Learn More
Mounting popularity of the Internet has led to the birth of instant messaging, an up-and-coming form of Internet communication. Instant messaging is very popular with businesses and individuals since it has instant communication ability. As a result, Internet security has become a pressing and important topic for discussion. Therefore, in recent years, a(More)
Cryptography is increasingly used in E-commerce, especially in untraceable payment system and electronic voting system. Protocols for these systems require anonymous digital signing, and blind signature is the answer to it. Chaum stated that every blind signature protocol should hold two fundamental properties, blindness and intractableness. All blind(More)
While the traditional public-key encryption schemes with keyword search (PEKS) were pointed out suffering the performance problems, some high-performance PEKS recently have drawn more attentions. Unfortunately, these performance-enhanced schemes could encounter the same security attacks as the traditional PEKS met before. In this paper, Liu et al.'s(More)
Watermarking protocols are designed for tracing illegal distributors when unauthorized copies are found. So far, most of the proposed schemes set up two or more watermarks embedded to a copy by the seller before it was sold. The main potential concerns of multiple watermarking are the image quality would be damaged and any earlier embedded watermarks would(More)
Buyer-seller watermarking protocols, combining digital watermarking and cryptographic tools, have become a feasible technique to guarantee piracy tracing. For securing health information management, watermarking protocols may be introduced to solve the problem of traitor tracing, i.e., tracing the physician who illegally discloses the patient’s health(More)