scispace - formally typeset
C

Chun-I Fan

Researcher at National Sun Yat-sen University

Publications -  153
Citations -  2416

Chun-I Fan is an academic researcher from National Sun Yat-sen University. The author has contributed to research in topics: Encryption & Authentication. The author has an hindex of 22, co-authored 144 publications receiving 2010 citations. Previous affiliations of Chun-I Fan include National Taiwan University & Chunghwa Telecom.

Papers
More filters
Journal ArticleDOI

Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid

TL;DR: This paper presents a secure power-usage data aggregation scheme for smart grid, which is the first scheme against internal attackers, and it provides secure batch verification.
Journal ArticleDOI

A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid

TL;DR: A practical privacy-preserving data aggregation scheme is proposed without TTP, in which the users with some extent trust construct a virtual aggregation area to mask the single user's data, and meanwhile, the aggregation result almost has no effect for the data utility in large scale applications.
Journal ArticleDOI

Robust remote authentication scheme with smart cards

TL;DR: This paper proposes a new remote login scheme using smart cards to satisfy the low-computation requirement for smart cards, but also it can withstand the replay and the offline dictionary attacks as well.
Journal ArticleDOI

Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics

TL;DR: The proposed scheme fully preserves the privacy of the biometric data of every user, that is, the scheme does not reveal theBiometric data to anyone else, including the remote servers, through the GNY (Gong, Needham, and Yahalom) logic.
Journal ArticleDOI

Anonymous Multireceiver Identity-Based Encryption

TL;DR: An anonymous multireceiver identity-based encryption scheme where Lagrange interpolating polynomial mechanisms are adopted to make it impossible for an attacker or any other message receiver to derive the identity of a message receiver such that the privacy of every receiver can be guaranteed.