Changlu Lin

Orcid: 0000-0002-2868-3398

According to our database1, Changlu Lin authored at least 52 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient and Verifiable General Quantum Secret Sharing Based on Special Entangled State.
IEEE Internet Things J., April, 2024

2023
Ramp Scheme Based on CRT for Polynomial Ring over Finite Field.
J. Syst. Sci. Complex., February, 2023

ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2023

Full threshold change range of threshold changeable secret sharing.
Des. Codes Cryptogr., 2023

2022
The homogeneous distance of $$(1+u^2)$$-constacyclic codes over $$\mathbb {F}_2[u]/\langle u^3\rangle $$ and its applications.
J. Appl. Math. Comput., February, 2022

Communication Efficient Secret Sharing With Small Share Size.
IEEE Trans. Inf. Theory, 2022

Bivariate polynomial-based secret sharing schemes with secure secret reconstruction.
Inf. Sci., 2022

Provable Data Possession Schemes from Standard Lattices for Cloud Computing.
Comput. J., 2022

Post-Quantum Cheating Detectable Private Information Retrieval.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

2021
Verifiable, Reliable, and Privacy-Preserving Data Aggregation in Fog-Assisted Mobile Crowdsensing.
IEEE Internet Things J., 2021

Secret sharing schemes based on the dual of Golay codes.
Cryptogr. Commun., 2021

2020
A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security.
Int. J. Netw. Secur., 2020

Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature.
Frontiers Comput. Sci., 2020

Efficient Threshold Function Secret Sharing With Information-Theoretic Security.
IEEE Access, 2020

Optimal Threshold Changeable Secret Sharing with New Threshold Change Range.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020

2019
Enhanced secure data backup scheme using multi-factor authentication.
IET Inf. Secur., 2019

An Efficient Authentication Scheme for Blockchain-Based Electronic Health Records.
IEEE Access, 2019

2018
Design of Secret Reconstruction With Optimal Communication Efficiency.
IEEE Commun. Lett., 2018

A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction.
IEEE Access, 2018

Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding.
Proceedings of the Information Security Practice and Experience, 2018

Threshold Proxy Re-encryption and Its Application in Blockchain.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Large Branching Tree Based Dynamic Provable Data Possession Scheme.
J. Inf. Sci. Eng., 2017

2016
Role-Based Signature and Its Security Proof.
J. Inf. Sci. Eng., 2016

A Robust Electronic Voting Scheme Against Side Channel Attack.
J. Inf. Sci. Eng., 2016

Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues.
Int. J. Netw. Secur., 2016

Security Analysis on Secure Untraceable Off-line Electronic Cash System.
Int. J. Netw. Secur., 2016

An Efficient Dynamic Provable Data Possession Scheme in Cloud Storage.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

2015
基于FOO投票协议的无收据电子投票方案 (Receipt-freeness Electronic Voting Scheme Based on FOO Voting Protocol).
计算机科学, 2015

Fair secret reconstruction in (t, n) secret sharing.
J. Inf. Secur. Appl., 2015

Ciphertext-Auditable Identity-Based Encryption.
Int. J. Netw. Secur., 2015

A Provable Data Possession Scheme with Data Hierarchy in Cloud.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Secure universal designated verifier identity-based signcryption.
Secur. Commun. Networks, 2014

The design of dynamic access control for hierarchical sensor networks with key-lock-pair mechanism.
Int. J. Ad Hoc Ubiquitous Comput., 2014

Efficient group Diffie-Hellman key agreement protocols.
Comput. Electr. Eng., 2014

2013
An efficient group authentication for group communications.
CoRR, 2013

Proactive Secret Sharing without a Trusted Party.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

ID-Based Signcryption with Restrictive Unsigncryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Universal Designated Verifier Signcryption.
Proceedings of the Network and System Security - 6th International Conference, 2012

Analysis on Token-Controlled Public Key Encryption.
Proceedings of the 8th International Conference on Mobile Ad-hoc and Sensor Networks, 2012

2011
Fully Deniable Message Authentication Protocols Preserving Confidentiality.
Comput. J., 2011

Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Authenticated Group Key Transfer Protocol Based on Secret Sharing.
IEEE Trans. Computers, 2010

Strong (n, t, n) verifiable secret sharing scheme.
Inf. Sci., 2010

Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families.
Comput. J., 2010

2009
Design of DL-based certificateless digital signatures.
J. Syst. Softw., 2009

Efficient identity-based GQ multisignatures.
Int. J. Inf. Sec., 2009

Detection and identification of cheaters in ( <i>t</i> , <i>n</i> ) secret sharing scheme.
Des. Codes Cryptogr., 2009

Information-theoretically Secure Strong Verifiable Secret Sharing.
Proceedings of the SECRYPT 2009, 2009

Ideal Perfect Multilevel Threshold Secret Sharing Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Anonymous Identity Based Encryption with Plaintext Awareness in the Two Identities Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Provably Secure Convertible Nominative Signature Scheme.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Security of Truncated MACs.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008


  Loading...