Lein Harn

ORCID: 0000-0003-0922-6148
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Advanced Authentication Protocols Security
  • Security in Wireless Sensor Networks
  • Chaos-based Image/Signal Encryption
  • Cryptography and Residue Arithmetic
  • User Authentication and Security Systems
  • Complexity and Algorithms in Graphs
  • Advanced Steganography and Watermarking Techniques
  • Cryptographic Implementations and Security
  • Coding theory and cryptography
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • graph theory and CDMA systems
  • Internet Traffic Analysis and Secure E-voting
  • Mobile Ad Hoc Networks
  • Network Security and Intrusion Detection
  • Blockchain Technology Applications and Security
  • Access Control and Trust
  • Geometric and Algebraic Topology
  • Energy Efficient Wireless Sensor Networks
  • IPv6, Mobility, Handover, Networks, Security
  • Wireless Communication Security Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Security and Verification in Computing
  • Advanced Malware Detection Techniques

University of Missouri–Kansas City
2016-2025

Central China Normal University
2023

Wuhan University of Technology
2023

Hubei University of Technology
2015-2020

University of Missouri
1989-2017

K.N.Toosi University of Technology
2014

Chunghwa Telecom (Taiwan)
2003

California State University, San Marcos
2001

Sunrise Medical (United States)
1998

Kansas City University
1992-1993

The paper presents group-oriented (t,n) threshold digital signature schemes based on the difficulty of solving discrete logarithm problem. By employing these schemes, any t out n users in a group can represent this to sign signature. size and verification time are equivalent that an individual In other words, (t, n) scheme has following five properties: (i) is mutually generated by at least members; (ii) signature; (iii) process simplified because there only one public key required; (iv) be...

10.1049/ip-cdt:19941293 article EN IEE Proceedings - Computers and Digital Techniques 1994-01-01

Sensor networks are composed of a large number low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several pairwise key schemes have been proposed for distributed networks. These randomly select set from pool and install the in memory each sensor. After deployment, sensors can up by using preinstalled keys. Due to lack tamper-resistant hardware, vulnerable node capture attacks. The information gained captured nodes used...

10.1145/1029102.1029110 article EN 2004-10-25

A new type of authentication, call group which authenticates all users belonging to the same is proposed in this paper. The authentication specially designed for group-oriented applications. no longer a one-to-one as most conventional user schemes have one prover and verifier; but, it many-to-many has multiple provers verifiers. We propose basic t-secure m-user n-group scheme ((t, m, n) GAS), where t threshold scheme, m number participated n members group, based on Shamir's (t, secret...

10.1109/tc.2012.251 article EN IEEE Transactions on Computers 2012-10-16

Public-key digital certificate has been widely used in public-key infrastructure (PKI) to provide user public key authentication. However, the itself cannot be as a security factor authenticate user. In this paper, we propose concept of generalized (GDC) that can authentication and agreement. A GDC contains user's information, such information driver's license, birth certificate, etc., signature signed by trusted authority (CA). does not contain any key. Since have private pair, management...

10.1109/twc.2011.042211.101913 article EN IEEE Transactions on Wireless Communications 2011-05-20

With the increasing popularity and wide application of Internet, users (such as managers data consumers) in Industrial Internet Things (IIoT) can remotely analyze control real-time collected by various smart sensor devices. However, there are many security privacy issues process transmitting through public channels IIoT environment. In order to against illegal access opponents, a novel anonymous user authentication key agreement scheme based on hash elliptic curve encryption is proposed this...

10.1109/tsc.2023.3257569 article EN IEEE Transactions on Services Computing 2023-03-16

The cryptographic properties of third-order linear feedback shift-register (LFSR) sequences over GF(p) are investigated. A fast computational algorithm for evaluating the kth term a characteristic sequence order 3 is presented. Based on these properties, new public-key distribution scheme and an RSA-type encryption proposed. Their security, implementation, information rate, cost schemes discussed.

10.1109/18.796413 article EN IEEE Transactions on Information Theory 1999-01-01

The ElGamal type digital signature schemes have received wide attention recently. can provide 'subliminal' channel, message recovery, multisignature, etc. authors investigate the design criteria of scheme and develop a complete list all variations.

10.1049/el:19941398 article EN Electronics Letters 1994-11-24

Instead of using the conventional m-out-of-n perfect secret sharing scheme to protect a single among n users, authors propose based on one cryptographic assumption multiple secrets. It is shown that, with this relaxation security requirement, and some related secret-sharing problems, such as cheater detection broadcasting, can be solved very efficiently.

10.1049/ip-cdt:19951874 article EN IEE Proceedings - Computers and Digital Techniques 1995-01-01

10.1016/j.ins.2010.04.016 article EN Information Sciences 2010-04-28

10.1007/s10623-008-9265-8 article EN Designs Codes and Cryptography 2009-01-10

10.1016/j.ipl.2014.04.006 article EN Information Processing Letters 2014-04-16

Securing data transferred over a WSN is required to protect from being compromised by attackers. Sensors in the must share keys that are utilized transmitted between sensor nodes. There several approaches introduced literature for key establishment WSNs. Designing distribution/establishment scheme WSNs challenging task due limited resources of Polynomial-based distribution schemes have been proposed provide lightweight solution resource-constraint devices. More importantly, polynomial-based...

10.1155/2019/3950129 article EN Security and Communication Networks 2019-07-14

Physically unclonable functions (PUFs) promise to be a critical hardware primitive for billions of Internet Things (IoT) devices. The arbiter PUF (A-PUF) is one the most well-known circuits. However, its FPGA implementation has poor reliability, and error correction codes (ECCs) are usually needed eliminate noise in responses, which incur additional high overhead require NVM helper data storage. In this paper, we present highly reliable with improved uniqueness using bit-self-test (BST)...

10.1109/access.2020.3028514 article EN cc-by IEEE Access 2020-01-01

A new digital signature scheme based on the discrete logarithm is presented. The advantages of this over ElGamal are that it simplifies generation process, speeds up verification has a broadband subliminal channel to allow any secret information be concealed in and can only recovered by insiders with key shared signer, provide an efficient multisignature.

10.1049/el:19940317 article EN Electronics Letters 1994-03-03

Most existing cryptosystem designs incorporate just one cryptographic assumption, such as factoring or discrete logarithms. These assumptions appear secure today; but, it is possible that efficient algorithms will be developed in the future to break more of these assumptions. It very unlikely multiple would simultaneously become easy solve. Enhancing security major objective for cryptosystems based on K.S. McCurley (1990) proposed first key distribution system two dissimilar assumptions,...

10.1049/ip-cdt:19941040 article EN IEE Proceedings - Computers and Digital Techniques 1994-01-01

Recently, Wang introduced a novel (2, <i xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">n</i> ) region incrementing visual cryptographic scheme (RIVCS), which can gradually reconstruct secrets in single image with multiple security levels. In RIVCS, the secret is subdivided into regions such way that any xmlns:xlink="http://www.w3.org/1999/xlink">t</i> shadow images, where 2 ≤ , be used to reveal ( -1) th region. However, Wang's suffers from...

10.1109/tcsvt.2011.2180952 article EN IEEE Transactions on Circuits and Systems for Video Technology 2011-12-21

wireless sensor networks (WSNs). This is because nodes are limited in memory storage and computational power. In 1992, Blundo et al. proposed a noninteractive group key establishment scheme using multivariate polynomial. Their can establish of m sensors. Since each share polynomial involving - 1 variables having degree k, needs to store (k + 1) <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">m-1</sup> coefficients from GF(p), which exponentially...

10.1109/jsen.2015.2429582 article EN IEEE Sensors Journal 2015-05-04

In wireless sensor networks, the secure end-to-end data communication is needed to collect from source destination. Collected are transmitted in a path consisting of connected links. All existing routing protocols propose solutions which each link uses pairwise shared key protect data. this paper, we novel design communication. We adopt newly published group pre-distribution scheme our design, such that there unique key, called entire path. Specifically, instead using multiple keys...

10.1109/jsen.2015.2504375 article EN IEEE Sensors Journal 2015-11-30

A digital signature is analogous to an ordinary hand-written used in signing messages. RSA signatures have been adopted by Visa and Mastercard the secure electronic transactions (SET) standard for providing security of transfers credit payment information over internet. In SET, are provide certificates public keys authenticate The authors propose efficient method verifying signatures. Instead one at a time, it proposed batch verify simultaneously. This approach maintains same computational...

10.1049/el:19980833 article EN Electronics Letters 1998-06-11

He and Dawson recently proposed a multistage (t, n) secret sharing (MSS) scheme (see ibid., vol. 30, no. 19, p. 1591-2, 1994) to share multiple secrets based on any one-way function. The public shift technique is used implement MSS. For k shared among n participants, each participant has keep only one secret; but there are total of kn values. In this Letter, the author shows an alternative implementation which requires same number for keep; k(n-t) This becomes very attractive, especially...

10.1049/el:19950201 article EN Electronics Letters 1995-02-16

When two individual users wish to carry on a secure conversation, they can use the well-known RSA public key cryptosystem in doing so. This provides these both data secrecy and digital signature very efficient manner. However, many applications, multiple need sign document. In this letter, we propose modified scheme, based which will allow any number of document send it secretly receiver. The length ciphertext remains constant, no matter how great signatories. trade-off is that processing...

10.1049/el:19890670 article EN Electronics Letters 1989-07-20
Coming Soon ...