Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Erl-Huei Lu is active.

Publication


Featured researches published by Erl-Huei Lu.


Journal of Medical Systems | 2014

Modifying the ECC-Based Grouping-Proof RFID System to Increase Inpatient Medication Safety

Wen-Tsai Ko; Shin-Yan Chiou; Erl-Huei Lu; Henry Ker-Chang Chang

RFID technology is increasingly used in applications that require tracking, identification, and authentication. It attaches RFID-readable tags to objects for identification and execution of specific RFID-enabled applications. Recently, research has focused on the use of grouping-proofs for preserving privacy in RFID applications, wherein a proof of two or more tags must be simultaneously scanned. In 2010, a privacy-preserving grouping proof protocol for RFID based on ECC in public-key cryptosystem was proposed but was shown to be vulnerable to tracking attacks. A proposed enhancement protocol was also shown to have defects which prevented proper execution. In 2012, Lin et al. proposed a more efficient RFID ECC-based grouping proof protocol to promote inpatient medication safety. However, we found this protocol is also vulnerable to tracking and impersonation attacks. We then propose a secure privacy-preserving RFID grouping proof protocol for inpatient medication safety and demonstrate its resistance to such attacks.


cross strait quad regional radio science and wireless technology conference | 2011

An improvement of privacy-preserving ECC-based grouping proof for RFID

Wen-Tsai Ko; Shin-Yan Chiou; Erl-Huei Lu; Henry Ker-Chang Chang

In 2010, Batina et al. proposed a privacy-preserving grouping proof protocol for RFID (Radio-Frequency Identification) based on ECC (Elliptic Curve Cryptography). Recently, Lv et al. have shown that Batina et al.s protocol is not secure against the tracking attack. Lv et al. also proposed an enhancement protocol based on Batina et al.s work to against the tracking attack. In this paper we proved Lv et al.s protocol can not work. We also present an improvement version of privacy-preserving ECC-based grouping-proof protocol to against the tracking attack.


cross strait quad-regional radio science and wireless technology conference | 2013

A hybrid belief propagation decoding algorithms of LDPC codes for fast convergence

Tso-Cho Chen; Chia-Jung Li; Erl-Huei Lu

A hybrid belief propagation (BP) decoding algorithm for low-density parity-check code is proposed to accelerate the convergence of decoding and reduce the number of decoding iterations. The hybrid scheme is presented by integrating the BP algorithm with the bit-flipping function which is used as adaptive weighted factor in the BP iteration decoding. The adaptive weighting factor is based on the average weighted reliability measure of the hard output of decoder. The proposed hybrid adaptive weighted iteration scheme can efficiently increase the convergence speed of the belief propagation decoding and therefore improve the error performance. Simulation results show that the proposed algorithm can significantly reduce the decoding complexity and achieve better error performances as compared with the sum-product algorithm.


cross strait quad-regional radio science and wireless technology conference | 2013

Decoding algorithms for (2 m −1,2 m −4) high code-rate RS codes

Erl-Huei Lu; Chih-Wen Shih; Pen-Yao Lu

We proposed decoding algorithms for (2<sup>m</sup>-1, 2<sup>m</sup>-4) high code-rate RS codes with high speed and low-complexity features. We explore four types of decoding situations over (2<sup>m</sup>-1, 2<sup>m</sup>-4) RS code individually, and investigate the solutions for finding error locations and error values.


cross strait quad regional radio science and wireless technology conference | 2011

A novel ECC protocol for key exchanging in non-PKI networks

Erl-Huei Lu; Wen-Tsai Ko; Henry Ker-Chang Chang

In this paper we describe a novel ECC protocol for public key cryptosystem in non-PKI environment. The proposed protocol is designed to avoid the expensive infrastructure of PKI and the key escrow problem of the id-based cryptosystem. We based on elliptic curve discrete logarithm problem to build a practice key exchanging protocol in short key, low power, and small storage requirements of the communicate application with constrain devices. The protocol guarantees the private key generated by the legal user instead of the third party who may have the chance to conspire with an adversary.


Archive | 2011

Grouping Proof for RFID

Wen-Tsai Ko; Shin-Van Chiou; Erl-Huei Lu; Henry Ker-Chang Chang


Applied Mathematics-a Journal of Chinese Universities Series B | 2012

A Privacy-Preserving Grouping Proof Protocol Based on ECC with Untraceability for RFID

Wen-Tsai Ko; Shin-Yan Chiou; Erl-Huei Lu; Henry Ker-Chang Chang


International Journal of Network Security | 2018

A Secure ECC-based Mobile RFID Mutual Authentication Protocol and Its Application.

Shin-Yan Chiou; Wen-Tsai Ko; Erl-Huei Lu


Etri Journal | 2016

New Time-Domain Decoder for Correcting both Errors and Erasures of Reed-Solomon Codes

Erl-Huei Lu; Tso-Cho Chen; Chih-Wen Shih


international conference on electronics communications and control | 2012

The Improvement of an RFID Mutual Authentication Scheme Based on Elliptic Curve Cryptography

Wen-Tsai Ko; Erl-Huei Lu; Henry Ker-Chang Chang

Collaboration


Dive into the Erl-Huei Lu's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shin-Yan Chiou

Industrial Technology Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tso-Cho Chen

China University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge