Authenticated group key transfer protocol based on secret sharing L Harn, C Lin IEEE transactions on computers 59 (6), 842-846, 2010 | 232 | 2010 |
Strong (n, t, n) verifiable secret sharing scheme L Harn, C Lin Information Sciences 180 (16), 3059-3064, 2010 | 127 | 2010 |
Detection and identification of cheaters in (t, n) secret sharing scheme L Harn, C Lin Designs, Codes and Cryptography 52, 15-24, 2009 | 119 | 2009 |
An efficient authentication scheme for blockchain-based electronic health records F Tang, S Ma, Y Xiang, C Lin IEEE access 7, 41678-41689, 2019 | 118 | 2019 |
Design of DL-based certificateless digital signatures L Harn, J Ren, C Lin Journal of Systems and Software 82 (5), 789-793, 2009 | 62 | 2009 |
Efficient group Diffie–Hellman key agreement protocols L Harn, C Lin Computers & Electrical Engineering 40 (6), 1972-1980, 2014 | 38 | 2014 |
Ideal perfect multilevel threshold secret sharing scheme C Lin, L Harn, D Ye 2009 Fifth International Conference on Information Assurance and Security 2 …, 2009 | 34 | 2009 |
Fair secret reconstruction in (t, n) secret sharing L Harn, C Lin, Y Li Journal of Information Security and Applications 23, 1-7, 2015 | 33 | 2015 |
Efficient on-line/off-line signature schemes based on multiple-collision trapdoor hash families L Harn, WJ Hsin, C Lin The Computer Journal 53 (9), 1478-1484, 2010 | 27 | 2010 |
A publicly verifiable multi-secret sharing scheme with outsourcing secret reconstruction C Lin, H Hu, CC Chang, S Tang IEEE Access 6, 70666-70673, 2018 | 19 | 2018 |
Provably secure convertible nominative signature scheme W Zhao, C Lin, D Ye Information Security and Cryptology: 4th International Conference, Inscrypt …, 2009 | 19 | 2009 |
Verifiable, reliable, and privacy-preserving data aggregation in fog-assisted mobile crowdsensing X Yan, WWY Ng, B Zeng, C Lin, Y Liu, L Lu, Y Gao IEEE Internet of Things Journal 8 (18), 14127-14140, 2021 | 18 | 2021 |
Security of truncated MACs P Wang, D Feng, C Lin, W Wu Information Security and Cryptology: 4th International Conference, Inscrypt …, 2009 | 15 | 2009 |
Fully deniable message authentication protocols preserving confidentiality L Harn, CY Lee, C Lin, CC Chang The Computer Journal 54 (10), 1688-1699, 2011 | 12 | 2011 |
Unconditionally secure verifiable secret sharing scheme C Lin, L Harn AISS: Advances in Information Sciences and Service Sciences 4 (17), 514-518, 2012 | 11 | 2012 |
An efficient group authentication for group communications L Harn, C Lin arXiv preprint arXiv:1306.1436, 2013 | 9 | 2013 |
Unconditionally secure multi-secret sharing scheme C Lin, L Harn 2012 IEEE International Conference on Computer Science and Automation …, 2012 | 8 | 2012 |
Universal designated verifier signcryption F Tang, C Lin, P Ke Network and System Security: 6th International Conference, NSS 2012 …, 2012 | 7 | 2012 |
Efficient identity-based GQ multisignatures L Harn, J Ren, C Lin International Journal of Information Security 8, 205-210, 2009 | 7 | 2009 |
Efficient threshold function secret sharing with information-theoretic security J Luo, LF Zhang, F Lin, C Lin IEEE Access 8, 6523-6532, 2020 | 6 | 2020 |