Erl-Huei Lu
Chang Gung University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Erl-Huei Lu.
Journal of Medical Systems | 2014
Wen-Tsai Ko; Shin-Yan Chiou; Erl-Huei Lu; Henry Ker-Chang Chang
RFID technology is increasingly used in applications that require tracking, identification, and authentication. It attaches RFID-readable tags to objects for identification and execution of specific RFID-enabled applications. Recently, research has focused on the use of grouping-proofs for preserving privacy in RFID applications, wherein a proof of two or more tags must be simultaneously scanned. In 2010, a privacy-preserving grouping proof protocol for RFID based on ECC in public-key cryptosystem was proposed but was shown to be vulnerable to tracking attacks. A proposed enhancement protocol was also shown to have defects which prevented proper execution. In 2012, Lin et al. proposed a more efficient RFID ECC-based grouping proof protocol to promote inpatient medication safety. However, we found this protocol is also vulnerable to tracking and impersonation attacks. We then propose a secure privacy-preserving RFID grouping proof protocol for inpatient medication safety and demonstrate its resistance to such attacks.
cross strait quad regional radio science and wireless technology conference | 2011
Wen-Tsai Ko; Shin-Yan Chiou; Erl-Huei Lu; Henry Ker-Chang Chang
In 2010, Batina et al. proposed a privacy-preserving grouping proof protocol for RFID (Radio-Frequency Identification) based on ECC (Elliptic Curve Cryptography). Recently, Lv et al. have shown that Batina et al.s protocol is not secure against the tracking attack. Lv et al. also proposed an enhancement protocol based on Batina et al.s work to against the tracking attack. In this paper we proved Lv et al.s protocol can not work. We also present an improvement version of privacy-preserving ECC-based grouping-proof protocol to against the tracking attack.
cross strait quad-regional radio science and wireless technology conference | 2013
Tso-Cho Chen; Chia-Jung Li; Erl-Huei Lu
A hybrid belief propagation (BP) decoding algorithm for low-density parity-check code is proposed to accelerate the convergence of decoding and reduce the number of decoding iterations. The hybrid scheme is presented by integrating the BP algorithm with the bit-flipping function which is used as adaptive weighted factor in the BP iteration decoding. The adaptive weighting factor is based on the average weighted reliability measure of the hard output of decoder. The proposed hybrid adaptive weighted iteration scheme can efficiently increase the convergence speed of the belief propagation decoding and therefore improve the error performance. Simulation results show that the proposed algorithm can significantly reduce the decoding complexity and achieve better error performances as compared with the sum-product algorithm.
cross strait quad-regional radio science and wireless technology conference | 2013
Erl-Huei Lu; Chih-Wen Shih; Pen-Yao Lu
We proposed decoding algorithms for (2<sup>m</sup>-1, 2<sup>m</sup>-4) high code-rate RS codes with high speed and low-complexity features. We explore four types of decoding situations over (2<sup>m</sup>-1, 2<sup>m</sup>-4) RS code individually, and investigate the solutions for finding error locations and error values.
cross strait quad regional radio science and wireless technology conference | 2011
Erl-Huei Lu; Wen-Tsai Ko; Henry Ker-Chang Chang
In this paper we describe a novel ECC protocol for public key cryptosystem in non-PKI environment. The proposed protocol is designed to avoid the expensive infrastructure of PKI and the key escrow problem of the id-based cryptosystem. We based on elliptic curve discrete logarithm problem to build a practice key exchanging protocol in short key, low power, and small storage requirements of the communicate application with constrain devices. The protocol guarantees the private key generated by the legal user instead of the third party who may have the chance to conspire with an adversary.
Archive | 2011
Wen-Tsai Ko; Shin-Van Chiou; Erl-Huei Lu; Henry Ker-Chang Chang
Applied Mathematics-a Journal of Chinese Universities Series B | 2012
Wen-Tsai Ko; Shin-Yan Chiou; Erl-Huei Lu; Henry Ker-Chang Chang
International Journal of Network Security | 2018
Shin-Yan Chiou; Wen-Tsai Ko; Erl-Huei Lu
Etri Journal | 2016
Erl-Huei Lu; Tso-Cho Chen; Chih-Wen Shih
international conference on electronics communications and control | 2012
Wen-Tsai Ko; Erl-Huei Lu; Henry Ker-Chang Chang