|
Research Interesting:
應用密碼學[Apply
Cryptography] & 資訊安全[Computer
Security] |
|
Vita
Hwang, Shin-Jia is the
associate professor of Department of Computer Science and Information
Engineering, Tamkang University, Tamsui, Taipei, Taiwan. During the
academic years of 1996-2001, he was on the faculty of the Department of
Information Management at Chaoyang University of Technology, WuFeng,
Taichung Country, Taiwan. He received his B.S. degree in information
and computer engineering from Chung-Yuan Christian University, Chungli,
Taiwan in 1987 and his MS degree in computer science and information
engineering from National Chung Cheng University, Chiayi, Taiwan in 1992.
He received his Ph.D. degree in computer and information science form
National Chaio Tung University, Hsinchu, Taiwan. His research interests
include applied cryptography,
computer
security and related issues. |
|
Education
|
國立交通大學資訊科學研究所博士
1992年9月至1996年6月 |
|
國立中正大學資訊工程研究所碩士
1990年2月至1992年1月
|
|
私立中原大學資訊工程學系學士
1983年9月至1987年6月 |
|
|
Honor
|
2004年淡江大學92學年度優良導師 |
|
2003年淡江大學92學年度第一類研究獎勵 |
|
2000年碩士班學生許琪慧之碩士論文獲得第十四屆龍騰論文獎(資訊科技類)入選獎 |
|
2000年朝陽科技大學八十八學年度學術研究與建教合作績優獎 |
|
1999年行政院國家科學委員會八十八年度甲種研究獎勵 |
|
1999年朝陽科技大學八十七學年度論文研究佳作獎 |
|
1998年行政院國家科學委員會八十七年度甲種研究獎勵 |
|
1998年朝陽科技大學八十六學年度學術研究與建教合作績優獎 |
|
1992年於國立中正大學資訊工程所碩士班畢業時獲斐陶斐榮譽獎 |
|
|
Experiences
|
淡江大學資訊工程系副教授 2001年8月~迄今 |
|
朝陽科技大學資訊管理系副教授
1996年8月~2001年7月
|
|
國立交通大學資訊科學所助教
1992年9月~1995年6月
|
|
國立中正大學電算中心程式設計師
1992年2月~1992年7月 |
|
|
Publication list
International Journal Papers
[1] Chang,
C. C. and Hwang, S. J., "A Secure Broadcasting Scheme Based
on Discrete Logarithms," Control and Computers, Vol. 20, No. 2,
1992, pp. 49-53.
[2] Chang,
C. C. and Hwang, S. J., "Using Smart Cards to Authenticate
Remote Passwords," An International Journal: Computers & Mathematics
with Applications, Vol. 26, No. 7, 1993, pp. 19-27. (SCI)
[3] Chang,
C. C., Hwang, S. J. and Buehrer, D. J., "New Concepts for
Multiple Stack Systems: Born and Reborn," The Journal of Systems and
Software, Vol. 27, pp. 45-54, 1994. (EI)
[4] Hwang,
S. J., Chang, C. C., and Yang, W. P.,
" Some Active Attacks on Fast Server-Aided Secret Computation Protocols
for Modular Exponentiation," PreProceeding of Cryptography: Policy and
Algorithms Conference, Brisbane Australia, July 3-5, 1995, pp.
471-486, also published on Proceeding of Cryptography: Policy and
Algorithms, Springer-Verlag, New York, 1996, pp. 215-227. (EI)
[5] Hwang,
S. J., Chang, C. C., and Yang, W. P.,
"Authentication Encryption Schemes with Message Linkage," Information
Processing Letters, Vol.58, August, 1996, pp. 189-194. (SCI, EI)
[6] Hwang,
S. J., Chang, C. C., and Yang, W. P.,
"An Efficient Dynamic Threshold Scheme," IEICE Transactions on
Information and Systems, Vol.E79-D, No. 7, July 1996, pp.936-942.
(SCI, EI)
[7] Hwang,
S. J., Chang, C. C., and Yang, W. P.,
"Two Efficient Server-aided RSA Secret Computation Protocols Against
Active Attacks," IEICE Transactions on Fundamentals of Electronics,
Communications and Computer Sciences, Vol. E79-A, No. 9, September
1996, pp. 1504-1511. (SCI, EI)
[8] Chang,
C. C., and Hwang, S. J., ”A Simple Approach for Generating RSA Keys,” Information Processing Letters, Vol. 63, 1997, pp.
19-21. (SCI, EI)
[9] Hwang,
S. J., Chen, C. Y. and Chang, C. C.,
"An Encryption/ Multisignature Scheme with Specified Receiving Groups,"
Computer Systems: Science and Engineering, Vol. 2, 1998, pp. 109-112.
(EI)
[10]Hwang,
S. J., "Simple
Improvements of Harn,s Digital Signature for Diffie-Hellman Public keys",
Electronics Letters, Vol. 35, No. 22, 1999, pp.1942-1943. (SCI,EI)
[11]Hwang,
S. J. and Chang, C. C., "A New
Efficient Server-Aided RSA Secret Computation Protocol Against Active
Attacks,” Proceedings of the Ninth National Conference on Information
Security, Taichung, Taiwan, R.O.C., 1999, pp. 46-49, IEICE
Transactions on Fundamentals of Electronics, Communications and Computer
Sciences, Vol. E83-A, No.3, March 2000, pp. 567-570.
(NSC87-2213-E-324-002) (SCI, EI)
[12]Hwang,
S. J.,
and Chen, Chiu-Chin, “A New Multi-Proxy Multi-Signature Scheme,”
2001 National Computer Symposium: Information Security, Taipei,
Taiwan, R.O.C., Dec. 20-21,
2001,
pp. F019-F026. Also appear in Applied Mathematics and Computation.
(SCI, EI)
[13]Hwang,
S. J.,
and Chen, Chiu-Chin, “Cryptanalysis of Nonrepudiable Threshold
Proxy Signature Schemes with Known Signers,” 2002 Information Security
Conference, Taichung, Taiwan, R.O.C., May 16-17, 2002,
pp. 243-246. Also in Fundamental Informaticae, Vol. 53, No. 3, Nov.
2002, pp. 131-134.
[14]
Hwang, Shin-Jia,
and Li, En-Ti (李恩提),
“Cryptanalysis of Shieh-Lin-Yang-Sun signature scheme,”
IEEE Communications Letters,
VOL. 7, Issue 4, April 2003 pp. 195-196. (SCI)
[15]
Hwang, Shin-Jia,
and Chen, Chiu-Chin (陳秋錦),
“A New Multi-Proxy Multi-Signature Scheme,” 2001 National Computer
Symposium: Information Security, Taipei, Taiwan, R.O.C., Dec. 20-21,
2001, pp. F019-F026, also in Applied Mathematics and Computation,
Vol 147, Issue 1, 5 Jan. 2004, pp. 57-67. (SCI, EI)
[16]
Hwang, Shin-Jia,
Hwang, Min-Shiang (黃明祥),
and Tzeng, Shiang-Feng (曾祥峰),
“A New Digital Multisignature Scheme with Distinguished Signing
Authorities,” Journal of Information Science and Engineering, Vol.
19, No. 5, Sep. 2003, pp. 881-887. (SCI)
[17]Hwang,
Shin-Jia,
and Lee, Yun-Hwa (李韻華),
“Repairing ElGamal-like multi-signature schemes using self-certified
public keys,” 2002 International Computer Symposium (ICS 2002):
International Conference on Cryptography and Information Security,
Hualien, Taiwan, R.O.C., Dec. 18-21, 2002, D6-5. Also in Applied
Mathematics and Computation, 2004. (SCI, EI)
[18]Hwang,
Shin-Jia,
“Improvement of Tseng et al’s authenticated encryption scheme,” to appear
in
Applied Mathematics and Computation,
2004. (SCI, EI)
[19]Hwang,
Shin-Jia
and Chan, Ching-Chung (詹景中),
“Imrpovement of Li et al’s Generalization of Proxy Signature Schemes,” to
appear in
Computers and Security,
2004 (EI). Partial result “Cryanalysis of Li et al’s Generalization of
Proxy Signature Schemes” also in 2003 National Computer Symposium,
Taichung , Taiwan, R.O.C., Dec. 18-19, 2003, pp. 1321-1324.
[20]Sung,
Hung-Min (孫宏民),
Hsieh, Bin-Tsan (謝濱燦),
and Hwang, Shin-Jia, “Secure Email Protocols Providing Perfect
Forward Secrecy (具完美安全性之電子郵件通訊協定)”,
2000 Information Security Conference, Taiwan, R.O.C., 2000,
pp.112-118. Also in IEEE Communication Letters (SCI, EI).
Local Journal
Papers
[1] Chang,
C. C., Diay, J. Y., Buehrer, D. J. and Hwang, S. J.,
"Sharing a Circular Storage for Multiple Stacks," Journal of the
Chinese Institute of Engineers, Vol. 15, No. 2, 1992, pp. 115- 121. (EI)
[2] Hwang,
S. J., Chang, C. C., and Yang, W. P.,
"An Encryption/Signature Scheme with Low Message Expansion," Journal of
the Chinese Institute of Engineers, Vol. 18, No. 4, 1995, pp. 591-595.
(EI)
[3] Hwang,
S. J. and Shi, Chi-Hwai, "A
Simple Multi-Proxy Signature Scheme," Communications of the CCISA,
Vol. 8, No. 1, Dec. 2001, pp. 88-92.
[4] Hwang,
Shin-Jia, and Chen, Chiu-Chin (陳秋錦),
“A New Proxy Multi-Signature Scheme,” The 2001 International
Workshop on Cryptology and Network Security, Taipei, Taiwan, R.O.C.,
Sep. 26-28, 2001, pp. 199-204. Also in Communication of IICM(中華民國資訊學會期刊),
Vol. 6, No. 1, Mar. 2003, pp. 11-18.
International Conference
Papers |
[1] Chang,
C. C. and Hwang, S. J., "Cryptographic Authentication of
Passwords," Proceedings 25th Annual 1991 IEEE International Carnahan
Conference on Security Technology, Taipei, Taiwan, R.O.C., Oct. 1-3,
1991, pp. 126-130. (EI)
[2] Chang,
C. C., Hwang, S. J. and Buehrer, D. J.,
"On the Design
Databases for Concurrent Spatial Match Retrieval," Proceedings of
International Conference on Information and Systems, AMSE 1991,
Hangzhou, China, Oct. 1991, Vol. 2, pp. 1034- 1038.
[3] Chang,
C. C. and Hwang, S. J.,
"Sharing a Dynamic Secret," IEEE
International Phoenix Conference on Computers and Communications,
Wyndham Paradise Valley Resort Scottsdale, Arizona, USA, April 1-3, 1992.
[4] 張真誠、黃仁俊及黃心嘉,
“英漢字典壓縮研究,”
ICCIP’92, pp. 142-151
[5] Hwang,
S. J., Chang, C. C., and Yang, W. P.,
"A New Verification Mechanism on the Server-Aided Secret Computation
Protocols for the Modular Exponentiation," 1994 International Computer
Symposium, Hsinchu, Taiwan, R.O.C., Dec. 1994, pp. 445-450.
[6] Hwang,
S. J., Chang, C. C., and Yang, W. P.,
“The Key Distribution Protocol for Mobile Communication Systems with Untrusted Centers,” 1996 International Computer Symposium (ICS’96):
International Conference on Cryptography and Information Security,
Kaohsiung, Taiwan, R.O.C., Dec. 19-21, 1996, pp. 67-74.
[7] Hwang,
S. J. and Chang, C.-C., “Dynamic
Secret Sharing Scheme with Cheater Detection,” Lecture Notes in
Computer Science Proceeding of the 1996 1st Australasian
Conference on Information Security and Privacy (ACISP’96), Jun 24-26
1996 v1172 1996 Wollongong,,, Aust, p. 48 CODEN: LNCSD9
[8] Hwang,
S. J. and Shi, Chi-Hwai,: “A Proxy
Signature Scheme without Using One-way Hash Functions,” 2000
International Computer Symposium (ICS’2000): International Conference on
Cryptography and Information Security, Chiayi, Taiwan, R.O.C., Dec.,
2000, pp.60-64
[9] Hwang,
S. J., Shi, Chi-Hwai
and Huang, Yu-Hui (黃鈺惠),“An Attack on Sun et al.’s Group Signature Scheme,” 2000
International Computer Symposium (ICS’2000): International Conference on
Cryptography and Information Security, Chiayi, Taiwan, R.O.C., Dec.,
2000, pp.39-42.
[10]Chang,
C. C., Hwang, S. J., and Wu, W. B., “Improvements on Generalized
Threshold Cryptosystems,” Proceedings of the Second International
Conference on Information and Management Sciences (IMS2003), Chengdu,
China, Aug. 2003, pp. 265-268.
Local Conference
Papers
[1] Chang,
Chin-Chen, Danie J. and Hwang S. J., “A Simple Secret key
Distribution System”, 1995 Information Security Conference,
[2] Chang,
Chin-Chen, Hwang, S. J. and Hwang Ren-Jun, “A Digitized
Signature Linkage Scheme”, 1996 Information Security Conference,
[3] Hwang,
S. J., Chang, C. C., and Yang, W. P.,
"A Time-Stamped Password Authentication System,” 1997 Information
Security Conference, Taipei, Taiwan, R.O.C. , 1997, pp. 165-169.
[4] Hwang,
S. J., Chang, C. C., and Yang, W. P.,
"An Improved Authenticated Encryption Schemes,” 1997 Information
Security Conference, Taipei, Taiwan, R.O.C., 1997, pp. 209-212.
(NSC86-2621-E-324-002-T)
[5] Hwang,
S. J. and Shi, Chi-Hwai
(許琪慧), "Specifiable Proxy Signature Schemes," 1999 National Computer
Symposium, Taipei, Taiwan, R.O.C., Dec. 20-21, 1999, pp. C190-C197.
[6] Hwang,
S. J. and Shi, Chi-Hwai, "The
Security Analysis of Two Authenticated Key Agreement Schemes," 2000
Information Security Conference, Taiwan, R.O.C., 2000, pp.440-441.
[7] Hwang,
S. J. and Shi, Chi-Hwai, “A New
ID-Based Public Key Cryptosystem,” 2001 Information Security Conference,
Taiwan, R.O.C., 2001, pp.253-258.
[8] Hwang,
Shin-Jia
and Li, En-Ti, “A Proxy Automatic Signature Scheme Using a Compiler in
Distributed Systems,” 2004 Information Security Conference, Taipei,
Taiwan, R.O.C., Jun. 10-11, 2004, pp. 345- 352.
Technical Report
[1] Hwang,
S. J. and Shi, Chi-Hwai, "Specifiable
Proxy Signature Schemes," Department of Information Management, CYUT,
Technical Report CYUT-IM-TR-1999-002, Nov. 1999.
[2] Hwang,
S. J. and Shi, Chi-Hwai, "The
Security Analysis of Two Authenticated Key Agreement Schemes," Department
of Information Management, CYUT, Technical Report CYUT-IM-TR-2000-013,
2000.
[3] Hwang,
S. J. and Shi, Chi-Hwai, "A Simple
Multi-Proxy Signature Scheme," Department of Information Management, CYUT,
Technical Report CYUT-IM-TR-2000-014, 2000.
[4] Hwang,
S. J., Shi, Chi-Hwai and Huang, Yu-Hui, "An Attack on Sun et al’s Group Signature Scheme," Department of
Information Management, CYUT, Technical Report CYUT-IM-TR-2000-017, 2000.
[5] 黃心嘉與曾祥峰,
"可在多家商店消費之小額付款系統(A
New Micropayment System for Multiple Stores)," Department of Information
Management, CYUT, Technical Report CYUT-IM-TR-2000-022, 2000.
|