Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Feipei Lai is active.

Publication


Featured researches published by Feipei Lai.


Journal of Medical Systems | 2012

A Secure Authentication Scheme for Telecare Medicine Information Systems

Zhen Yu Wu; Yueh-Chun Lee; Feipei Lai; Hung-Chang Lee; Yu-Fang Chung

The telecare medicine information system enables or supports health-care delivery services. In recent years, the increased availability of lower-cost telecommunications systems and custom made physiological monitoring devices for patients have made it possible to bring the advantages of telemedicine directly into the patient’s home. These systems are moving towards an environment where automated patient medical records and electronically interconnected telecare facilities are prevalent. A secure authentication scheme will thus be needed to safeguard data integrity, confidentiality, and availability. Many schemes based on cryptography have been proposed for the goals. However, much of the schemes are vulnerable to various attacks, and are neither efficient, nor user friendly. Specially, in terms of efficiency, some schemes need the exponential computation resulting in high time cost. Therefore, we propose a novel authentication scheme that is added the pre-computing idea within the communication process to avoid the time-consuming exponential computations. Finally, it is shown to be more secure and practical for telecare medicine environments.


Computer Standards & Interfaces | 2009

Secure and efficient group key management with shared key derivation

Jen-Chiun Lin; Kuo-Hsuan Huang; Feipei Lai; Hung-Chang Lee

In many network applications, including distant learning, audio webcasting, video streaming, and online gaming, often a source has to send data to many receivers. IP multicasts and application-layer multicasts provide efficient and scalable one-to-many or many-to-many communications. A common secret key, the group key, shared by multiple users can be used to secure the information transmitted in the multicast communication channel. In this paper, a new group key management protocol is proposed to reduce the communication and computation overhead of group key rekeying caused by membership changes. With shared key derivation, new keys derivable by members themselves do not have to be encrypted or delivered by the server, and the performance of synchronous and asynchronous rekeying operations, including single join, single leave, and batch update, is thus improved. The proposed protocol is shown to be secure and immune to collusion attacks, and it outperforms the other comparable protocols from our analysis and simulation. The protocol is particularly efficient with binary key trees and asynchronous rekeying, and it can be tuned to meet different rekeying delay or key size requirements.


Information Sciences | 2008

Access control in user hierarchy based on elliptic curve cryptosystem

Yu Fang Chung; Hsiu Hui Lee; Feipei Lai; Tzer Shyong Chen

This work proposes a novel key management method based on elliptic curve cryptosystem and one-way hash function to solve dynamic access problems in a user hierarchy. The proposed scheme attempts to derive the secret key of successors efficiently and non-redundantly. It includes functions such as insertion and removal of classes, updating of their relationships, and changing of secret keys. The method utilizes a Central Authority, which enables a user to change the secret key at will conveniently. Since the proposed method uses the elliptic curve cryptosystem which has a low computational cost and small key size, its performance in terms of both security and efficiency is quite commendable. Therefore, it can be anticipated that its use will be extended to wireless communication in the future.


the cryptographers track at the rsa conference | 2006

A medium-field multivariate public-key encryption scheme

Lih-Chung Wang; Bo-Yin Yang; Yuh-Hua Hu; Feipei Lai

Electronic commerce fundamentally requires two different public-key cryptographical primitives, for key agreement and authentication. We present the new encryption scheme MFE, and provide a performance and security review. MFE belongs to the


local computer networks | 2005

Efficient Group Key Management Protocol with One-Way Key Derivation

Jen-Chiun Lin; Feipei Lai; Hung-Chang Lee

\mathcal{MQ}


Computer Standards & Interfaces | 2007

ID-based digital signature scheme on the elliptic curve cryptosystem

Yu Fang Chung; Kuo-Hsuan Huang; Feipei Lai; Tzer Shyong Chen

class, an alternative class of PKCs also termed Polynomial-Based, or multivariate. They depend on multivariate quadratic systems being unsolvable. The classical trapdoors central to PKC’s are modular exponentiation for RSA and discrete logarithms for ElGamal/DSA/ECC. But they are relatively slow and will be obsoleted by the arrival of QC (Quantum Computers). The argument for


Computer Standards & Interfaces | 2009

Efficient migration for mobile computing in distributed networks

Kuo-Hsuan Huang; Yu-Fang Chung; Chia-Hui Liu; Feipei Lai; Tzer-Shyong Chen

\mathcal{MQ}


Journal of Medical Internet Research | 2013

Evaluating Self-Management Behaviors of Diabetic Patients in a Telehealthcare Program: Longitudinal Study Over 18 Months

Lichin Chen; Lee-Ming Chuang; Chia-Hsiun Chang; Chiou-Shiang Wang; I-Ching Wang; Yu-Fang Chung; Hui-Yu Peng; Hui-Chuen Chen; Yu-Ling Hsu; Yu-Sheng Lin; Huang-Jen Chen; Tieng-Chun Chang; Yi-Der Jiang; Hung-Chang Lee; Ching-Ting Tan; Hsin-Lu Chang; Feipei Lai

-schemes is that they are usually faster, and there are no known QC-assisted attacks on them. There are several


Journal of Medical Systems | 2012

A Password-Based User Authentication Scheme for the Integrated EPR Information System

Zhen Yu Wu; Yu-Fang Chung; Feipei Lai; Tzer-Shyong Chen

\mathcal{MQ}


international symposium on consumer electronics | 2011

A secure electronic medical record sharing mechanism in the cloud computing platform

Zhuo-Rong Li; En-Chi Chang; Kuo-Hsuan Huang; Feipei Lai

digital signature schemes being investigated today. But encryption (or key exchange schemes) are another story — in fact, only two other

Collaboration


Dive into the Feipei Lai's collaboration.

Top Co-Authors

Avatar

Te-Wei Ho

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Po-Hsun Cheng

National Kaohsiung Normal University

View shared research outputs
Top Co-Authors

Avatar

Shanq-Jang Ruan

National Taiwan University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Sung-Huai Hsieh

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Sheau-Ling Hsieh

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Chi-Huang Chen

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Chia-Ping Shen

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jin-Ming Wu

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Yi-Ju Tseng

National Taiwan University

View shared research outputs
Researchain Logo
Decentralizing Knowledge