Journal Papers
Journal Papers:
Cheng-Han Shie, Pin-Yen Chiu, Po-Hsuan Hang, Cong-Han Lai, Sheng-Feng Lu, and Chun-I Fan*, ‘Detecting and Preventing Wireless Deauthentication Flood Attacks over 802.11 Networks,’ Journal of Information Science and Engineering, accepted, March 2024. (SCIE)
Er-Shuo Zhuang, Chun-I Fan*, Chia-Yu Lin, ‘Cryptanalysis of RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage,’ Journal of Information Science and Engineering, accepted, September 2023. (SCIE)
Chun-I Fan, Arijit Karati*, and Shou-Li Wu, ‘A Privacy-Aware Provably Secure Smart Card Authentication Protocol Based on Physically Unclonable Functions,’ IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2023.3317675, September 2023. (SCIE)
Er-Shuo Zhuang and Chun-I Fan*, ‘Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices,’ Mathematics, vol. 11, no. 18: 3830, September 2023. (SCIE)
Chun-I Fan, Cheng-Han Shie, Yi-Fan Tseng*, and Hui-Chun Huang, ‘An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT,’ ACM Transactions on Sensor Networks, vol. 19, no. 3, Article 61, pp. 1-21, August 2023. (SCIE)
Chun-I Fan, Hsin-Nan Kuo, Yung-Sheng Tu, Yuan-Chi Chei, Chu-Chia Chuang, Yu-Chun Tseng, and Arijit Karati*, ‘A Secure Cloud Gaming System,’ Journal of Information Science and Engineering, vol. 39, no. 3, pp. 473-487, May 2023. (SCIE)
3. Yi-Fan Tseng, Chun-I Fan*, and Zi-Cheng Liu, ‘Fast Keyword Search over Encrypted Data with Short Ciphertext in Clouds,’ Journal of Information Security and Applications, accepted, vol. 70, 103320, November 2022. (SCIE)
Chun-I Fan, Ya-Wen Hsu, Cheng-Han Shie*, and Yi-Fan Tseng, ‘ID-Based Multi-Receiver Homomorphic Proxy Re-Encryption in Federated Learning,’ ACM Transactions on Sensor Networks, vol. 18, no. 4, Article 55, pp. 1-25, November 2022. (SCIE)
Er-Shuo Zhuang, Chun-I Fan*, and I-Hua Kuo, ‘Multiauthority Attribute-Based Encryption with Dynamic Membership from Lattices,’ IEEE Access, vol. 10, pp. 58254-58267, May 2022. (SCIE)
Arijit Karati, Chun-I Fan*, and Er-Shuo Zhuang, ‘Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things,’ IEEE Transactions on Industrial Informatics, vol. 18, no. 6, pp. 3661-3669, June 2022. (SCI)
Chun-I Fan, Er-Shuo Zhuang, Arijit Karati*, and Chun-Hui Su, ‘A Multiple End-Devices Authentication Scheme for LoRaWAN,’ Electronics, vol. 11, no. 5: 797, March 2022. (SCIE)
Chun-I Fan, Jheng-Jia Huang, Shang-Wei Tseng, and I-Te Chen*, ‘Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach with Fast Recovery,’ IEEE Transactions on Cloud Computing, vol. 9, no. 2, pp. 546-561, April-June 1, 2021. (SCI)
Yi-Fan Tseng and Chun-I Fan*, ‘Anonymous Multi-Receiver Identity-Based Encryption Against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model,’ Security and Communication Networks, vol. 2021, Article ID 5519721, 11 pages, 2021 (SCI)
Chun-I Fan, Arijit Karati*, and Pei-Shan Yang, ‘Reliable File Transfer Protocol with Producer Anonymity for Named Data Networking,’ Journal of Information Security and Applications, vol. 59, Article ID 102851, June 2021 (SCI)
Chun-I Fan, Yu-Tse Shih, Jheng-Jia Huang*, and Wan-Ru Chiu, ‘Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System,’ IEEE Transactions on Network and Service Management, vol. 18, no. 1, pp. 701-712, March 2021. (SCI)
Chun-I Fan, Jheng-Jia Huang, Min-Zhe Zhong, Ruei-Hau Hsu, Wen-Tsuen Chen, and Jemin Lee, ‘ReHand: Secure Region-Based Fast Handover with User Anonymity for Small Cell Networks in Mobile Communications,’ IEEE Transactions on Information Forensics and Security, vol. 15, no. 1, pp. 927-942, December 2020. (SCI)
Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, and Hiroaki Kikuchi, ‘Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks,’ International Journal of Information Security, vol. 19, no. 3, pp. 245–255, June 2020. (SCI)
Arijit Karati, Chun-I Fan*, and Ruei-Hau Hsu, ‘Provably Secure and Generalized Signcryption with Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices,’ IEEE Internet of Things Journal, vol. 6, no. 6, pp. 10431-10440, December 2019. (SCI)
Yi-Fan Tseng, Chun-I Fan*, and Yan-Fu Cho, ‘An Authenticated Re-Encryption Scheme for Secure File Transfer in Named Data Networks,’ International Journal of Communication Systems, https://doi.org/10.1002/dac.3571, published online, May 20, 2018. (SCI)
Yi-Fan Tseng, Chun-I Fan*, Si-Jing Wu, Hsin-Nan Kuo, and Jheng-Jia Huang, ‘Cryptanalysis and Improvement on Wang et al.’s Attribute-Based Searchable Encryption Scheme,’ International Journal of Machine Learning and Computing, vol. 9, no. 5, pp. 636-643, October 2019.
Yi-Fan Tseng, Chun-I Fan*, and Cheng-Wei Sung, ‘On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation,’ International Journal of Foundations of Computer Science, vol. 30, no. 4, pp. 493-509. 2019. (SCI)
Yi-Fan Tseng, Chun-I Fan*, and Ching-Wen Chen, ‘Top-Level Secure Certificateless Signature Scheme in the Standard Model,’ IEEE Systems Journal, vol. 13, no. 3, pp. 2763-2774, September 2019. (SCI)
Chun-I Fan, Yi-Fan Tseng, Yi-Hui Lin, Fangguo Zhang, ‘Storage-Saving Bi-Dimensional Privacy-Preserving Data Aggregation in Smart Grids,’ Journal of Internet Technology, vol. 20, no. 3, pp. 955-962, May. 2019. (SCI)
Yi-Fan Tseng, Chun-I Fan*, and Chih-Wen Lin, ‘Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption,’ Journal of Universal Computer Science, vol. 25, no. 3, pp. 182-202, 2019. (SCI)
Yining Liu, Wei Guo, Chun-I Fan, Liang Chang, Chi Cheng, ‘A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid,’ IEEE Transactions on Industrial Informatics, vol. 15, no. 3, pp. 1767-1774, March 2019. (SCI)
Yi-Fan Tseng, Chun-I Fan*, and Chin-Yu Wu, ‘FGAC-NDN: Fine-Grained Access Control for Named Data Networks,’ IEEE Transactions on Network and Service Management, vol. 16, no. 1, pp. 143-152, March 2019. (SCI)
Yu-Lun Chuang, Chun-I Fan*, and Yi-Fan Tseng, ‘An Efficient Algorithm for the Shortest Vector Problem,’ IEEE Access, vol. 6, pp. 61478-61487, October 2018. (SCI).
Hiroaki Kikuchi, Chika Hamanaga, Hideo Yasunaga, Hiroki Matsui, Hideki Hashimoto, and Chun-I Fan, ‘Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets,’ Journal of Information Processing, vol. 26, pp. 638–647, September 2018.
Chien-Nan Wu, Chun-I Fan*, Jheng-Jia Huang, Yi-Fan Tseng, and Hiroaki Kikuchi, ‘Probably Secure Efficient Anonymous Credential Scheme,’ International Journal of Software Innovation, vol. 6, no. 3, pp. 18-35, July-September 2018. (ESCI)
Yi-Hui Lin, Jheng-Jia Huang, Chun-I Fan*, and Wen-Tsuen Chen, ‘Local Authentication and Access Control Scheme in M2M Communications with Computation Offloading,’ IEEE Internet of Things Journal, vol. 5, no. 4, pp. 3209–3219, August 2018. (SCI)
Jheng-Jia Huang, Yi-Fan Tseng, Qi-Liang Yang, and Chun-I Fan*, ‘A Lattice-Based Group Authentication Scheme,’ Applied Sciences-Basel, vol. 8, no. 6, 987, June 2018. (14 pages) (SCI)
Chun-I Fan, I-Te Chen*, Chen-Kai Cheng, Jheng-Jia Huang, and Wen-Tsuen Chen, ‘FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Non-Designated Receivers,’ IEEE Systems Journal, vol. 12, no. 1, pp. 473-484, March 2018. (SCI)
Yi-Fan Tseng and Chun-I Fan*, ‘Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption,’ Journal of Information Science and Engineering, vol. 34, no. 6, pp. 1517-1541, 2018. (SCI)
Chun-I Fan, Jun-Cheng Chen, Shi-Yuan Huang, Jheng-Jia Huang, and Wen-Tsuen Chen, ‘Provably Secure Timed-Release Proxy Conditional Re-Encryption,’ IEEE Systems Journal, vol. 11, no. 4 pp. 2291-2302, December 2017. (SCI)
Huige Li, Fangguo Zhang, and Chun-I Fan, ‘Deniable Searchable Symmetric Encryption,’ Information Sciences, vol. 402, pp. 233–243, September 2017. (SCI)
Chun-I Fan*, Yi-Fan Tseng, Jheng-Jia Huang, Shih-Fen Chen, and Hiroaki Kikuchi, ‘Multi-Receiver Predicate Encryption for Online Social Networks,’ IEEE Transactions on Signal and Information Processing over Networks, vol. 3, no. 2, pp. 388-403, June 2017. (SCI)
Shi-Yuan Huang, Chun-I Fan*, and Yi-Fan Tseng, ‘Enabled/Disabled Predicate Encryption in Clouds,’ Future Generation Computer Systems - The International Journal of Grid Computing and eScience, vol. 62, pp. 148-160, September 2016. (SCI)
Chun-I Fan* and Vincent Shi-Ming Huang , ‘Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy,’ Applied Sciences-Basel, vol. 6, no. 6, 176, 2016. (31 pages); doi:10.3390/app6060176 (SCI)
Chun-I Fan*, Yu-Kuang Liang, and Chien-Nan Wu, ‘Privacy Enhancement for Fair PayWord-Based Micropayment,’ Security and Communication Networks, vol. 9, no. 5, pp. 380–388, March 2016. (SCI)
Chun-I Fan* and Yi-Fan Tseng, ‘Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security,’ Symmetry, vol. 7, no. 4, 2015, pp. 1856-1881. doi:10.3390/sym7041856 (SCI)
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, and Chun-I Fan, ‘A Secure Dynamic Identity based Authentication Protocol with Smart Cards for Multi-Server Architecture,’ Journal of Information Science and Engineering, vol. 31, no. 6, pp. 1975-1992, November, 2015. (SCI)
Yu-Chi Chen, Raylin Tso, Gowboa Horng, Chun-I Fan, and Ruei-Hau Hsu, ‘Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes,’ Journal of Information Science and Engineering, vol. 31, no.1, pp. 297-314, January 2015. (SCI)
Chun-I Fan*, Ming-Te Chen, Yu-Kuang Liang, and Long-Sian Chen, ‘Truly Anonymous Paper Submission and Review Scheme,’ Transactions on Data Privacy, vol. 7, no. 3, December 2014, 283 ~ 308. (EI)
Chun-I Fan*, Vincent Shi-Ming Huang, and He-Ming Ruan, ‘Arbitrary-State Attribute-Based Encryption with Dynamic Membership,’ IEEE Transactions on Computers, vol. 63, no. 8, August 2014, 1951~1961. (SCI)
Chun-I Fan*, Yi-Hui Lin, Tuan-Hung Hsu, and Ruei-Hau Hsu, ‘Interdomain Identity-Based Key Agreement Schemes,’ Mathematical Problems in Engineering, vol. 2014, Article ID 865367, 18 pages, 2014. doi: 10.1155/2014/865367 (SCI)
Chun-I Fan* and Shi-Yuan Huang, ‘Timed-Release Predicate Encryption and Its Extensions in Cloud Computing,’ Journal of Internet Technology, vol. 15, no. 3, pp. 413~426, May 2014. (SCI)
Chun-I Fan, Chien-Nan Wu, and Wei-Kuei Chen, ‘On-line/Off-line Blind Signature,’ Information-An International Interdisciplinary Journal, vol. 17, no. 4, April 2014, pp. 1541~1558.
Chun-I Fan*, Wei-Zhe Sun, and Hoi-Tung Hau, ‘Date Attachable Offline Electronic Cash Scheme,’ special issue on Recent Advances in Information Security, The Scientific World Journal, vol. 2014, Article ID 216973, 19 pages, 2014. doi:10.1155/2014/216973. (SCI)
Chun-I Fan*, Pei-Hsiu Ho, and Yi-Feng Tseng, ‘Strongly Secure Certificateless Signature Scheme Supporting Batch Verification,’ Mathematical Problems in Engineering, vol. 2014, Article ID 854135, 11 pages, 2014. doi:10.1155/2014/854135 (SCI)
Chun-I Fan*, Shi-Yuan Huang, and Yih-Loong Lai, ‘Privacy Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid,’ IEEE Transactions on Industrial Informatics, vol. 10, no. 1, February 2014, pp. 666~675. (SCI)
Chun-I Fan*, Shi-Yuan Huang, and William Artan, ‘Design and Implementation of Privacy Preserving Billing Protocol for Smart Grid,’ Journal of Supercomputing, vol. 66, no. 2, November 2013, pp. 841~862. (SCI)
Jheng-Jia Huang, Wen-Shenq Juang*, Chun-I Fan, and Horng-Twu Liaw, ‘Robust and Privacy Protection Authentication in Cloud Computing,’ International Journal of Innovative Computing, Information and Control, vol. 9, no. 11, November 2013, pp. 4247~4261. (EI)
Chun-I Fan* and Shi-Yuan Huang, ‘Controllable Privacy Preserving Search Based on Symmetric Predicate Encryption in Cloud Storage,’ Future Generation Computer Systems - The International Journal of Grid Computing and eScience, vol. 29, no. 7, September 2013, pp. 1716~1724. (SCI)
Chun-I Fan*, Vincent Shi-Ming Huang, and Yao-Chun Yu, ‘User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking,’ Mathematical and Computer Modelling, vol. 58, no. 1~2, July 2013, pp. 227~237. (SCI)
Chun-I Fan, Chien-Nan Wu, Wei-Zhe Sun, and Wei-Kuei Chen*, ‘Multi-Recastable E-Bidding Game with Dual-Blindness,’ Mathematical and Computer Modelling, vol. 58, no. 1~2, July 2013, pp. 68~78. (SCI)
Chun-I Fan*, Yi-Hui Lin, and Ruei-Hau Hsu, ‘Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11 Wireless LANs,’ IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 4, April 2013, pp. 672~680. (SCI)
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, and Chun-I Fan, ‘An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity,’ KSII Transactions on Internet and Information Systems, vol. 7, no. 1, January 2013, pp. 119~131. (SCI)
Chun-Ta Li*, Chi-Yao Weng, and Chun-I Fan, ‘Two-Factor User Authentication in Multi-Server Networks,’ International Journal of Security and Its Applications, vol. 6, no. 2, April 2012, pp. 261~267. (EI)
Chun-I Fan* and Yi-Hui Lin, ‘Full Privacy Minutiae-Based Fingerprint Verification for Low-Computation Devices,’ Journal of Convergence, vol. 3, no. 2, June 2012, pp. 21~24.
Ming-Te Chen, Chun-I Fan*, Wen-Shenq Juang, and Yi-Chun Yeh ‘An Efficient Electronic Cash Scheme with Multiple Banks Using Group Signature,’ International Journal of Innovative Computing, Information and Control, vol. 8. no. 7, July 2012, pp. 4469~4482. (SCI)
Chun-I Fan*, Wen-Shenq Juang, and Ming-Te Chen, ‘P2P Fair Content Exchange with Ownership Transfer,’ International Journal of Innovative Computing, Information and Control, vol. 8. no. 6, June 2012, pp. 3875~3890. (SCI)
Chun-I Fan, Ruei-Hau Hsu, and Wei-Kuei Chen*, ‘Privacy Protection for VANETs by Using an Efficient Revocable Message Authentication Scheme,’ Security and Communication Networks, vol. 5, no. 5, May, 2012, pp. 462~478. (SCI)
Chun-I Fan, Chien-Nan Wu, Wei-Kuei Chen*, and Wei-Zhe Sun ‘Attribute-Based Strong Designated-Verifier Signature Scheme,’ Journal of Systems and Software, vol. 85, no. 4, April 2012, pp. 944~959. (SCI)
Chi-Yuan Chen, Han-Chieh Chao, Tin-Yu Wu, Chun-I Fan, Jiann-Liang Chen, Yuh-Shyan Chen, and Jenq-Muh Hsu, ‘IoT-IMS Communication Platform for Future Internet,’ International Journal of Adaptive, Resilient and Autonomic Systems (IJARAS), IGI Global, Vol. 2, No. 4, pp. 73~93, 2011.
范俊逸, 黃士韋, ‘具隱私保護之車載網路通訊技術簡介,’ 資訊安全通訊, Vol. 17, No. 2, pp. 48~58, 2011
Chun-I Fan*, Wei-Zhe Sun, Chih-I Wang, and D. J. Guan, ‘Efficient and Flexible Encoding Scheme for Date Attachable Electronic Cash,’ Far East Journal of Applied Mathematics, vol. 51, no. 2, pp. 141~154, 2011.
Wen-Shenq Juang, Chun-I Fan*, and Ming-Te Chen, ‘Efficient Fair Content Exchange with Robust Watermark Ownership,’ International Journal of Innovative Computing, Information and Control, vol. 7. no. 8, August 2011, pp. 4653~4667. (SCI)
Chun-I Fan* and Wei-Zhe Sun, ‘Nearly Optimal Randomized Blind Signature Scheme Based on Modular Multiplicative Group over Integers,’ International Journal of Innovative Computing, Information and Control, vol. 7, no. 10, 2011, pp. 6001~6018. (SCI)
Chun-I Fan*, Ruei-Hau Hsu, and Pei-Hsiu Ho, ‘Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings,’ Journal of Information Science and Engineering, vol. 27, no. 3, 2011, pp. 969~982. (SCI)
Chun-I Fan* and Vincent Shi-Ming Huang, ‘Provably Secure Integrated On/Off-Line Electronic Cash for Flexible and Efficient Payment,’ IEEE Transactions on Systems, Man, and Cybernetics--Part C: Applications and Reviews, vol. 40, no. 5, 2010, pp. 567~579. (SCI)
Chun-I Fan*, Ling-Ying Huang, and Pei-Hsiu Ho, “Anonymous Multireceiver Identity-Based Encryption,” IEEE Transactions on Computers, vol. 59, no. 9, 2010, pp. 1239~1249. (SCI)
Chun-I Fan*, Pei-Hsiu Ho, and Ruei-Hau Hsu, "Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications," IEEE/ACM Transactions on Networking, vol. 18, no. 3, 2010, pp. 996~1009. (SCI)
Chun-I Fan*, Wei-Zhe Sun, and Vincent Shi-Ming Huang, “Provably Secure Randomized Blind Signature Scheme Based on Bilinear Pairing,” Computers and Mathematics with Applications, vol. 60, no. 2, 2010, pp. 285~293. (SCI)
Chun-I Fan* and Yi-Hui Lin, ‘Provably Secure Remote Truly Three-Factor Authentication Scheme with Privacy Protection on Biometrics,’ IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, 2009. pp. 933~945. (SCI)
Chun-I Fan*, Chun-Liang Chang, Ming-Te Chen, and Pei-Hsiu Ho, ‘Anonymous Electronic Lottery Protocol,’ Journal of Computers, vol. 20, no. 2, 2009, pp. 58~67.
Chun-I Fan*, Shi-Yuan Huang, Pei-Hsiu Ho, and Chin-Laung Lei, ‘Fair Anonymous Rewarding Based on Electronic Cash,’ Journal of Systems and Software, vol. 82, no. 7, 2009, pp. 1168-1176. (SCI)
Chun-I Fan*, Chih-I Wang, and Wei-Zhe Sun, ‘Fast Randomization Schemes For Chaum Blind Signatures,’ International Journal of Innovative Computing, Information and Control, vol. 5, no. 11, 2009, pp. 3887-3900. (SCI)
Chun-I Fan*, Ming-Te Chen, and Wei-Zhe Sun, ‘Buyer-Seller Watermarking Protocols with Off-Line Trusted Third Parties,’ International Journal of Ad Hoc and Ubiquitous Computing, vol. 4, no. 1, 2009, pp. 36-43. (SCI)
Chun-I Fan, D. J. Guan, Chih-I Wang, and Dai-Rui Lin*, ‘Cryptanalysis of Lee-Hwang-Yang Blind Signature Scheme,’ Computer Standards & Interfaces, vol. 31, no. 2, 2009, pp. 319-320. (SCI)
Chun-I Fan* and Ming-Te Chen, ‘A Secure Blind Signature Scheme for Computation Limited Users,’ International Journal of Applied Mathematics and Computer Sciences, vol. 5, no. 1, 2009, pp. 6-10.
Chun-I Fan* and Wei-Zhe Sun, ‘An Efficient Multi-Receipt Mechanism for Uncoercible Anonymous Electronic Voting,’ special issue on "Mathematical Modeling of Voting Systems and Elections: Theory and Applications," Mathematical and Computer Modelling, vol. 48, no. 9-10, 2008, pp. 1611–1627. (SCI)
Chun-I Fan* and Yu-Kuang Liang, ‘Anonymous Fair Transaction Protocols Based on Electronic Cash,’ International Journal of Electronic Commerce, vol. 13, no. 1, 2008, pp. 131-151. (SCI, SSCI)
范俊逸, 黃士銘, 謝銘晏, 唐彰隆, 楊鵬宇, 黃俊能,‘植基於跳躍式偵測之入侵偵測系統效能提升機制,’ 資通安全專論, T3:最新技術研究發展,論文編號:T97011, 財團法人國家實驗研究院科技政策研究與資訊中心, 2008, pp. 1-17.
Chun-I Fan*, Lin-Chuan Wu, and Vincent Shi-Ming Huang, ‘Cryptanalysis on Chen-Qiu-Zheng Blind Signature Scheme,’ Applied Mathematical Sciences, vol. 2, no. 16, 2008, pp. 787 – 791.
Chun-I Fan, Bo-Wei Lin, and Shi-Ming Huang, ‘Customer Efficient Electronic Cash Protocols,’ Journal of Organizational Computing and Electronic Commerce, vol. 17, no. 3, 2007, pp. 259-281. (SCI)
Chun-I Fan, Tzung-Bin Chiang, and Ruei-Hau Hsu, ‘Light-Weight Authentication and Key Exchange Protocols with Forward Secrecy for Digital Home,’ Journal of Computers, vol. 18, no. 2, 2007, pp. 61~73. (Invited Paper)
Chun-I Fan, Chien-Nan Wu, and Yung-Cheng Chan, ‘Cryptanalysis on Tan-Zhu Remote Password Authentication Scheme,’ International Mathematical Forum, vol. 1, no. 25-28, 2006, pp. 1383~1390. (Invited Paper)
Chun-I Fan, ‘Ownership-Attached Unblinding of Blind Signatures for Untraceable Electronic Cash,’ Information Sciences, vol. 176, no. 3, 2006, pp. 263-284. (SCI)
Chun-I Fan, Yung-Cheng Chan, and Zhi-Kai Zhang, ‘Robust Remote Authentication Scheme with Smart Cards,’ Computers & Security, vol. 24, no. 8, 2005, pp. 619-628. (SCI)
Chun-I Fan and Chin-Laung Lei, ‘Divisible Blind Signatures Based on Hash Chains,’ International Journal of Computers and Applications, vol. 26, no. 1, 2004, pp. 1-9. (EI)
Lin-Chuan Wu, Yi-Shiung Yeh, and Chun-I Fan, ‘Fail-Stop Blind Signature Scheme Based on the Integer Factorization,’ Journal of Discrete Mathematical Sciences and Cryptography, vol. 7, no. 3, 2004, pp. 281-290. (EI)
Wei-Kuei Chen and Chun-I Fan, ‘Blind One-Time Signature and Its Applications,’ Journal of Discrete Mathematical Sciences and Cryptography, vol. 7, no. 1, 2004, pp. 55-69. (EI)
Chun-I Fan, ‘Improved Low-Computation Partially Blind Signatures,’ Applied Mathematics and Computation, vol. 145, no. 2-3, 2003, pp. 853-867. (SCI)
Chun-I Fan, ‘Comments on Hwang-Lee-Lai Attack upon Fan-Lei Partially Blind Signature Scheme,’ IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E86-A, no. 7, 2003, pp. 1900-1901. (SCI)
Ming-Che Chang and Chun-I Fan, ‘The XML Digital Signature Standard and Its Applications,’ TL Technical Journal (A Journal of the Telecommunication Laboratories), vol. 33, no. 2, 2003, pp. 299~306.
Chun-I Fan and Chin-Laung Lei, ‘An Unlinkably Divisible and Intention Attachable Ticket Scheme for Runoff Elections,’ Journal of Network and Computer Applications, vol. 25, no. 2, 2002, pp. 93-107. (SCI)
Chun-I Fan and Chin-Laung Lei, ‘A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash,’ Journal of Information Science and Engineering, vol. 18, no. 1, 2002, pp. 47-58. (SCI)
Chun-I Fan and Wei-Kuei Chen, ‘An Efficient Blind Signature Scheme for Information Hiding,’ International Journal of Electronic Commerce, vol. 6, no. 1, 2001, pp. 93-100. (SCI, SSCI)
Chun-I Fan and Chin-Laung Lei, ‘Cryptanalysis on Improved User Efficient Blind Signatures,’ Electronics Letters, vol. 37, no. 10, 2001, pp. 630-631. (SCI)
Chun-I Fan*, Wei-Kuei Chen, and Yi-Shiung Yeh, ‘Randomization Enhanced Chaum’s Blind Signature Scheme,’ Advances in Research and Application of Network Security, Computer Communications, vol. 23, no. 17, 2000, pp. 1677-1680. (SCI)
Chun-I Fan, Wei-Kuei Chen, and Yi-Shiung Yeh, ‘Date Attachable Electronic Cash,’ Computer Communications, vol. 23, no. 4, 2000, pp. 425-428. (SCI)
Chin-Laung Lei and Chun-I Fan, ‘A Universal Single-Authority Election System,’ IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E81-A, no. 10, 1998, pp. 2186-2193. (SCI)
Chun-I Fan and Chin-Laung Lei*, ‘User Efficient Blind Signatures,’ IEE Electronics Letters, vol. 34, no. 6, 1998, pp. 544-546. (SCI)
Chun-I Fan and Chin-Laung Lei*, ‘Low-Computation Partially Blind Signatures for Electronic Cash,’ IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E81-A, no. 5, 1998, pp. 818-824. (SCI)
Chun-I Fan and Chin-Laung Lei, ‘Multi-Recastable Ticket Schemes for Electronic Voting,’ IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E81-A, no. 5, 1998, pp. 940-949. (SCI)
Chun-I Fan and Chin-Laung Lei, ‘Low-Computation Blind Signature Schemes Based on Quadratic Residues,’ IEE Electronics Letters, vol. 32, no. 17, 1996, pp. 1569-1570. (SCI)
Chun-I Fan and Chin-Laung Lei, ‘Efficient Blind Signature Scheme Based on Quadratic Residues,’ IEE Electronics Letters, vol. 32, no. 9, 1996, pp. 811-813. (SCI)
Chun-I Fan, Chin-Laung Lei, and Wen-Shenq Juang, ‘Cryptanalysis of an Intractable Trapdoor One-way Function Based on Quadratic Residue,’ Journal of Computer, vol. 6, no. 4, 1994, pp. 1-8.
Papers in Books:
Chun-I Fan, Pei-Jen Tsai, Jheng-Jia Huang, and Yi-Fan Tseng, ‘Anonymous Multi-Receiver Certificateless Encryption with CCA Security,’ Progress on Cryptography – 20 Years of Cryptography in Taiwan, McGraw-Hill International Enterprises, LLC., Taiwan Branch, 2014, ISBN 978-986-341-147-5, pp. 565-581.
Jen-Chun Chang, Chun-I Fan, and Ruei-Hau Hsu, ‘Chapter 22: Security Attacks of Vehicular Networks,’ Telematics Communication Technologies and Vehicular Networks: Wireless Architectures and Applications, Ed. Chung-Ming Huang and Yuh-Shyan Chen, IGI Global, December 2009. (ISBN 978-1-60566-840-6)
Chun-I Fan, Wei-Kuei Chen, and Yi-Shiung Yeh, ‘Blind Signatures with Double-Hashed Messages for Fair Electronic Elections and Ownership Claimable Digital Cash,’ Enterprise Information Systems, Kluwer Academic Publishers, 2000, pp. 191-197.
Chun-I Fan and Chin-Laung Lei, ‘A Multi-Recastable Ticket Scheme for Electronic Elections,’ Advances in Cryptology-AISACRYPT'96, Lecture Notes in Computer Science 1163, Springer-Verlag, 1996, pp. 116-124. (EI, SCI)