Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wen-Guey Tzeng is active.

Publication


Featured researches published by Wen-Guey Tzeng.


IEEE Transactions on Knowledge and Data Engineering | 2002

A time-bound cryptographic key assignment scheme for access control in a hierarchy

Wen-Guey Tzeng

The cryptographic key assignment problem is to assign cryptographic keys to a set of partially ordered classes so that the cryptographic key of a higher class can be used to derive the cryptographic key of a lower class. In this paper, we propose a time-bound cryptographic key assignment scheme in which the cryptographic keys of a class are different for each time period, that is, the cryptographic key of class C/sub i/ at time t is K/sub i, t./ Key derivation is constrained not only by the class relation, but also the time period. In our scheme, each user holds some secret parameters whose number is independent of the number of the classes in the hierarchy and the total time periods. We present two novel applications of our scheme. One is to broadcast data to authorized users in a multilevel-security way and the other is to construct a flexible cryptographic key backup system.


international conference on information security | 2007

Identity-based proxy re-encryption without random oracles

Cheng-Kang Chu; Wen-Guey Tzeng

A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a ciphertext for Alice into the ciphertext for Bob. In this paper, we propose two identity-based proxy re-encryption schemes, which are both proved secure in the standard model. The first one is efficient in both computation and ciphertext length, and the other one achieves chosen-ciphertext security. Our solutions answer the open problems left in the previous work.


IEEE Transactions on Parallel and Distributed Systems | 2012

A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding

Hsiao-Ying Lin; Wen-Guey Tzeng

A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third partys cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. Our method fully integrates encrypting, encoding, and forwarding. We analyze and suggest suitable parameters for the number of copies of a message dispatched to storage servers and the number of storage servers queried by a key server. These parameters allow more flexible adjustment between the number of storage servers and robustness.


IEEE Transactions on Parallel and Distributed Systems | 2014

Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

Cheng-Kang Chu; Sherman S. M. Chow; Wen-Guey Tzeng; Jiangying Zhou; Robert H. Deng

Data sharing is an important functionality in cloud storage. In this paper, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems that produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, our schemes give the first public-key patient-controlled encryption for flexible hierarchy, which was yet to be known.


IEEE Transactions on Image Processing | 2007

Cheating Prevention in Visual Cryptography

Chih-Ming Hu; Wen-Guey Tzeng

Visual cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. Each participant holds a transparency. Most of the previous research work on VC focuses on improving two parameters: pixel expansion and contrast. In this paper, we studied the cheating problem in VC and extended VC. We considered the attacks of malicious adversaries who may deviate from the scheme in any way. We presented three cheating methods and applied them on attacking existent VC or extended VC schemes. We improved one cheat-preventing scheme. We proposed a generic method that converts a VCS to another VCS that has the property of cheating prevention. The overhead of the conversion is near optimal in both contrast degression and pixel expansion


SIAM Journal on Computing | 1992

A polynomial-time algorithm for the equivalence of probabilistic automata

Wen-Guey Tzeng

Two probabilistic automata are equivalent if for any string x, the two automata accept x with equal probability. This paper presents an


IEEE Transactions on Computers | 2002

A secure fault-tolerant conference-key agreement protocol

Wen-Guey Tzeng

O((n_1 + n_2 )^4 )


public key cryptography | 2005

Efficient k -out-of- n oblivious transfer schemes with adaptive and non-adaptive queries

Cheng-Kang Chu; Wen-Guey Tzeng

algorithm for determining whether two probabilistic automata


IEEE Transactions on Information Theory | 2010

Permutation Arrays Under the Chebyshev Distance

Torleiv Klve; Te-Tsung Lin; Shi-Chun Tsai; Wen-Guey Tzeng

U_1


public key cryptography | 2002

Efficient 1-Out-n Oblivious Transfer Schemes

Wen-Guey Tzeng

and

Collaboration


Dive into the Wen-Guey Tzeng's collaboration.

Top Co-Authors

Avatar

Cheng-Kang Chu

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Yi-Ruei Chen

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Shiuan-Tzuo Shen

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Hsiao-Ying Lin

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Shi-Chun Tsai

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Zhi-Jia Tzeng

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Amir Rezapour

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Bao-Shuh Paul Lin

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Chi-Ming Hu

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar

Gow-Hsing King

National Chiao Tung University

View shared research outputs
Researchain Logo
Decentralizing Knowledge