Multilinear maps from obfuscation MR Albrecht, P Farshim, S Han, D Hofheinz, E Larraia, KG Paterson Journal of Cryptology 33 (3), 1080-1113, 2020 | 48 | 2020 |
Reusable fuzzy extractor from the decisional Diffie–Hellman assumption Y Wen, S Liu, S Han Designs, Codes and Cryptography 86, 2495-2512, 2018 | 45 | 2018 |
Authenticated key exchange and signatures with tight security in the standard model S Han, T Jager, E Kiltz, S Liu, J Pan, D Riepel, S Schäge Annual International Cryptology Conference, 670-700, 2021 | 30 | 2021 |
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system S Han, S Liu, L Lyu, D Gu Annual International Cryptology Conference, 417-447, 2019 | 22 | 2019 |
Efficient KDM-CCA secure public-key encryption for polynomial functions S Han, S Liu, L Lyu International Conference on the Theory and Application of Cryptology and …, 2016 | 17 | 2016 |
Tightly SIM-SO-CCA secure public key encryption from standard assumptions L Lyu, S Liu, S Han, D Gu Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018 | 16 | 2018 |
Optimized Paillier’s cryptosystem with fast encryption and decryption H Ma, S Han, H Lei Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 11 | 2021 |
Proofs of retrievability based on MRD codes S Han, S Liu, K Chen, D Gu International Conference on Information Security Practice and Experience …, 2014 | 11 | 2014 |
Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness S Han, S Liu, D Gu International Conference on the Theory and Application of Cryptology and …, 2021 | 8 | 2021 |
Proofs of retrievability from linearly homomorphic structure-preserving signatures X Zhang, S Liu, S Han International Journal of Information and Computer Security 11 (2), 178-202, 2019 | 7 | 2019 |
Fine-grained proxy re-encryption: Definitions and constructions from LWE Y Zhou, S Liu, S Han, H Zhang International Conference on the Theory and Application of Cryptology and …, 2023 | 6 | 2023 |
Eke meets tight security in the universally composable framework X Liu, S Liu, S Han, D Gu IACR International Conference on Public-Key Cryptography, 685-713, 2023 | 6 | 2023 |
Almost tight multi-user security under adaptive corruptions & leakages in the standard model S Han, S Liu, D Gu Annual International Conference on the Theory and Applications of …, 2023 | 6 | 2023 |
Anonymous public key encryption under corruptions Z Huang, J Lai, S Han, L Lyu, J Weng International Conference on the Theory and Application of Cryptology and …, 2022 | 6 | 2022 |
Privacy-preserving authenticated key exchange in the standard model Y Lyu, S Liu, S Han, D Gu International Conference on the Theory and Application of Cryptology and …, 2022 | 5 | 2022 |
Homomorphic data encryption method and apparatus for implementing privacy protection S Han, Z Huang, H Ma, H Lei US Patent 10,778,410, 2020 | 5 | 2020 |
New insights on linear cryptanalysis Z Liu, S Han, Q Wang, W Li, Y Liu, D Gu Science China Information Sciences 63, 1-11, 2020 | 5 | 2020 |
Improved bounds on negativity of superpositions ZH Ma, ZH Chen, S Han, SM Fei, S Severini | 5 | 2012 |
Tightly CCA-secure inner product functional encryption scheme X Liu, S Liu, S Han, D Gu Theoretical Computer Science 898, 1-19, 2022 | 4 | 2022 |
Computational robust fuzzy extractor Y Wen, S Liu, Z Hu, S Han The Computer Journal 61 (12), 1794-1805, 2018 | 4 | 2018 |