Chao Lin

ORCID: 0000-0002-0101-8531
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Complexity and Algorithms in Graphs
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Authentication Protocols Security
  • Vehicular Ad Hoc Networks (VANETs)
  • User Authentication and Security Systems
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Cryptography and Residue Arithmetic
  • Security in Wireless Sensor Networks
  • Digital Rights Management and Security
  • FinTech, Crowdfunding, Digital Finance
  • Technology and Security Systems
  • Adversarial Robustness in Machine Learning
  • UAV Applications and Optimization
  • IPv6, Mobility, Handover, Networks, Security
  • DNA and Biological Computing
  • Autonomous Vehicle Technology and Safety
  • Digital Transformation in Industry
  • Opportunistic and Delay-Tolerant Networks
  • Geometric and Algebraic Topology
  • Peer-to-Peer Network Technologies

Fujian Normal University
2010-2025

Jinan University
2023-2024

Wuhan University
2018-2023

State Key Laboratory of Cryptology
2020-2021

Institute of Information Engineering
2021

Chinese Academy of Sciences
2021

Xiamen University of Technology
2020-2021

Peng Cheng Laboratory
2019-2020

Nanjing University of Posts and Telecommunications
2018

Nanjing University of Information Science and Technology
2016

A recent trend in both industry and research is the Internet of Drones, which has applications civilian military settings. However, drones (also known as unmanned aerial vehicles) are generally not designed with security mind, there fundamental privacy issues that need study. Hence, this article, we study architecture its requirements. We also outline potential solutions to address challenging such leakage, data confidentiality protection, flexible accessibility, hope article will provide...

10.1109/mcom.2017.1700390 article EN IEEE Communications Magazine 2018-01-01

While Vehicular Ad-hoc Networks (VANETs) can potentially improve driver safety and traffic mangement efficiency (e.g. through timely sharing of status among vehicles), security privacy are two ongoing issues that need to be addressed. Hence, solutions such as conditional privacy-preserving authentication (CPPA) protocols have been proposed. However, CPPA generally far from being ready for deployment in VANETs, example due key/certificate management limitations PKI-based or intractable...

10.1109/tits.2020.3002096 article EN publisher-specific-oa IEEE Transactions on Intelligent Transportation Systems 2020-06-30

Increasingly, governments around the world, particularly in technologically advanced countries, are exploring or implementing smart homes, related facilities for benefits of society. The capability to remotely access and control Internet Things (IoT) devices (e.g., capturing images, audios, other information) is convenient but risky, as vulnerable can be exploited conduct surveillance perform nefarious activities on users organizations. This highlights necessity designing a secure efficient...

10.1109/jiot.2019.2944400 article EN IEEE Internet of Things Journal 2019-10-01

Blockchain, a distributed ledger technology, can potentially be deployed in wide range of applications. Among these applications, decentralized payment systems (e.g. Bitcoin) have been one the most mature blockchain applications with widespread adoption. While early designs are often currency choice by cybercriminals (e.g., ransomware incidents), they only provide pseudo-anonymity, sense that anyone deanonymize Bitcoin transactions using information blockchain. To strengthen privacy...

10.1109/tifs.2020.2969565 article EN IEEE Transactions on Information Forensics and Security 2020-01-01

Vehicular Ad-hoc Networks (VANETs) are with great potentials to facilitate traffic management and improve driver safety. Blockchain-based conditional privacy-preserving authentication (BCPPA) is proposed achieve an optimal tradeoff among anonymity, traceability key/certificate in VANETs. Existing BCPPA protocols mitigate these security privacy challenges by adding a significant cost on verification traceability. As result, current solutions fail meet high mobility, low latency, real-time...

10.1109/tdsc.2022.3164740 article EN IEEE Transactions on Dependable and Secure Computing 2022-01-01

Blockchain can potentially be deployed in a wide range of applications due to its capability ensure decentralization, transparency, and immutability. In this paper, we design cryptographic membership authentication scheme (i.e., authenticating graph data) support blockchain-based identity management systems (BIMS). Such system is designed bind digital object real-world entity. Specifically, introduce new transitively closed undirected (TCUGA) scheme, which only needs use node signatures...

10.1109/access.2018.2837650 article EN cc-by-nc-nd IEEE Access 2018-01-01

Outsourcing computations have been widely used to meet the growing computing demands, although achieving trust in an untrusted (or a zero-trust) environment can be challenging practice. Fair payment, candidate solution, potentially facilitate fair trading among outsourcing computation participants such as users and workers. However, most existing solutions including traditional e-cash-based or blockchain-based, may compromise worker's fairness (i.e., does not achieve robust fairness, since...

10.1109/tifs.2021.3073818 article EN IEEE Transactions on Information Forensics and Security 2021-01-01

The Industrial Internet of Things (IIoT) incorporates massive physical devices to collect ambient data. Due the limited types equipment in IIoT, most data has be saved on a cloud server before it can processed and analyzed. ciphertext generated by traditional encryption techniques is difficult search subsequent use. Public-key with keyword (PEKS) provide as well confidential searching, but PEKS schemes are susceptible internal guessing attacks (IKGAs) caused space commonly used keywords. To...

10.1109/jiot.2023.3262660 article EN IEEE Internet of Things Journal 2023-03-28

Existing (popular) blockchain architectures, including the widely used Ethereum and Hyperledger, are generally not designed to achieve conflicting properties such as anonymity regulation, transparency confidentiality. In this article, we propose a privacy-preserving permissioned architecture (PPChain) that permits one also introduce where PPChain's is modified from of Ethereum. Specifically, integrate cryptographic primitives (group signature broadcast encryption), adopt practical byzantine...

10.1109/jsyst.2020.3019923 article EN IEEE Systems Journal 2020-09-17

Electronic Medical Records (EMRs) sharing enhances healthcare and biomedical discoveries but faces challenges: data provider centralization limited interoperability. Blockchain can address these issues, existing systems struggle with malicious EMR propagation due to challenges concerning the authenticity, non-repudiation, integrity of digital signatures they employ. Universal Designated Verifier Signature Proof (UDVSP) may be an intuitive solution, UDVSP schemes are inefficient...

10.1109/tsc.2023.3289319 article EN IEEE Transactions on Services Computing 2023-06-28

Credit system is generally associated with the banking and financial institutions, although it has far reaching implications for residents of countries, such as U.S., particularly those a poor credit history. Specifically, score computation (CSC) quantifies an individual's value or risk, which used by well other entities (e.g., during purchasing insurance policies application rental properties), to facilitate their decision-making whether approve policy purchase level premium). Although...

10.1109/jsyst.2020.3045076 article EN IEEE Systems Journal 2021-01-05

Payment Channel Networks (PCNs) are innovative second-layer scaling technologies that aim to improve transaction rates, reduce on-chain storage costs, and enable efficient atomic swaps for blockchain-based cryptocurrencies. Despite offering features like relationship anonymity, scriptless script, cross-chain fairness, current PCNs encounter challenges in achieving identity anonymity maintaining the fungibility of cryptocurrency units. PayMo, proposed ESORICS'22, addresses payment but is...

10.1109/tifs.2023.3346177 article EN IEEE Transactions on Information Forensics and Security 2023-12-22

As an equivalent of a handwritten signature, digital signature can resist against information tampering and identity impersonation during communication, but it fails to meet the specific anonymity requirement in circumstances like voting, credit reporting, whistle-blowing. Ring was introduced as special further achieve anonymity, classical schemes constructed from single ring were faced with linearly increasing size. In CRYPTO 2021, Yuen et al. proposed novel construction paradigm (namely,...

10.1016/j.csi.2023.103763 article EN cc-by-nc-nd Computer Standards & Interfaces 2023-06-17

Federated Learning (FL) enables multiple clients to collaboratively train a model without sharing their private data. However, the deployment of FL in real-world applications is vulnerable various attacks from both malicious servers and clients. While cryptographic methods are effective resisting server-side attacks, they undermine capability client-side defenses that rely on plaintext updates. Several valuable targeting hybrid have been devised address this challenge, concentrating specific...

10.1109/tifs.2023.3336521 article EN IEEE Transactions on Information Forensics and Security 2023-11-23

The sensing-as-a-service (SaaS) model has been explored to address the challenge of intractability managing a large number sensors faced by future smart cities. However, how effectively share sensor data without compromising confidentiality, privacy protection, and fair trading third parties is one critical issues that must be solved in SaaS While blockchain shows promise solving these issues, existing blockchain-based sharing (BBDS) systems are difficult apply cities because many unresolved...

10.1145/3397202 article EN ACM Transactions on Internet Technology 2020-07-07

Abstract Cloud storage has been widely used in remote data management, although correct of the outsourced file is still challenging practice. Proofs Retrievability (PoRs), a storage-oriented cryptographic tool, support integrity checking and efficient retrieval file. However, due to lack fully credible oversight mechanism or serious dependence on trusted third party, most PoRs are incapable achieving essential straightforward trust between participants (i.e. client server). While blockchain...

10.1093/comjnl/bxae001 article EN The Computer Journal 2024-01-27
Coming Soon ...