Learn More
Through the explosive growth of network technologies, electronic commercial businesses have made our lives easier and more convenient. The application of e-coupons is quite a novel issue but is becoming increasingly popular among electronic commercial businesses because the extensive use of e-coupons can help consumers to save money; however, the e-coupon(More)
Mobile users can roam into foreign networks and transmit messages to foreign agents, and they can access the services provided by a foreign agent by using their mobile devices. Thus, mobile user authentication and key agreement for wireless communications are becoming more and more important. In recent years, most of the existing user authentication and(More)
The certificateless-based signature system allows people to verify the signature without the certificate. For this reason, we do not need the certificate authority (CA) to store and manage users’ certificates and public keys. Certificateless-based signature can also overcome the certificate management problem and the key escrow problem of the traditional(More)
Secret sharing is a technique that can distribute partial secret information (also called 'shares') to a specific group member. These individual shares are of no use on their own, but they can reconstruct the original secret information when the members collect all of the shares. In this paper, we proposed a novel, polynomial-based, secret sharing scheme(More)
Nowadays, multi-server remote user authentication schemes have been studied extensively in the literature. Recently, Chuang and Chen proposed a multi-server authentication scheme based on trust computing using smart cards and biometrics. Their scheme is more efficient and can achieve more security requirements than other related schemes. However, we found(More)
In 2012, Yeh and Tsaur proposed an advanced scheme for access control in mobile pay-TV systems based on pairing and elliptic curve, which were inherent in the cryptography of Sun and Leu’s scheme. In their paper, they pointed out two weaknesses in Sun and Leu’s scheme and tried to overcome these weaknesses. However, we still found that Yeh and Tsaur’s(More)
As we all know, security is an integral part of every technology and implementation today. In this IT driven society, cryptography is perhaps the most widespread form of secure communication. Authentication using RSA and chaotic map is basically the mechanism to help in establishing the proof of identities. The baker’s map is used for generating random(More)
The most common method to achieve security in multi-party communication is to provide a session key to encrypt messages transmitted among the parties. A three-party authenticated key exchange (3PAKE) protocol can allow two clients to authenticate each other’s validity and establish a common session key with the help of a trusted server. In recent years,(More)