The search functionality is under construction.

Author Search Result

[Author] Ching-Te WANG(3hit)

1-3hit
  • Generalization of Threshold Signature and Authenticated Encryption for Group Communications

    Ching-Te WANG  Chin-Chen CHANG  Chu-Hsing LIN  

     
    PAPER-Information Security

      Vol:
    E83-A No:6
      Page(s):
    1228-1237

    In this paper, we propose an idea of the generalization of threshold signature and authenticated encryption for group communications. The concept of the (t, n) threshold signature with (k, l) shared verification is implemented in group-oriented cryptosystems. In the system, any t members can represent a group to sign a message and any k verifiers can represent another group to authenticate the signature. By integrating the cryptographic techniques of data encryption, digital signature and message recovery, a group-oriented authenticated encryption scheme with (k, l) shared verification is also proposed. The message expansion and communication cost can also be reduced in our schemes.

  • A Robust Watermarking System Based on the Properties of Low Frequency in Perceptual Audio Coding

    Ching-Te WANG  Tung-Shou CHEN  Zhen-Ming XU  

     
    PAPER-Multimedia Environment Technology

      Vol:
    E87-A No:8
      Page(s):
    2152-2159

    In this paper, we will propose a robust watermarking system for digital audio sound to protect the copyright of publication and claim of ownership. The proposed watermarking scheme uses the frequency extent between 1 Hz and 20 Hz, which cannot be heard by the unaided human ear, to embed the watermark. Thus, the original audio quality will not be influenced by the watermark. Currently, the techniques of Perceptual Audio Coder contain MPEG-1, -2, -2.5, MPEG-2 AAC, MPEG-4 AAC and Window Media Audio. From experimental results, the proposed watermarking system can resist attacks of previous audio coders and low bit-rate compression. The watermark is extracted with 100% correction after previous encoder attacks. Furthermore, to authenticate the audio signal, the system can quickly extract the watermark without the knowledge of original audio signals.

  • Conference Key Supervision in a Level-Based Hierarchy

    Ching-Te WANG  Chin-Chen CHANG  Chu-Hsing LIN  

     
    PAPER-Information Security

      Vol:
    E81-A No:10
      Page(s):
    2219-2227

    In this paper, we propose a new conference key distribution scheme and the supervision of a conference when users are in a level-based hierarchy. In a conference key distribution system, one message is transmitted to the participants from a chairman, a legitimate member can decrypt it and reveal the common session key. The proposed scheme can be implemented without using any tamper-proof hardware. For users in a level-based hierarchy, by applying the key distribution scheme, the higher priority users can derive the conference key and supervise the lower level users' communications. Further, the users in the same level who are not members of the conference or in lower levels can not expose the conference key. To break the common session key, a malicious user has to suffer from the difficulty of factorization and discrete logarithm problems.