scispace - formally typeset
H

Huang Lin

Researcher at École Polytechnique Fédérale de Lausanne

Publications -  31
Citations -  1404

Huang Lin is an academic researcher from École Polytechnique Fédérale de Lausanne. The author has contributed to research in topics: Encryption & Public-key cryptography. The author has an hindex of 12, co-authored 31 publications receiving 1164 citations. Previous affiliations of Huang Lin include Shanghai Jiao Tong University & Sony Broadcast & Professional Research Laboratories.

Papers
More filters
Proceedings ArticleDOI

Attribute based proxy re-encryption with delegating capabilities

TL;DR: Another kind of key delegating capability in the scheme is developed and the proposed scheme is proved selective-structure chosen plaintext secure and master key secure without random oracles.
Book ChapterDOI

Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority

TL;DR: This paper presents a threshold multi authority fuzzy identity based encryption (MA-FIBE) scheme without a central authority for the first time and the security proof is based on the secrecy of the underlying joint random secret sharing protocol and joint zero secret share protocol and the standard decisional bilinear Diffie-Hellman assumption.
Journal ArticleDOI

Proxy re-encryption with keyword search

TL;DR: A concrete construction is proposed, which is proven secure in the random oracle model, based on the modified Decisional Bilinear Diffie-Hellman assumption.
Proceedings ArticleDOI

FairTest: Discovering Unwarranted Associations in Data-Driven Applications

TL;DR: FairTest as discussed by the authors is a framework for the discovery of unfair, discriminatory, or offensive user treatment in data-driven applications, which is based on the Unwarranted Association (UA) framework.
Journal ArticleDOI

CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring

TL;DR: This paper designs a cloud-assisted privacy preserving mobile health monitoring system to protect the privacy of the involved parties and their data and adapts the outsourcing decryption technique and a newly proposed key private proxy reencryption to shift the computational complexity to the cloud without compromising clients' privacy and service providers' intellectual property.