Time filter

Source Type

Singapore, Singapore

Sun M.,Institute for Inforcomm Research | Zhang Y.P.,Nanyang Technological University
Asia-Pacific Microwave Conference Proceedings, APMC | Year: 2010

This paper presents the design of a microstrip grid array antenna and more importantly describes the integration of it into a grid array package in a low temperature cofired ceramic (LTCC) technology for highly-integrated 60-GHz radios. The grid array antenna package has a small volume of 13.581.265 mm 3 and can house a 60-GHz radio die of current size. The microstrip grid array antenna package samples were fabricated and measured. Measured results show good agreement with simulated ones. It achieved good matching (S11=≤-10 dB), high efficiency (85%), and directional patterns with the main beam in the boresight direction from 57 to 64 GHz as well as high gain with the peak value of 14.5 dBi at 60 GHz. © 2010 IEICE Institute of Electronics Informati.

Peng K.,Institute for Inforcomm Research
Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings | Year: 2011

The two most recent PVSS (publicly verifiable secret sharing) schemes are illustrated to be vulnerable to a simple attack. Moreover, one of them has to deteriorate its efficiency greatly to meet practical security requirement. The attack makes the share holders to receive incorrect shares, which will lead secret reconstruction to mistake. The efficiency deterioration is so serious that no practical application can tolerate it. So the two most recent PVSS schemes actually cannot work reliably and efficiently as they claim. © 2011 IEEE.

Peng K.,Institute for Inforcomm Research
Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings | Year: 2011

A new secret-sharing-based e-auction scheme is proposed. Distributed bid opening is employed to protect bid privacy. It can achieve all the desired properties for sealed-bid auctions at a reasonable cost. Moreover, attacks existing in the current secret-sharing-based sealed-bid e-auction schemes are prevented in the new scheme. In addition, it does not need any trust assumption. © 2011 IEEE.

Bao F.,Institute for Inforcomm Research
2010 5th International ICST Conference on Communications and Networking in China, ChinaCom 2010 | Year: 2010

Digital signature is very critical and useful for achieving security features such as authentication, certification, integrity and non-repudiation etc. In digital signature schemes, private keys play the most fundamental role of security and trust. Once a private key is compromised, the key owner loses all of the protection to himself so that he can be impersonated. Hence it is crucial for a private key owner to know whether his key has been stolen. The first study toward detecting private key disclosure is [4], where the schemes based on the time-division and private key updating are presented. The approach is similar to the forward-secure signature in the key-update style. In this paper we propose a completely different approach for a user to detect whether his private key for signing digital signatures is compromised. The solution satisfies the four attractive properties: 1) the user need not possess another cryptographic key and what he has are his private key and a memorable password; 2) the signature schemes are not in the update of the private key in time-divided manner and our method can be applied to the existing signature schemes; 3) although a trusted party (TP) is required in our method, the user and the TP need not share any secret; and 4) the user is stateless, i.e., he does not need to record all the messages and the signatures he has signed before.

Peng K.,Institute for Inforcomm Research
Journal of Information Processing Systems | Year: 2013

A new secure network communication technique that has been designed for mobile wireless services, is presented in this paper. Its network services are mobile, distributed, seamless, and secure. We focus on the security of the scheme and achieve anonymity and reliability by using cryptographic techniques like blind signature and the electronic coin. The question we address in this paper What, "is is the best way to protect the privacy and anonymity of users of mobile wireless networks, especially in practical applications like e-commerce?" The new scheme is a flexible solution that answers this question. It efficiently protects user's privacy and anonymity in mobile wireless networks and supports various applications. It is employed to implement a secure e-auction as an example, in order to show its advantages in practical network applications. © 2013 KIPS.

Discover hidden collaborations