Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tien-Sheng Lin is active.

Publication


Featured researches published by Tien-Sheng Lin.


international carnahan conference on security technology | 2007

Quantum Wireless Secure Communication Protocol

Tien-Sheng Lin; Sy-Yen Kuo

In the wireless communication network, transmitting messages from sender to receiver may traverse several intermediate nodes. Any eavesdropper can attack in the communication channel, and any malicious intermediate node can act as receiver to intercept the message. The secure routing path must solve channel attacks and attacks in the malicious node. In the classical field, the solution of the channel attacks is conditional security and we can not provide secure communication in the routing path from sender to receiver. In the quantum field, the security of the authentication protocol is based on the laws of nature, including no-cloning theorem and quantum teleportation. According to the property of no-cloning theorem and quantum teleportation, we can use the shared quantum entangled particles between communicators for liar detection problem. In the quantum cryptography, the security of the authentication protocol is unconditional security. This paper designs the two-way secure communication protocol, which can set up the secure routing path from sender to receiver. The two-way secure communication protocol includes the sender oriented checking and the receiver oriented checking. By using quantum sharing table, these checking schemes investigate whether the routing path is secure or not. In the beginning, the sender and receiver pre-share a quantum sharing table to detect all the dishonest nodes. The quantum sharing table acts as a quantum key distribution which can not be stolen by any Eve. Furthermore, the protocol can teleport a quantum state from sender to receiver to identify whether the communication channel and the intermediate nodes are honest or not. Then, the protocol can achieve the secure routing path to verify the real sender and receiver and confirm that all intermediate nodes are honest. Based on this mechanism, we can achieve high liar detection probability.


international carnahan conference on security technology | 2005

Protocol and applications for sharing quantum private keys

Han-Wei Wang; Tien-Sheng Lin; I-Ming Tsai; Sy-Yen Kuo

Transmitting message in secret is getting more and more important nowadays. In the classical world, the message we sent run the risk of being intercepted by an attacker. As a result, we have to encrypt the message, or send it using a private channel. However, if we transmit messages via such methods, there are still some ways to decipher the information. For example, a powerful computer can be used to decrypt the message or try to steal the message from the private channel. In quantum cryptography, entanglement can be used as a secure channel to transmit information with absolute secrecy. From this perspective, quantum entanglement pairs are equivalent to a quantum private key. However, like the classical key distribution problem, the entanglement has to be shared before it can be used. In this paper, we propose a protocol that can be used to distribute such entanglement pairs securely, so they can be subsequently used to transmit messages with perfect security. The security of this protocol is based on the laws of nature, instead of unproven mathematical hard problems


international conference on nanotechnology | 2006

Quantum Authentication and Secure Communication Protocols

Tien-Sheng Lin; I-Ming Tsai; Han-Wai Wang; Sy-Yen Kuo

In the communication network, transmitting messages from source to destination may traverse several intermediate nodes. For a long period of time, multiple authentications and secure communications between the sender and the receiver are needed for us to transmit messages. In the classical field, authentication provides only conditional security and classical channel can not provide secure communication for liar detection. In the quantum field, multiple quantum entanglement pairs can be used for liar detection. In this paper, we design quantum authentication protocol and secure communication protocol by only using quantum channel. These protocols previously share a quantum key distribution to detect the dishonest node. The quantum key distribution can promote authentication and secure communication for achieving higher liar detection probability.


international conference on nanotechnology | 2011

Quantum authentication protocol using entanglement swapping

Chia-Hung Chien; Tien-Sheng Lin; Ting-Hsu Chang; Shih-Yi Yuan; Sy-Yen Kuo

In this paper, we use the technique of entanglement swapping to exchange quantum message among sharing parties. For Bell measurements, quantum teleportation can provide long-distance quantum transmission when sharing parties are disconnected. The proposed mutual authentication protocol has the capability to securely identify each other under an unsafe routing path. Eavesdropping and malicious nodes may exist in the routing path. For quantum authentication protocol, it is called location-release problem. The proposed approach can solve this problem. Furthermore, source can transfer quantum message to destination in a secure way.


international conference on nanotechnology | 2010

Quantum switching and quantum string matching

Tien-Sheng Lin; Chin-Yung Lu; Sy-Yen Kuo

Applications of quantum string matching can be found in quantum signature scheme and quantum fingerprinting. The major benefit of these applications is computation complexity. Quantum Boolean circuits can check the equivalence function: all in puts are quantum digital state. However, it is difficult to verify quantum strings if all input qubits are quantum superposition state. Quantum switching could be reversible circuits. These circuits have two major benefits: information lossless and energy saving. In this paper, we use quantum circuits to design the control module that can verify the equivalence of quantum strings and satisfy the following condition: all inputs qubits could be quantum superposition state. In the pro posed circuits, the control module can form a special correlation between input sequence and output sequence. This correlation can design the equivalence function of quantum strings to solve the problem: input strings with superposition. In regard to the performance, the scalability of the proposed circuits can be achieved.


international conference on nanotechnology | 2011

Reversible quantum circuits and quantum transmission integrity

Tien-Sheng Lin; Chia-Hung Chien; Ting-Hsu Chang; Shih-Yi Yuan; Sy-Yen Kuo

This paper proposes a novel work to design reversible quantum circuits. The function of this circuit is to investigate quantum transmission integrity in the quantum communication networks. This work is to verify quantum transmission sequence of a quantum frame by using reversible quantum model. This model designs control module to derive the correlation between two quantum strings: quantum input sequence and quantum output sequence. If a quantum frame reserves the correlation, then we can obtain quantum transmission sequence. So, quantum transmission integrity of a quantum frame can be verified.


international carnahan conference on security technology | 2011

Quantum signature scheme for vehicular networks using entangled states

Tien-Sheng Lin; Chia-Hung Chien; Ting-Hsu Chang; Sy-Yen Kuo

For vehicular networks, the security and privacy face two major challenges. One is the open wireless medium and the other is the high-speed mobility of the vehicles. For the open wireless medium, eavesdropping and man-in-the-middle attacks may exist in the communication path. This is called an unsafe routing path. Based on quantum nature, quantum channel supported unconditionally secure communication. Classically, digital signature can support conditionally secure communication. So quantum channel is more secure than classical channel. For high-speed mobility of the vehicles, sender and receiver need location-release signature. This paper designs the technique of quantum entangled particle to perform quantum teleportation for solving quantum location-release signature. By using quantum nature, the proposed scheme can overcome two major challenges in the vehicular networks. This scheme uses multiple entangled particles to reconstruct the original quantum state among sharing party. Based on this function, a secret sharing message can be verified to provide the message recovery. Considering the security of the proposed scheme, impossibility of forgery and impossibility of disavowal can be achieved.


international conference on nanotechnology | 2014

Quantum blind signature based on quantum circuit

Tien-Sheng Lin; Yanlin Chen; Ting-Hsu Chang; Chin-Yung Lu; Sy-Yen Kuo

Quantum circuit is a reversible circuit that can be designed the control module to derive the correlation between quantum input sequence and quantum output sequence. In addition, in this paper we use the control module of the quantum circuit to verify the equivalence of the quantum state such that quantum blind signature can achieve the security requirement of the signature scheme and resist eavesdropping from the outsider. The core concept of the proposed signature is based on the correlation of quantum entangled state to investigate that the message string and the signatory string is consistent. In regard to the security, the blindness and the failure of eavesdropping can be preserved by this work. The proposed signature can achieve impossibility of forgery and impossibility of disavowal.


international carnahan conference on security technology | 2011

Quantum circuits and quantum message integrity

Tien-Sheng Lin; Ting-Hsu Chang; Chia-Hung Chien; Sy-Yen Kuo

In the wireless communication networks, quantum message integrity can be applied with quantum authentication and quantum signature if the source and destination are indirect communication. Eavesdroppers and malicious nodes may exist in the routing path from the source to the destination. There is major threat in the indirect communication. Based on quantum nature, we design quantum permutation model to verify quantum transmission sequence of a quantum transmission frame if an attacker wants to crack the content of a quantum transmission frame. Quantum permutation model can determine the real position of data qubits and verification qubits. However, Eves is not able to obtain the position of date qubits because quantum permutation switching cannot be owned by Eve. So quantum transmission sequence can be reserved. The receiver has the capability to verify it and obtains the content of data qubits.


international conference on computer communications and networks | 2009

Quantum Transmission Integrity Mechanism for Indirect Communication

Tien-Sheng Lin; I-Ming Tsai; Sy-Yen Kuo

Quantum communication networks need to securely transmit a quantum frame from source to destination. In the wireless communication network, source and destination have two types of connection: direct or indirect communication. In the direct connected mode, the transmission security can be achieved by using a quantum key distribution. In the indirect connected mode, it is a difficult problem to deal with the unsafe routing path from source to destination due to eavesdropping and man- in-the-middle attack. In this paper, we propose a quantum mechanism that designs a flexible quantum frame to achieve transmission integrity. This frame uses a quantum correlated key to let the receiver has the capability to judge whether the received quantum frame is secure or not. This mechanism provides a new solution to solve the transmission security in the unsafe routing path.

Collaboration


Dive into the Tien-Sheng Lin's collaboration.

Top Co-Authors

Avatar

Sy-Yen Kuo

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Ting-Hsu Chang

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Chia-Hung Chien

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

I-Ming Tsai

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Chin-Yung Lu

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yanlin Chen

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Han-Wei Wang

National Taiwan University

View shared research outputs
Researchain Logo
Decentralizing Knowledge