Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Xi Jun Lin is active.

Publication


Featured researches published by Xi Jun Lin.


Iet Information Security | 2008

Colour visual cryptography schemes

Feng Liu; Chuan Kun Wu; Xi Jun Lin

Visual cryptography scheme (VCS) is a kind of secret-sharing scheme which allows the encryption of a secret image into n shares that are distributed to n participants. The beauty of such a scheme is that, the decryption of the secret image requires neither the knowledge of cryptography nor complex computation. Colour visual cryptography becomes an interesting research topic after the formal introduction of visual cryptography by Naor and Shamir in 1995. The authors propose a colour (k, n)-VCS under the visual cryptography model of Naor and Shamir with no pixel expansion, and a colour (k, n)-extended visual cryptography scheme ((k, n)-EVCS) under the visual cryptography model of Naor and Shamir with pixel expansion the same as that of its corresponding black and white (k, n)-EVCS. Furthermore, the authors propose a black and white (k, n)-VCS and a black and white (k, n)-EVCS under the visual cryptography model of Tuyls. Based on the black and white schemes, the authors propose a colour (k, n)-VCS and a colour (k, n)-EVCS under the same visual cryptography model, of which the pixel expansions are the same as that of their corresponding black and white (k, n)-VCS and (k, n)-EVCS, respectively. The authors also give the experimental results of the proposed schemes, and compare the proposed scheme with known schemes in the literature.


IEEE Transactions on Information Forensics and Security | 2010

Step Construction of Visual Cryptography Schemes

Feng Liu; Chuan Kun Wu; Xi Jun Lin

Two common drawbacks of the visual cryptography scheme (VCS) are the large pixel expansion of each share image and the small contrast of the recovered secret image. In this paper, we propose a step construction to construct VCSOR and VCSXOR for general access structure by applying (2,2)-VCS recursively, where a participant may receive multiple share images. The proposed step construction generates VCSOR and VCSXOR which have optimal pixel expansion and contrast for each qualified set in the general access structure in most cases. Our scheme applies a technique to simplify the access structure, which can reduce the average pixel expansion (APE) in most cases compared with many of the results in the literature. Finally, we give some experimental results and comparisons to show the effectiveness of the proposed scheme.


Iet Information Security | 2011

Cheating immune visual cryptography scheme

Feng Liu; Chuan Kun Wu; Xi Jun Lin

Most cheating immune visual cryptography schemes (CIVCS) are based on a traditional visual cryptography scheme (VCS) and are designed to avoid cheating when the secret image of the original VCS is to be recovered. However, all the known CIVCS have some drawbacks. Most usual drawbacks include the following: the scheme needs an online trusted authority, or it requires additional shares for the purpose of verification, or it has to sacrifice the properties by means of pixel expansion and contrast reduction of the original VCS or it can only be based on such VCS with specific access structures. In this study, the authors propose a new CIVCS that can be based on any VCS, including those with a general access structure, and show that their CIVCS can avoid all the above drawbacks. Moreover, their CIVCS does not care about whether the underlying operation is OR or XOR.


Information Processing Letters | 2010

A new definition of the contrast of visual cryptography scheme

Feng Liu; Chuan Kun Wu; Xi Jun Lin

In this paper, some of the known definitions of the contrast of the Visual Cryptography Scheme (VCS) are shown to be inappropriate, and a new definition of the contrast based on our observations is proposed. It is also shown how our new definition of the contrast agreed with our observations.


The Computer Journal | 2010

Some Extensions on Threshold Visual Cryptography Schemes

Feng Liu; Chuan Kun Wu; Xi Jun Lin

Droste [CRYPTO’96] proposed a construction of threshold visual cryptography scheme (TVCS) under the visual cryptography model of Naor and Shamir, i.e. the visual cryptography model with the underlying operation OR. In this article, we give three extensions of TVCS. First, we prove that the TVCS proposed by Droste which was based on the OR operation is still a valid TVCS under the XOR operation, and then we propose a method to further reduce its pixel expansion. We then propose an interesting construction of TVCS with all shares being concolorous. Finally, we give a construction of threshold extended visual cryptography scheme (TEVCS) with the underlying operation OR or XOR. All of our schemes can be applied to the visual cryptography model introduced by Tuyls et al. (First Int. Conf. Security in Pervasive Computing 2004, International Patent with Application No.: PCT/IB2003/000261).


Discrete Applied Mathematics | 2017

An efficient RSA-based certificateless public key encryption scheme

Xi Jun Lin; Lin Sun; Haipeng Qu

Abstract In order to resolve the key escrow in identity-based scheme and the significant cost of using a PKI system in traditional public key scheme, the notion of certificateless public key cryptography (CL-PKC) was introduced. The first certificateless public key encryption scheme (CL-PKE) was proposed by Al-Riyami and Paterson, and then further schemes were developed. However, most of them are constructed from the bilinear pairing which is a time costing operation. In this paper, we construct an efficient CL-PKE scheme from RSA since RSA is the de facto Internet standard and is widely used in many applications. The security is based on Kilian–Petrank’s RSA assumption which is a variant of RSA.


Information Sciences | 2018

Certificateless public key encryption with equality test

Haipeng Qu; Zhen Yan; Xi Jun Lin; Qi Zhang; Lin Sun

Abstract In this paper, we present the concept of certificateless public key encryption with equality test (CL-PKEET), which integrates certificateless public key cryptography (CL-PKC) into public key encryption with equality test (PKEET) to solve the key escrow problem of identity-based encryption with equality test (IBEET). In the CL-PKEET scheme, the receiver first computes his private key with the receiver’s secret value and the partial private key generated by the key generation center (KGC). The trapdoor is generated with this private key. Then, using the trapdoor, the receiver authorizes the cloud server to test the equivalence between his ciphertexts and others’ ciphertexts. We formalize the system model and definition of CL-PKEET, propose the security models by considering four types of adversaries, and then present a concrete CL-PKEET scheme. Our proposal achieves the IND-CCA security against adversaries without trapdoor, and the OW-CCA security against adversaries with trapdoor. Furthermore, compared with IBEET and PKEET, our proposal which has the features of CL-PKC solves certificate management and key escrow problems simultaneously.


IACR Cryptology ePrint Archive | 2016

New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings.

Xi Jun Lin; Haipeng Qu; Xiaoshuai Zhang


The Computer Journal | 2018

Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme

Xi Jun Lin; Lin Sun; Haipeng Qu; Dongxiao Liu


Information Sciences | 2018

Generic construction of public key encryption, identity-based encryption and signcryption with equality test

Xi Jun Lin; Lin Sun; Haipeng Qu

Collaboration


Dive into the Xi Jun Lin's collaboration.

Top Co-Authors

Avatar

Haipeng Qu

Ocean University of China

View shared research outputs
Top Co-Authors

Avatar

Chuan Kun Wu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Feng Liu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Qi Zhang

Ocean University of China

View shared research outputs
Top Co-Authors

Avatar

Xiaoshuai Zhang

Ocean University of China

View shared research outputs
Top Co-Authors

Avatar

Zhen Yan

Ocean University of China

View shared research outputs
Top Co-Authors

Avatar

Dongxiao Liu

Ocean University of China

View shared research outputs
Researchain Logo
Decentralizing Knowledge