Changlu Lin

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A threshold changeable dynamic quantum secret sharing scheme with cheating identification
Quantum Information Processing
2024-11-18Paper
Standard \((k, n)\)-threshold hierarchical quantum secret sharing
Quantum Information Processing
2024-05-30Paper
Bivariate polynomial-based secret sharing schemes with secure secret reconstruction
Information Sciences
2024-02-05Paper
Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding
Information Security Practice and Experience
2023-06-30Paper
Full threshold change range of threshold changeable secret sharing
Designs, Codes and Cryptography
2023-06-20Paper
Ramp scheme based on CRT for polynomial ring over finite field
Journal of Systems Science and Complexity
2023-04-26Paper
Optimal threshold changeable secret sharing with new threshold change range2023-03-21Paper
The homogeneous distance of \((1+u^2)\)-constacyclic codes over \(\mathbb{F}_2[u/\langle u^3\rangle\) and its applications]
Journal of Applied Mathematics and Computing
2022-05-31Paper
Secret sharing schemes based on the dual of Golay codes
Cryptography and Communications
2022-04-01Paper
scientific article; zbMATH DE number 7480448 (Why is no real title available?)2022-02-23Paper
Communication Efficient Secret Sharing With Small Share Size
IEEE Transactions on Information Theory
2022-02-17Paper
Non-interactive and verifiable outsourcing computation scheme for modular exponentiation2021-09-29Paper
Authenticated Group Key Transfer Protocol Based on Secret Sharing
IEEE Transactions on Computers
2017-07-27Paper
A provable data possession scheme with data hierarchy in cloud
Information Security and Cryptology
2016-07-25Paper
An identity-based ring signature scheme based on cubic residues2014-06-30Paper
An identity-based threshold signature scheme with non-trusted dealer2014-02-28Paper
Strong \((n, t, n)\) verifiable secret sharing scheme
Information Sciences
2010-09-02Paper
Security of Truncated MACs
Information Security and Cryptology
2009-04-29Paper
Detection and identification of cheaters in \((t,n)\) secret sharing scheme
Designs, Codes and Cryptography
2009-03-31Paper


Research outcomes over time


This page was built for person: Changlu Lin