Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Claudia Calabrese
Pei Ni
Benjamin Taubmann
Hao Mao
Peter Malec
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
L. W. Zhang
Home
/
Author
/
CHANGLU LIN
Author Info
Open Visualization
Name
Affiliation
Papers
CHANGLU LIN
Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fujian, China
31
Collaborators
Citations
PageRank
49
117
14.00
Referers
Referees
References
279
409
280
Search Limit
100
409
Publications (31 rows)
Collaborators (49 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Efficient Threshold Function Secret Sharing With Information-Theoretic Security
0
0.34
2020
Optimal Threshold Changeable Secret Sharing with New Threshold Change Range.
0
0.34
2020
An Efficient Authentication Scheme for Blockchain-Based Electronic Health Records.
1
0.35
2019
Design of Secret Reconstruction With Optimal Communication Efficiency.
0
0.34
2018
A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction.
0
0.34
2018
Leveled Hierarchical Identity-Based Fully Homomorphic Encryption From Learning With Rounding
0
0.34
2018
Large Branching Tree Based Dynamic Provable Data Possession Scheme.
0
0.34
2017
Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues.
1
0.35
2016
A Robust Electronic Voting Scheme Against Side Channel Attack.
1
0.35
2016
Security Analysis on Secure Untraceable Off-line Electronic Cash System.
0
0.34
2016
Role-Based Signature and Its Security Proof.
0
0.34
2016
Fair secret reconstruction in ( t , n ) secret sharing
2
0.37
2015
A Provable Data Possession Scheme with Data Hierarchy in Cloud.
0
0.34
2015
基于FOO投票协议的无收据电子投票方案 (Receipt-freeness Electronic Voting Scheme Based on FOO Voting Protocol).
0
0.34
2015
Secure universal designated verifier identity-based signcryption
3
0.41
2014
ID-Based Signcryption with Restrictive Unsigncryption
0
0.34
2013
Proactive Secret Sharing without a Trusted Party
0
0.34
2013
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
2
0.43
2013
Universal designated verifier signcryption
2
0.39
2012
Analysis on Token-Controlled Public Key Encryption
0
0.34
2012
Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability
2
0.39
2011
Fully Deniable Message Authentication Protocols Preserving Confidentiality
4
0.40
2011
Strong (n,t,n) verifiable secret sharing scheme
32
1.28
2010
Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families
9
0.51
2010
Design of DL-based certificateless digital signatures
13
1.00
2009
Detection and identification of cheaters in (, ) secret sharing scheme
29
1.24
2009
Efficient identity-based GQ multisignatures
3
0.48
2009
Information-theoretically Secure Strong Verifiable Secret Sharing
0
0.34
2009
Ideal Perfect Multilevel Threshold Secret Sharing Scheme
6
0.49
2009
Anonymous Identity Based Encryption With Plaintext Awareness In The Two Identities Setting
0
0.34
2008
Provably Secure Convertible Nominative Signature Scheme
7
0.49
2008
1