Pin-Han Lin

  • Citations Per Year
Learn More
A convertible authenticated encryption scheme allows the signer to create a valid authenticated ciphertext such that only the specified receiver can simultaneously recover and verify the message. To protect the receiver’s benefit of a later dispute on repudiation, the receiver has the ability to convert the signature into an ordinary one that can be(More)
User authentication is an important technology to guarantee that only the legal users can access resources from the remote server. for user authentication, in 2011, Lee et al. proposed a dynamic user authentication scheme for multi-server environments. They claimed that this scheme provided efficiency, strong security, and user anonymity property. However,(More)
  • 1