Zum Hauptinhalt springen

Showing 1–17 of 17 results for author: Chen, A C H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.11950  [pdf

    cs.CR cs.PF

    Evaluation of Hash Algorithm Performance for Cryptocurrency Exchanges Based on Blockchain System

    Authors: Abel C. H. Chen

    Abstract: The blockchain system has emerged as one of the focal points of research in recent years, particularly in applications and services such as cryptocurrencies and smart contracts. In this context, the hash value serves as a crucial element in linking blocks within the blockchain, ensuring the integrity of block contents. Therefore, hash algorithms represent a vital security technology for ensuring t… ▽ More

    Submitted 8 August, 2024; originally announced August 2024.

  2. X.509 Information Security Certification Based on Post-Quantum Cryptography

    Authors: Abel C. H. Chen

    Abstract: In recent years, with the advancement of quantum computing, mainstream asymmetric cryptographic methods in the current Public Key Infrastructure (PKI) systems are gradually being threatened. Therefore, this study explores X.509 security certificates based on Post-Quantum Cryptography (PQC) and discusses implemented solutions. This study compares mainstream asymmetric cryptographic methods (includi… ▽ More

    Submitted 4 August, 2024; originally announced August 2024.

    Comments: The manuscript was submitted to arXiv on 6 May 2024, but it was rejected on 11 July 2024. The appeal was submitted on 11 July 2024, and it was accepted on 2 August 2024. The manuscript is written in Chinese language

  3. arXiv:2407.12810  [pdf

    cs.NI

    A Study on the Situation of Connected Car Patent Portfolios

    Authors: Abel C. H. Chen, Chia-Shen Chang

    Abstract: In recent years, the countries of the world have drafted the specifications of connected cars; for instance, the Security Credential Management System (SCMS) has been proposed by United States Department of Transportation (USDOT), and the Cooperative Intelligent Transportation System (C-ITS) Credential Management System (CCMS) has been proposed by European Union (EU). Therefore, several companies… ▽ More

    Submitted 26 June, 2024; originally announced July 2024.

    Comments: in Chinese language

  4. Performance Comparison of Various Modes of Advanced Encryption Standard

    Authors: Abel C. H. Chen

    Abstract: With the maturation of quantum computing technology, many cryptographic methods are gradually facing threats from quantum computing. Although the Grover algorithm can accelerate search speeds, current research indicates that the Advanced Encryption Standard (AES) method can still enhance security by increasing the length of the secret key. However, the AES method involves multiple modes in impleme… ▽ More

    Submitted 21 May, 2024; originally announced July 2024.

    Comments: in Chinese language

  5. arXiv:2404.16837  [pdf

    cs.CR cs.CY cs.SE

    The Security Performance Analysis of Blockchain System Based on Post-Quantum Cryptography -- A Case Study of Cryptocurrency Exchanges

    Authors: Abel C. H. Chen

    Abstract: The current blockchain system for cryptocurrency exchanges primarily employs elliptic curve cryptography (ECC) for generating key pairs in wallets, and elliptic curve digital signature algorithms (ECDSA) for generating signatures in transactions. Consequently, with the maturation of quantum computing technology, the current blockchain system faces the risk of quantum computing attacks. Quantum com… ▽ More

    Submitted 23 January, 2024; originally announced April 2024.

    Comments: in Chinese language

  6. Post-Quantum Cryptography Neural Network

    Authors: Abel C. H. Chen

    Abstract: In recent years, quantum computers and Shor quantum algorithm have posed a threat to current mainstream asymmetric cryptography methods (e.g. RSA and Elliptic Curve Cryptography (ECC)). Therefore, it is necessary to construct a Post-Quantum Cryptography (PQC) method to resist quantum computing attacks. Therefore, this study proposes a PQC-based neural network that maps a code-based PQC method to a… ▽ More

    Submitted 25 February, 2024; originally announced February 2024.

    Comments: 2023 International Conference on Smart Systems for applications in Electrical Sciences (ICSSES) 7-8 July 2023. The manuscript was written in Chinese and submitted on 10 March 2023, but it was rejected on 22 April 2023. The appeal was accepted on 24 February 2024

  7. Homomorphic Encryption Based on Post-Quantum Cryptography

    Authors: Abel C. H. Chen

    Abstract: With the development of Shor's algorithm, some nondeterministic polynomial (NP) time problems (e.g. prime factorization problems and discrete logarithm problems) may be solved in polynomial time. In recent years, although some homomorphic encryption algorithms have been proposed based on prime factorization problems, the algorithms may be cracked by quantum computing attacks. Therefore, this study… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

  8. arXiv:2401.13691  [pdf

    cs.CR cs.NI

    PQCMC: Post-Quantum Cryptography McEliece-Chen Implicit Certificate Scheme

    Authors: Abel C. H. Chen

    Abstract: In recent years, the elliptic curve Qu-Vanstone (ECQV) implicit certificate scheme has found application in security credential management systems (SCMS) and secure vehicle-to-everything (V2X) communication to issue pseudonymous certificates. However, the vulnerability of elliptic-curve cryptography (ECC) to polynomial-time attacks posed by quantum computing raises concerns. In order to enhance re… ▽ More

    Submitted 3 January, 2024; originally announced January 2024.

  9. Performance Analysis of Security Certificate Management System in Vehicle-to-Everything (V2X)

    Authors: Abel C. H. Chen, Cheng-Kang Liu, Chun-Feng Lin, Bon-Yeh Lin

    Abstract: In Vehicle-to-Everything (V2X) communications, providing accurate information and safeguarding the privacy of end entities is one of the crucial information security issues. Therefore, several international standardization organizations have begun to develop V2X communication security standards in recent years. For instance, the IEEE 1609.2.1 standard designs a Security Credential Management Syste… ▽ More

    Submitted 17 September, 2023; originally announced November 2023.

    Comments: in Chinese language

  10. Evaluation and Analysis of Standard Security Technology in V2X Communication -- Exploring ECQV Implicit Certificate Cracking

    Authors: Abel C. H. Chen

    Abstract: In IEEE 1609.2 and IEEE 1609.2.1 standards for Vehicle-to-everything (V2X) secure communication, various security algorithms based on Elliptic Curve Cryptography (ECC) have been adopted and designed. To enhance the efficiency of the Security Credential Management System (SCMS), this study evaluates the computational time for key generation, key expansion, signature generation, and signature verifi… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

    Comments: in Chinese language

  11. arXiv:2307.02408  [pdf

    cs.CR

    The Pseudonymous Certificates for Healthcare Systems

    Authors: Abel C. H. Chen

    Abstract: This study mainly modifies the butterfly key expansion (BKE) mechanism and applies it to the healthcare system. The system mainly includes a Root Certificate Authority (RCA), an Enrollment Certificate Authority (ECA), a Pseudonym Certificate Authority (PCA), a Registration Authority (RA), and End Entities (EEs)(i.e. user devices). Certificates can be issued by the RCA to the ECA, PCA, and RA to ma… ▽ More

    Submitted 23 April, 2023; originally announced July 2023.

    Comments: in Chinese language

  12. Research on Efficiency Analysis of Microservices

    Authors: Abel C. H. Chen

    Abstract: With the maturity of web services, containers, and cloud computing technologies, large services in traditional systems (e.g. the computation services of machine learning and artificial intelligence) are gradually being broken down into many microservices to increase service reusability and flexibility. Therefore, this study proposes an efficiency analysis framework based on queuing models to analy… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

    Comments: in Chinese language

  13. Similarity Calculation Based on Homomorphic Encryption

    Authors: Abel C. H. Chen

    Abstract: In recent years, although some homomorphic encryption algorithms have been proposed to provide additive homomorphic encryption and multiplicative homomorphic encryption. However, similarity measures are required for searches and queries under homomorphic encrypted ciphertexts. Therefore, this study considers the cosine similarity, angular similarity, Tanimoto similarity, and soft cosine similarity… ▽ More

    Submitted 17 February, 2023; v1 submitted 15 February, 2023; originally announced February 2023.

    Comments: in Chinese language

  14. arXiv:2302.07431  [pdf

    cs.CR

    Exploring the Techniques of Information Security Certification

    Authors: Abel C. H. Chen

    Abstract: If the information system is intruded or attacked by hackers, leaked personal data or serious economic loss may occur; the threats may be serious security problems. For security services, information security certification is built based on Public Key Infrastructure (PKI) to be an important tool for the services of bank transactions, natural person certificate, blockchain, and Hyper Text Transfer… ▽ More

    Submitted 14 February, 2023; originally announced February 2023.

    Comments: in Chinese language

    Journal ref: Journal of Informatics and Electronics, vol. 11, no. 1, pp. 135-148, 2023, URL: https://www.airitilibrary.com/Article/Detail/P20230213001-N202307210007-00008

  15. Homomorphic Hashing Based on Elliptic Curve Cryptography

    Authors: Abel C. H. Chen

    Abstract: For avoiding the exposure of plaintexts in cloud environments, some homomorphic hashing algorithms have been proposed to generate the hash value of each plaintext, and cloud environments only store the hash values and calculate the hash values for future needs. However, longer hash value generation time and longer hash value summary time may be required by these homomorphic hashing algorithms with… ▽ More

    Submitted 15 February, 2023; v1 submitted 7 February, 2023; originally announced February 2023.

    Comments: in Chinese language

  16. arXiv:2302.00155  [pdf

    cs.NE cs.AI

    How to Prove the Optimized Values of Hyperparameters for Particle Swarm Optimization?

    Authors: Abel C. H. Chen

    Abstract: In recent years, several swarm intelligence optimization algorithms have been proposed to be applied for solving a variety of optimization problems. However, the values of several hyperparameters should be determined. For instance, although Particle Swarm Optimization (PSO) has been applied for several applications with higher optimization performance, the weights of inertial velocity, the particl… ▽ More

    Submitted 31 January, 2023; originally announced February 2023.

    Comments: in Chinese language

  17. arXiv:2212.12279  [pdf

    cs.LG

    Exploring the Optimized Value of Each Hyperparameter in Various Gradient Descent Algorithms

    Authors: Abel C. H. Chen

    Abstract: In the recent years, various gradient descent algorithms including the methods of gradient descent, gradient descent with momentum, adaptive gradient (AdaGrad), root-mean-square propagation (RMSProp) and adaptive moment estimation (Adam) have been applied to the parameter optimization of several deep learning models with higher accuracies or lower errors. These optimization algorithms may need to… ▽ More

    Submitted 27 December, 2022; v1 submitted 23 December, 2022; originally announced December 2022.

    Comments: in Chinese language