Lin Sun

Affiliations:
  • Qingdao University, College of Liberal Arts, China


According to our database1, Lin Sun authored at least 22 papers between 2013 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Cryptanalysis of an Anonymous and Traceable Group Data Sharing in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2021

Identity-based encryption with equality test and datestamp-based authorization mechanism.
Theor. Comput. Sci., 2021

Public key encryption supporting equality test and flexible authorization without bilinear pairings.
Comput. Commun., 2021

Security Analysis of the First Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks.
Comput. J., 2021

2020
On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model.
Comput. J., 2020

Leakage-free ID-Based Signature, Revisited.
Comput. J., 2020

2019
Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys.
Comput. J., 2019

2018
Certificateless public key encryption with equality test.
Inf. Sci., 2018

Generic construction of public key encryption, identity-based encryption and signcryption with equality test.
Inf. Sci., 2018

An efficient RSA-based certificateless public key encryption scheme.
Discret. Appl. Math., 2018

On the Security of Secure Server-Designation Public Key Encryption with Keyword Search.
Comput. J., 2018

Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme.
Comput. J., 2018

2017
Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme.
Comput. J., 2017

2016
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations.
IACR Cryptol. ePrint Arch., 2016

2015
Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential.
IACR Cryptol. ePrint Arch., 2015

Comment on "Identity-based non-interactive key distribution with forward security".
Des. Codes Cryptogr., 2015

Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications.
Comput. Secur., 2015

2013
Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols.
IACR Cryptol. ePrint Arch., 2013

Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications.
IACR Cryptol. ePrint Arch., 2013

Fully Deniable Mutual Authentication Protocol Based on RSA Signature.
IACR Cryptol. ePrint Arch., 2013

Efficient CCA-secure Threshold Public-Key Encryption Scheme.
IACR Cryptol. ePrint Arch., 2013

Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks.
IACR Cryptol. ePrint Arch., 2013


  Loading...