Changlu Lin

From MaRDI portal
Person:991241


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A threshold changeable dynamic quantum secret sharing scheme with cheating identification
Quantum Information Processing
2024-11-18Paper
Standard \((k, n)\)-threshold hierarchical quantum secret sharing
Quantum Information Processing
2024-05-30Paper
Bivariate polynomial-based secret sharing schemes with secure secret reconstruction
Information Sciences
2024-02-05Paper
Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding
Information Security Practice and Experience
2023-06-30Paper
Full threshold change range of threshold changeable secret sharing
Designs, Codes and Cryptography
2023-06-20Paper
Ramp scheme based on CRT for polynomial ring over finite field
Journal of Systems Science and Complexity
2023-04-26Paper
Optimal threshold changeable secret sharing with new threshold change range
 
2023-03-21Paper
The homogeneous distance of \((1+u^2)\)-constacyclic codes over \(\mathbb{F}_2[u/\langle u^3\rangle\) and its applications]
Journal of Applied Mathematics and Computing
2022-05-31Paper
Secret sharing schemes based on the dual of Golay codes
Cryptography and Communications
2022-04-01Paper
scientific article; zbMATH DE number 7480448 (Why is no real title available?)
 
2022-02-23Paper
Communication Efficient Secret Sharing With Small Share Size
IEEE Transactions on Information Theory
2022-02-17Paper
Non-interactive and verifiable outsourcing computation scheme for modular exponentiation
 
2021-09-29Paper
Authenticated Group Key Transfer Protocol Based on Secret Sharing
IEEE Transactions on Computers
2017-07-27Paper
A provable data possession scheme with data hierarchy in cloud
Information Security and Cryptology
2016-07-25Paper
An identity-based ring signature scheme based on cubic residues
 
2014-06-30Paper
An identity-based threshold signature scheme with non-trusted dealer
 
2014-02-28Paper
Strong \((n, t, n)\) verifiable secret sharing scheme
Information Sciences
2010-09-02Paper
Security of Truncated MACs
Information Security and Cryptology
2009-04-29Paper
Detection and identification of cheaters in \((t,n)\) secret sharing scheme
Designs, Codes and Cryptography
2009-03-31Paper


Research outcomes over time


This page was built for person: Changlu Lin