


default search action
Changlu Lin
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j40]Feng Wang
, Changlu Lin, Manli Yuan:
Revisiting "online/offline provable data possession" schemes. Comput. Stand. Interfaces 91: 103898 (2025) - 2024
- [j39]Fulin Li
, Tingyan Chen
, Meng Li
, Changlu Lin
:
Efficient and Verifiable General Quantum Secret Sharing Based on Special Entangled State. IEEE Internet Things J. 11(8): 14127-14135 (2024) - [j38]Keke Huang
, Huidan Hu
, Changlu Lin
:
BAKAS-UAV: A Secure Blockchain-Assisted Authentication and Key Agreement Scheme for Unmanned Aerial Vehicles Networks. IEEE Internet Things J. 11(22): 36858-36883 (2024) - [j37]Fulin Li, Qingao Wu, Changlu Lin, Shixin Zhu:
Standard (k, n)-threshold hierarchical quantum secret sharing. Quantum Inf. Process. 23(5): 168 (2024) - [j36]Fulin Li, Qingao Wu, Changlu Lin, Shixin Zhu:
A threshold changeable dynamic quantum secret sharing scheme with cheating identification. Quantum Inf. Process. 23(10): 358 (2024) - 2023
- [j35]Jian Ding, Changlu Lin
, Fuchun Lin, Huaxiong Wang:
Full threshold change range of threshold changeable secret sharing. Des. Codes Cryptogr. 91(7): 2421-2447 (2023) - [j34]Jian Ding, Pinhui Ke, Changlu Lin, Huaxiong Wang:
Ramp Scheme Based on CRT for Polynomial Ring over Finite Field. J. Syst. Sci. Complex. 36(1): 129-150 (2023) - [j33]Fucai Luo
, Haiyan Wang
, Changlu Lin
, Xingfu Yan
:
ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data. IEEE Trans. Inf. Forensics Secur. 18: 4970-4983 (2023) - [c16]Jiangtao Liao, Huidan Hu, Keke Huang, Huasong Jin, Changlu Lin:
LDfuzz: A Directed Greybox Fuzzer for Solidity Smart Contract. MSN 2023: 488-495 - 2022
- [j32]Fucai Luo, Saif M. Al-Kuwari, Changlu Lin, Fuqun Wang, Kefei Chen:
Provable Data Possession Schemes from Standard Lattices for Cloud Computing. Comput. J. 65(12): 3223-3239 (2022) - [j31]Jian Ding, Pinhui Ke, Changlu Lin, Huaxiong Wang:
Bivariate polynomial-based secret sharing schemes with secure secret reconstruction. Inf. Sci. 593: 398-414 (2022) - [j30]Jian Ding, Hongju Li, Changlu Lin
:
The homogeneous distance of $$(1+u^2)$$-constacyclic codes over $$\mathbb {F}_2[u]/\langle u^3\rangle $$ and its applications. J. Appl. Math. Comput. 68(1): 83-100 (2022) - [j29]Jian Ding
, Changlu Lin
, Huaxiong Wang
, Chaoping Xing:
Communication Efficient Secret Sharing With Small Share Size. IEEE Trans. Inf. Theory 68(1): 659-669 (2022) - [c15]Lin Zhu, Changlu Lin, Fuchun Lin, Liang Feng Zhang:
Post-Quantum Cheating Detectable Private Information Retrieval. SEC 2022: 431-448 - 2021
- [j28]Jian Ding, Changlu Lin
, Sihem Mesnager:
Secret sharing schemes based on the dual of Golay codes. Cryptogr. Commun. 13(6): 1025-1041 (2021) - [j27]Xingfu Yan
, Wing W. Y. Ng
, Biao Zeng
, Changlu Lin, Yuxian Liu, Lu Lu, Ying Gao:
Verifiable, Reliable, and Privacy-Preserving Data Aggregation in Fog-Assisted Mobile Crowdsensing. IEEE Internet Things J. 8(18): 14127-14140 (2021) - 2020
- [j26]Jinglong Luo
, Liang Feng Zhang
, Fuchun Lin
, Changlu Lin
:
Efficient Threshold Function Secret Sharing With Information-Theoretic Security. IEEE Access 8: 6523-6532 (2020) - [j25]Enhong Chen, Yan Zhu
, Changlu Lin, Kewei Lv:
Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature. Frontiers Comput. Sci. 14(4): 144806 (2020) - [j24]Fuxiao Zhou, Yanping Li, Changlu Lin:
A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security. Int. J. Netw. Secur. 22(4): 645-654 (2020) - [c14]Jian Ding, Changlu Lin, Fuchun Lin:
Optimal Threshold Changeable Secret Sharing with New Threshold Change Range. ProvSec 2020: 361-378
2010 – 2019
- 2019
- [j23]Fei Tang, Shuai Ma
, Yong Xiang, Changlu Lin
:
An Efficient Authentication Scheme for Blockchain-Based Electronic Health Records. IEEE Access 7: 41678-41689 (2019) - [j22]Huidan Hu, Changlu Lin, Chin-Chen Chang, Lanxiang Chen:
Enhanced secure data backup scheme using multi-factor authentication. IET Inf. Secur. 13(6): 649-658 (2019) - 2018
- [j21]Changlu Lin
, Huidan Hu, Chin-Chen Chang, Shaohua Tang
:
A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction. IEEE Access 6: 70666-70673 (2018) - [j20]Xingfu Yan, Changlu Lin
, Rongxing Lu, Chunming Tang:
Design of Secret Reconstruction With Optimal Communication Efficiency. IEEE Commun. Lett. 22(8): 1556-1559 (2018) - [c13]Xi Chen, Yun Liu, Yong Li, Changlu Lin:
Threshold Proxy Re-encryption and Its Application in Blockchain. ICCCS (4) 2018: 16-25 - [c12]Fucai Luo, Kunpeng Wang, Changlu Lin:
Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding. ISPEC 2018: 101-115 - 2017
- [j19]Yong Li, Ge Yao, Huaqun Wang, Changlu Lin:
Large Branching Tree Based Dynamic Provable Data Possession Scheme. J. Inf. Sci. Eng. 33(3): 653-673 (2017) - 2016
- [j18]Feng Wang, Chin-Chen Chang, Changlu Lin, Shih-Chang Chang:
Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues. Int. J. Netw. Secur. 18(1): 90-98 (2016) - [j17]Feng Wang, Chin-Chen Chang, Changlu Lin:
Security Analysis on Secure Untraceable Off-line Electronic Cash System. Int. J. Netw. Secur. 18(3): 454-458 (2016) - [j16]Yining Liu, Wei Guo, Chi Cheng, Ching-Fang Hsu, Junyan Qian, Changlu Lin:
A Robust Electronic Voting Scheme Against Side Channel Attack. J. Inf. Sci. Eng. 32(6): 1471-1486 (2016) - [j15]Fucai Luo, Changlu Lin, Yan Zhu:
Role-Based Signature and Its Security Proof. J. Inf. Sci. Eng. 32(6): 1525-1539 (2016) - [c11]Ge Yao, Yong Li, Linan Lei, Huaqun Wang, Changlu Lin:
An Efficient Dynamic Provable Data Possession Scheme in Cloud Storage. GPC 2016: 63-81 - 2015
- [j14]Changlu Lin, Yong Li, Kewei Lv, Chin-Chen Chang:
Ciphertext-Auditable Identity-Based Encryption. Int. J. Netw. Secur. 17(1): 23-28 (2015) - [j13]Lein Harn, Changlu Lin
, Yong Li:
Fair secret reconstruction in (t, n) secret sharing. J. Inf. Secur. Appl. 23: 1-7 (2015) - [j12]Fenfen Luo, Changlu Lin, Shengyuan Zhang, Yining Liu:
基于FOO投票协议的无收据电子投票方案 (Receipt-freeness Electronic Voting Scheme Based on FOO Voting Protocol). 计算机科学 42(8): 180-184 (2015) - [c10]Changlu Lin, Fucai Luo, Huaxiong Wang, Yan Zhu
:
A Provable Data Possession Scheme with Data Hierarchy in Cloud. Inscrypt 2015: 301-321 - 2014
- [j11]Lein Harn, Changlu Lin:
Efficient group Diffie-Hellman key agreement protocols. Comput. Electr. Eng. 40(6): 1972-1980 (2014) - [j10]Xi Chen, Yun Liu, Chin-Chen Chang, Changlu Lin:
The design of dynamic access control for hierarchical sensor networks with key-lock-pair mechanism. Int. J. Ad Hoc Ubiquitous Comput. 17(2/3): 162-173 (2014) - [j9]Changlu Lin, Fei Tang, Pinhui Ke, Lein Harn, Shengyuan Zhang:
Secure universal designated verifier identity-based signcryption. Secur. Commun. Networks 7(2): 434-444 (2014) - 2013
- [c9]Fei Tang, Changlu Lin, Hongda Li:
ID-Based Signcryption with Restrictive Unsigncryption. INCoS 2013: 485-489 - [c8]Xiuqun Wang, Changlu Lin, Yong Li:
Proactive Secret Sharing without a Trusted Party. INCoS 2013: 511-515 - [i1]Lein Harn, Changlu Lin:
An efficient group authentication for group communications. CoRR abs/1306.1436 (2013) - 2012
- [c7]Changlu Lin, Yong Li, Sriramkrishnan Srinivasan, Li Lu:
Analysis on Token-Controlled Public Key Encryption. MSN 2012: 87-91 - [c6]Fei Tang, Changlu Lin, Pinhui Ke:
Universal Designated Verifier Signcryption. NSS 2012: 126-134 - 2011
- [j8]Lein Harn, Chia-Yin Lee, Changlu Lin, Chin-Chen Chang:
Fully Deniable Message Authentication Protocols Preserving Confidentiality. Comput. J. 54(10): 1688-1699 (2011) - [c5]Fei Tang, Changlu Lin, Yong Li, Shengyuan Zhang:
Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability. TrustCom 2011: 800-805 - 2010
- [j7]Lein Harn, Wen-Jung Hsin, Changlu Lin:
Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families. Comput. J. 53(9): 1478-1484 (2010) - [j6]Lein Harn, Changlu Lin:
Strong (n, t, n) verifiable secret sharing scheme. Inf. Sci. 180(16): 3059-3064 (2010) - [j5]Lein Harn, Changlu Lin:
Authenticated Group Key Transfer Protocol Based on Secret Sharing. IEEE Trans. Computers 59(6): 842-846 (2010)
2000 – 2009
- 2009
- [j4]Lein Harn, Changlu Lin:
Detection and identification of cheaters in ( t , n ) secret sharing scheme. Des. Codes Cryptogr. 52(1): 15-24 (2009) - [j3]Lein Harn, Jian Ren, Changlu Lin:
Efficient identity-based GQ multisignatures. Int. J. Inf. Sec. 8(3): 205-210 (2009) - [j2]Lein Harn, Jian Ren, Changlu Lin:
Design of DL-based certificateless digital signatures. J. Syst. Softw. 82(5): 789-793 (2009) - [c4]Changlu Lin, Lein Harn, Dingfeng Ye:
Ideal Perfect Multilevel Threshold Secret Sharing Scheme. IAS 2009: 118-121 - [c3]Changlu Lin, Lein Harn, Dingfeng Ye:
Information-theoretically Secure Strong Verifiable Secret Sharing. SECRYPT 2009: 233-238 - 2008
- [j1]Changlu Lin, Yong Li
, Qiupu Zhang, Dingfeng Ye:
Anonymous Identity Based Encryption with Plaintext Awareness in the Two Identities Setting. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(12): 3828-3832 (2008) - [c2]Wei Zhao, Changlu Lin, Dingfeng Ye:
Provably Secure Convertible Nominative Signature Scheme. Inscrypt 2008: 23-40 - [c1]Peng Wang, Dengguo Feng, Changlu Lin, Wenling Wu:
Security of Truncated MACs. Inscrypt 2008: 96-114
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint