Chih-Yin Lin

Learn More
At the conference Asiacrypt 2001, Rivest, Shamir and Tauman firstly addressed the concept of ring signature. We propose an identity-based ring signature scheme from bilinear pairings. As compared with the Zhang-Kim scheme (presented at the conference Asiacrypt 2002), our scheme is more efficient in computation and requires fewer pairing operations.
In this paper, the authors propose a new structured multisignature scheme that considers the signing order among co-signers. The proposed scheme can resolve signing structures of serial, parallel, and the mix of them. Moreover, the size and the verification of a structured multisignature is the same as those of an individual signature generated by any(More)
Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. After Mambo et al.’s first scheme was announced, many proxy signature schemes and various types of proxy signature schemes have been proposed. Due to the various applications of the bilinear pairings in cryptography, there are many IDbased signature(More)
Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. After Mambo et al.’s first scheme was announced, many proxy signature schemes and various types of proxy signature schemes have been proposed. Due to the various applications of the bilinear pairings in cryptography, there are many IDbased signature(More)
In this paper, we will propose two identity-based society oriented signature schemes that allow a group of co-signers to collaboratively generate a single signature for a message. The first proposed scheme is designated with known signers and the second scheme is with anonymous signers. Both schemes make use of pairings on elliptic curves in construction(More)
The N-glycans of recombinant glycoproteins expressed in insect cells mainly contain high mannose or tri-mannose structures, which are truncated forms of the sialylated N-glycans found in mammalian cells. Because asialylated glycoproteins have a shorter half-life in blood circulation, we investigated if sialylated therapeutic glycoprotein can be produced(More)
The authors propose two multi-proxy signature schemes for partial delegation, in which the original signer can delegate his signing power to a set of proxy signers. One of the proposed schemes is designated on the proxyunprotected approach and the other is on the proxyprotected approach. Both proposed schemes satisfy the basic properties for partial(More)
A secure logging mechanism named haplog is proposed. In essence, haplog uses only one-way hash functions to achieve the security and functional requirements of logging. This makes haplog more concise and efficient than schemes previously proposed. In addition, haplog considers that all events logged as log entries should be private and only the system can(More)