Learn More
Mobile users can roam into foreign networks and transmit messages to foreign agents, and they can access the services provided by a foreign agent by using their mobile devices. Thus, mobile user authentication and key agreement for wireless communications are becoming more and more important. In recent years, most of the existing user authentication and(More)
The certificateless-based signature system allows people to verify the signature without the certificate. For this reason, we do not need the certificate authority (CA) to store and manage users' certificates and public keys. Certificateless-based signature can also overcome the certificate management problem and the key escrow problem of the traditional(More)
Nowadays, multi-server remote user authentication schemes have been studied extensively in the literature. Recently, Chuang and Chen proposed a multi-server authentication scheme based on trust computing using smart cards and biometrics. Their scheme is more efficient and can achieve more security requirements than other related schemes. However, we found(More)
Secret sharing is a technique that can distribute partial secret information (also called 'shares') to a specific group member. These individual shares are of no use on their own, but they can reconstruct the original secret information when the members collect all of the shares. In this paper, we proposed a novel, polynomial-based, secret sharing scheme(More)
In 2012, Yeh and Tsaur proposed an advanced scheme for access control in mobile pay-TV systems based on pairing and elliptic curve, which were inherent in the cryptography of Sun and Leu's scheme. In their paper, they pointed out two weaknesses in Sun and Leu's scheme and tried to overcome these weaknesses. However, we still found that Yeh and Tsaur's(More)
Authentication is basically a way by which sender and recipient must prove their identities to each other. Image authentication verifies the originality of an image by detecting malicious manipulations. Reliable image authentication technology must be able to protect an image from time it was first produced until the final stage of use. In this paper we(More)