Seguir
Shuai Han
Shuai Han
Dirección de correo verificada de sjtu.edu.cn
Título
Citado por
Citado por
Año
Multilinear maps from obfuscation
MR Albrecht, P Farshim, S Han, D Hofheinz, E Larraia, KG Paterson
Journal of Cryptology 33 (3), 1080-1113, 2020
472020
Reusable fuzzy extractor from the decisional Diffie–Hellman assumption
Y Wen, S Liu, S Han
Designs, Codes and Cryptography 86, 2495-2512, 2018
402018
Authenticated key exchange and signatures with tight security in the standard model
S Han, T Jager, E Kiltz, S Liu, J Pan, D Riepel, S Schäge
Annual International Cryptology Conference, 670-700, 2021
262021
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
S Han, S Liu, L Lyu, D Gu
Annual International Cryptology Conference, 417-447, 2019
202019
Tightly SIM-SO-CCA secure public key encryption from standard assumptions
L Lyu, S Liu, S Han, D Gu
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
162018
Efficient KDM-CCA secure public-key encryption for polynomial functions
S Han, S Liu, L Lyu
International Conference on the Theory and Application of Cryptology and …, 2016
162016
Proofs of retrievability based on MRD codes
S Han, S Liu, K Chen, D Gu
International Conference on Information Security Practice and Experience …, 2014
112014
Optimized Paillier’s cryptosystem with fast encryption and decryption
H Ma, S Han, H Lei
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
92021
Proofs of retrievability from linearly homomorphic structure-preserving signatures
X Zhang, S Liu, S Han
International Journal of Information and Computer Security 11 (2), 178-202, 2019
72019
Anonymous public key encryption under corruptions
Z Huang, J Lai, S Han, L Lyu, J Weng
International Conference on the Theory and Application of Cryptology and …, 2022
62022
Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness
S Han, S Liu, D Gu
International Conference on the Theory and Application of Cryptology and …, 2021
62021
Privacy-preserving authenticated key exchange in the standard model
Y Lyu, S Liu, S Han, D Gu
International Conference on the Theory and Application of Cryptology and …, 2022
52022
New insights on linear cryptanalysis
Z Liu, S Han, Q Wang, W Li, Y Liu, D Gu
Science China Information Sciences 63, 1-11, 2020
52020
Proofs of data possession and retrievability based on MRD codes
S Han, S Liu, K Chen, D Gu
Cryptology ePrint Archive, 2013
52013
Improved bounds on negativity of superpositions
ZH Ma, ZH Chen, S Han, SM Fei, S Severini
52012
Almost tight multi-user security under adaptive corruptions & leakages in the standard model
S Han, S Liu, D Gu
Annual International Conference on the Theory and Applications of …, 2023
42023
Tightly CCA-secure inner product functional encryption scheme
X Liu, S Liu, S Han, D Gu
Theoretical Computer Science 898, 1-19, 2022
42022
Homomorphic data encryption method and apparatus for implementing privacy protection
S Han, Z Huang, H Ma, H Lei
US Patent 10,778,410, 2020
42020
Computational robust fuzzy extractor
Y Wen, S Liu, Z Hu, S Han
The Computer Journal 61 (12), 1794-1805, 2018
42018
Fine-Grained Proxy Re-encryption: Definitions and Constructions from LWE
Y Zhou, S Liu, S Han, H Zhang
International Conference on the Theory and Application of Cryptology and …, 2023
32023
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20