposed a time-stamping protocol for digit watermarking. They claimed that their scheme is secure against attacks. However, in this article, we will show that their scheme is not secure enough for...
received 3 Jan 2007
A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings
Eprint
https://eprint.iacr.org/2006/342
Jue-Sam Chou Yalin Chen Jin-Cheng Huang
In 1997, Cranor and Cytron proposed an electronic voting protocol, Sensus protocol, intended to be applied in a real election. However, in 2005 Fabrizio et.al. pointed out there is a vulnerability exists in their protocol that...
received 10 Oct 2006
Cryptanalysis and Improvement of A New Electronic Traveler’s Check Scheme Based on One-way Hash Function
Eprint
https://eprint.iacr.org/2010/418
*Jue-Sam Chou 1 hsien-ching Chen 2 Chun-Yun Chen 3
Recently, Liaw et al. proposed a hash based electronic traveler’s check system. They claimed that their scheme is secure. However, after analyses, we found that their scheme is vulnerable to key compromise impersonation and...
received 27 Jul 2010
Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach
Eprint
https://eprint.iacr.org/2011/167
Yalin Chen Jue-Sam Chou Cheng-Lun Wu Chi-Fong Lin
In this paper, we propose a new approach to identify a tag of a RFID system in constant time while keeping untraceability to the tag. Our scheme does not use any cryptographic primitives. Instead, we use a line in a plane to...
last revised 11 Apr 2011
Jue-Sam Chou
Author
https://iacr.org/cryptodb/data/author.php?authorkey=3437
Untraceable Off-line Cash in Wallets with Observers (Extended Abstract)
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=1108
Stefan Brands
Crypto 1993
Improved on an improved remote user authentication scheme with key agreement
Eprint
https://eprint.iacr.org/2016/023
Yalin Chen1 Jue-Sam Chou*2 I - Chiung Liao3
Recently, Kumari et al. pointed out that Chang et al.’s scheme “Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update” not only has several drawbacks, but also does not...
received 10 Jan 2016
Improvement of Manik et al.¡¦s remote user authentication scheme
Eprint
https://eprint.iacr.org/2005/450
Jue-Sam Chou Yalin Chen Jyun-Yu Lin
In 2005, Manik et al. propose a novel remote user authentication scheme using bilinear pairings which allows a valid user to login to the remote system but prohibits too many users to login with the same login-ID. It also...
received 9 Dec 2005
A novel multi-server authentication protocol
Eprint
https://eprint.iacr.org/2009/176
Yalin Chen Chun-Hui Huang *Jue-Sam Chou
Recently, Tsai and Hsiang et al. each proposed a multi-server authentication protocol. They claimed their protocols are secure and can withstand various attacks. However, after our analysis, we found some security loopholes in...
received 21 Apr 2009
Crypto-analyses on “secure and efficient privacy-preserving public auditing scheme for cloud storage”
Eprint
https://eprint.iacr.org/2014/723
Yalin Chen Jue-Sam Chou*
Recently, Worku et al. pointed out that the work “privacy-preserving public auditing for data storage security in cloud computing” proposed by Wang et al. is insecure and their second work “privacy- preserving public auditing...
received 16 Sep 2014
A secure anonymous communication scheme in vehicular ad hoc networks from pairings
Eprint
https://eprint.iacr.org/2010/028
*Jue-Sam Chou 1 Yalin Chen 2
Security and efficiency are two crucial issues in vehicular ad hoc networks. Many researches have devoted to these issues. However, we found that most of the proposed protocols in this area are insecure and can’t satisfy the...
received 19 Jan 2010
Comments on two password based protocols
Eprint
https://eprint.iacr.org/2008/400
Yalin Chen Hung-Min Sun Chun-Hui Huang Jue-Sam Chou
Recently, M. Hölbl et al. and I. E. Liao et al. each proposed an user authentication protocol. Both claimed that their schemes can withstand password guessing attack. However, T. Xiang et al. pointed out I. E. Liao et al.'s...
last revised 24 Sep 2008
An Efficient Secure Oblivious Transfer
Eprint
https://eprint.iacr.org/2009/521
Hung-Min Sun Yalin Chen Jue-Sam Chou
As traditional oblivious transfer protocols are treated as a cryptographic primitive, they are usually executed without the consideration of possible attacks, e.g., impersonation, replaying, and man-in-the-middle attacks....
received 9 Oct 2009
A ID-Based Deniable Authentication Protocol on pairings
Eprint
https://eprint.iacr.org/2006/335
Jue-Sam Chou Yalin Chen Jin-Cheng Huang
Recently, Yoon et al. and Cao et al. propose two deniable authentication protocols respectively. They both claim that their protocols can achieve the deniable property. However, in this paper, we will point out that their...
received 4 Oct 2006
A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography
Eprint
https://eprint.iacr.org/2019/024
Yalin Chen Jue-Sam Chou Fang-Qi Zhou
In 2018, Shi et al. 's showed that Kaushik et al.'s quantum signature scheme is defective. It suffers from the forgery attack. They further proposed an improvement, trying to avoid the attack. However, after examining we found...
last revised 20 Jun 2019
Comments on Three Multi-Server Authentication Protocols
Eprint
https://eprint.iacr.org/2013/380
Yalin Chen 1 *Jue-Sam Chou2 Wen-Yi Tsai 3
Recently, Tsai et al., Liao et al. and Li et al. each proposed a multi-server authentication protocol. They claimed their protocols are secure and can withstand various attacks. However, we found some security loopholes in...
received 12 Jun 2013
A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
Eprint
https://eprint.iacr.org/2007/224
*Jue-Sam Chou 1 Guey-Chuen Lee 2 Chung-Ju Chan 3
In 2004, Ari Juels [1] proposed a Yoking-Proofs protocol for RFID systems. The aim is to permit tags to generate a proof which is verifiable off-line by a trusted entity even when the readers are potentially untrusted....
received 11 Jun 2007
Next ►