C
Chun-I Fan
Researcher at National Sun Yat-sen University
Publications - 153
Citations - 2416
Chun-I Fan is an academic researcher from National Sun Yat-sen University. The author has contributed to research in topics: Encryption & Authentication. The author has an hindex of 22, co-authored 144 publications receiving 2010 citations. Previous affiliations of Chun-I Fan include National Taiwan University & Chunghwa Telecom.
Papers
More filters
Journal ArticleDOI
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid
TL;DR: This paper presents a secure power-usage data aggregation scheme for smart grid, which is the first scheme against internal attackers, and it provides secure batch verification.
Journal ArticleDOI
A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid
TL;DR: A practical privacy-preserving data aggregation scheme is proposed without TTP, in which the users with some extent trust construct a virtual aggregation area to mask the single user's data, and meanwhile, the aggregation result almost has no effect for the data utility in large scale applications.
Journal ArticleDOI
Robust remote authentication scheme with smart cards
TL;DR: This paper proposes a new remote login scheme using smart cards to satisfy the low-computation requirement for smart cards, but also it can withstand the replay and the offline dictionary attacks as well.
Journal ArticleDOI
Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics
Chun-I Fan,Yi-Hui Lin +1 more
TL;DR: The proposed scheme fully preserves the privacy of the biometric data of every user, that is, the scheme does not reveal theBiometric data to anyone else, including the remote servers, through the GNY (Gong, Needham, and Yahalom) logic.
Journal ArticleDOI
Anonymous Multireceiver Identity-Based Encryption
TL;DR: An anonymous multireceiver identity-based encryption scheme where Lagrange interpolating polynomial mechanisms are adopted to make it impossible for an attacker or any other message receiver to derive the identity of a message receiver such that the privacy of every receiver can be guaranteed.