Lein Harn

According to our database1, Lein Harn authored at least 106 papers between 1989 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 



On csauthors.net:


UMKESS: user-oriented multi-group key establishments using secret sharing.
Wireless Networks, 2020

Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN).
Security and Communication Networks, 2019

Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks.
IEEE Access, 2019

Provably Secure Group Authentication in the Asynchronous Communication Model.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Polynomial-based Lightweight Key Management in a Permissioned Blockchain.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange.
IEEE Systems Journal, 2018

Centralized Group Key Establishment Protocol without a Mutually Trusted Third Party.
MONET, 2018

Hierarchical Polynomial-Based Key Management Scheme in Fog Computing.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Novel Threshold Cryptography with Membership Authentication and Key Establishment.
Wireless Personal Communications, 2017

(t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial.
Wireless Personal Communications, 2017

Computation-efficient key establishment in wireless group communications.
Wireless Networks, 2017

How to Share Secret Efficiently over Networks.
Security and Communication Networks, 2017

A Novel Design of Membership Authentication and Group Key Establishment Protocol.
Security and Communication Networks, 2017

Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security.
J. Inf. Sci. Eng., 2017

A Practical Hybrid Group Key Establishment for Secure Group Communications.
Comput. J., 2017

Realizing secret sharing with general access structure.
Inf. Sci., 2016

Full-healing group-key distribution in online social networks.
IJSN, 2016

Threshold Signature Scheme without Using Polynomial Interpolation.
I. J. Network Security, 2016

New Results on Ideal Multipartite Secret Sharing and its Applications to Group Communications.
Wireless Personal Communications, 2015

Conference key establishment protocol using a multivariate polynomial and its applications.
Security and Communication Networks, 2015

An image-based key agreement protocol using the morphing technique.
Multimedia Tools Appl., 2015

Fair secret reconstruction in (t, n) secret sharing.
J. Inf. Sec. Appl., 2015

Dynamic threshold secret reconstruction and its application to the threshold cryptography.
Inf. Process. Lett., 2015

A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets.
Int. J. Communication Systems, 2015

An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs.
Wireless Personal Communications, 2014

Multipartite Secret Sharing Based on CRT.
Wireless Personal Communications, 2014

Simulatable and secure certificate-based threshold signature without pairings.
Security and Communication Networks, 2014

Secure universal designated verifier identity-based signcryption.
Security and Communication Networks, 2014

Verifiable secret sharing based on the Chinese remainder theorem.
Security and Communication Networks, 2014

Secure secret reconstruction and multi-secret sharing schemes with unconditional security.
Security and Communication Networks, 2014

Multilevel threshold secret sharing based on the Chinese Remainder Theorem.
Inf. Process. Lett., 2014

Weighted Secret Sharing Based on the Chinese Remainder Theorem.
I. J. Network Security, 2014

An authenticated group key distribution mechanism using theory of numbers.
Int. J. Communication Systems, 2014

Comments on 'fair (t, n) threshold secret sharing scheme'.
IET Information Security, 2014

Generalised cheater detection and identification.
IET Information Security, 2014

Efficient group Diffie-Hellman key agreement protocols.
Comput. Electr. Eng., 2014

Group key distribution with full-healing property.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications.
IEEE Trans. Wireless Communications, 2013

Group Authentication.
IEEE Trans. Computers, 2013

Verifiable symmetric polynomial-based key distribution schemes.
Security and Communication Networks, 2013

An Anonymous Multi-Receiver Encryption Based on RSA.
I. J. Network Security, 2013

An efficient group authentication for group communications.
CoRR, 2013

$k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography.
IEEE Trans. Circuits Syst. Video Techn., 2012

Efficient (n, t, n) secret sharing schemes.
Journal of Systems and Software, 2012

Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications.
IEEE Trans. Wireless Communications, 2011

Secure Key Transfer Protocol Based on Secret Sharing for Group Communications.
IEICE Transactions, 2011

Fully Deniable Message Authentication Protocols Preserving Confidentiality.
Comput. J., 2011

Contract signature in e-commerce.
Comput. Electr. Eng., 2011

Authenticated Group Key Transfer Protocol Based on Secret Sharing.
IEEE Trans. Computers, 2010

Strong (n, t, n) verifiable secret sharing scheme.
Inf. Sci., 2010

Distributed security for multi-agent systems - review and applications.
IET Information Security, 2010

Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families.
Comput. J., 2010

Contract Signatures in E-Commerce Applications.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Design of DL-based certificateless digital signatures.
Journal of Systems and Software, 2009

Hybrid Trust Structure in Self-Organizing Networks.
IJITN, 2009

Efficient identity-based GQ multisignatures.
Int. J. Inf. Sec., 2009

Detection and identification of cheaters in ( t , n ) secret sharing scheme.
Des. Codes Cryptogr., 2009

Information-theoretically Secure Strong Verifiable Secret Sharing.
Proceedings of the SECRYPT 2009, 2009

Ideal Perfect Multilevel Threshold Secret Sharing Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Generalized Ring Signatures.
IEEE Trans. Dependable Sec. Comput., 2008

Design of Fully Deniable Authentication Service for E-mail Applications.
IEEE Communications Letters, 2008

Efficient identity-based RSA multisignatures.
Comput. Secur., 2008

An Improved Time-Bound Hierarchical Key Assignment Scheme.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Security in User-Assisted Communications.
Proceedings of the Wireless Telecommunications Symposium, 2007

New architecture for intra-domain network security issues.
Commun. ACM, 2006

Ring Signature Based on ElGamal Signature.
Proceedings of the Wireless Algorithms, 2006

An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

A Hierarchical Key Management Approach for Secure Multicast.
Proceedings of the Architecture of Computing Systems, 2006

Improved DSA variant for batch verification.
Appl. Math. Comput., 2005

Storage-Optimal Key Sharing with Authentication in Sensor Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Key Management for Multicast Fingerprinting.
Proceedings of the Information Systems Security, First International Conference, 2005

The e-Traveler's Check.
Proceedings of The 2005 International Conference on Internet Computing, 2005

Simple certified e-check with a partial PKI solution.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

Integrating Diffie-Hellman key exchange into the digital signature algorithm (DSA).
IEEE Communications Letters, 2004

Location-aware key management scheme for wireless sensor networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

On the security of wireless network access with enhancements.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

The GH Public-Key Cryptosystem.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

Public-key cryptosystems based on cubic finite field extensions.
IEEE Trans. Information Theory, 1999

Authentication protocols with nonrepudiation services in personal communication systems.
IEEE Communications Letters, 1999

Fair Reconstruction of a Secret.
Inf. Process. Lett., 1995

Authentication Protocols for Personal Communication Systems.
Proceedings of the ACM SIGCOMM 1995 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, Cambridge, MA, USA, August 28, 1995

A Protocol for Establishing Secure Communication Channels in a Large Network.
IEEE Trans. Knowl. Data Eng., 1994

Key management for decentralized computer network services.
IEEE Trans. Communications, 1993

ID-Based Cryptographic Schemes for User Identification, Digital Signature, and Key Distribution.
IEEE Journal on Selected Areas in Communications, 1993

A software authentication system for information integrity.
Comput. Secur., 1992

An l-Span Generalized Secret Sharing Scheme.
Proceedings of the Advances in Cryptology, 1992

Public-Key Cryptosystem Based on the Discrete Logarithm Problem.
Proceedings of the Advances in Cryptology, 1992

Group-Oriented Undeniable Signature Schemes without the Assistance of a Mutually Trusted Party.
Proceedings of the Advances in Cryptology, 1992

A Software Authentication System for the Prevention of Computer Viruses.
Proceedings of the ACM 20th Annual Conference on Computer Science, 1992

A Generalized Secret Sharing Scheme With Cheater Detection.
Proceedings of the Advances in Cryptology, 1991

Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence.
Proceedings of the Advances in Cryptology, 1991

Generalized Threshold Cryptosystems.
Proceedings of the Advances in Cryptology, 1991

On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets.
Proceedings of the Advances in Cryptology, 1991

An Efficient Probabilistic Encryption Scheme.
Inf. Process. Lett., 1990

A cryptographic key generation scheme for multilevel data security.
Comput. Secur., 1990

Entropy as a measure of database information.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial.
IEEE Trans. Software Eng., 1989

Linearly shift knapsack public-key cryptosystem.
IEEE Journal on Selected Areas in Communications, 1989

A new threshold scheme and its application in designing the conference key distribution cryptosystem.
Inf. Process. Lett., 1989

Authenticated Group Key Distribution Scheme for a Large Distributed Network.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

A New Scheme for ID-Based Cryptosystems and Signature.
Proceedings of the Proceedings IEEE INFOCOM '89, 1989

Password Authentication Based On Public-Key Distribution Cryptosystem.
Proceedings of the Fifth International Conference on Data Engineering, 1989

Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space.
Proceedings of the Advances in Cryptology, 1989

Two new efficient cryptosystems based on Rabin's scheme: alternatives to RSA cryptosystem.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989

An extended cryptographic key generation scheme for multilevel data security.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989