Follow
Shuai Han
Shuai Han
Verified email at sjtu.edu.cn
Title
Cited by
Cited by
Year
Multilinear maps from obfuscation
MR Albrecht, P Farshim, S Han, D Hofheinz, E Larraia, KG Paterson
Journal of Cryptology 33 (3), 1080-1113, 2020
482020
Reusable fuzzy extractor from the decisional Diffie–Hellman assumption
Y Wen, S Liu, S Han
Designs, Codes and Cryptography 86, 2495-2512, 2018
452018
Authenticated key exchange and signatures with tight security in the standard model
S Han, T Jager, E Kiltz, S Liu, J Pan, D Riepel, S Schäge
Annual International Cryptology Conference, 670-700, 2021
302021
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
S Han, S Liu, L Lyu, D Gu
Annual International Cryptology Conference, 417-447, 2019
222019
Efficient KDM-CCA secure public-key encryption for polynomial functions
S Han, S Liu, L Lyu
International Conference on the Theory and Application of Cryptology and …, 2016
172016
Tightly SIM-SO-CCA secure public key encryption from standard assumptions
L Lyu, S Liu, S Han, D Gu
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
162018
Optimized Paillier’s cryptosystem with fast encryption and decryption
H Ma, S Han, H Lei
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
112021
Proofs of retrievability based on MRD codes
S Han, S Liu, K Chen, D Gu
International Conference on Information Security Practice and Experience …, 2014
112014
Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness
S Han, S Liu, D Gu
International Conference on the Theory and Application of Cryptology and …, 2021
82021
Proofs of retrievability from linearly homomorphic structure-preserving signatures
X Zhang, S Liu, S Han
International Journal of Information and Computer Security 11 (2), 178-202, 2019
72019
Fine-grained proxy re-encryption: Definitions and constructions from LWE
Y Zhou, S Liu, S Han, H Zhang
International Conference on the Theory and Application of Cryptology and …, 2023
62023
Eke meets tight security in the universally composable framework
X Liu, S Liu, S Han, D Gu
IACR International Conference on Public-Key Cryptography, 685-713, 2023
62023
Almost tight multi-user security under adaptive corruptions & leakages in the standard model
S Han, S Liu, D Gu
Annual International Conference on the Theory and Applications of …, 2023
62023
Anonymous public key encryption under corruptions
Z Huang, J Lai, S Han, L Lyu, J Weng
International Conference on the Theory and Application of Cryptology and …, 2022
62022
Privacy-preserving authenticated key exchange in the standard model
Y Lyu, S Liu, S Han, D Gu
International Conference on the Theory and Application of Cryptology and …, 2022
52022
Homomorphic data encryption method and apparatus for implementing privacy protection
S Han, Z Huang, H Ma, H Lei
US Patent 10,778,410, 2020
52020
New insights on linear cryptanalysis
Z Liu, S Han, Q Wang, W Li, Y Liu, D Gu
Science China Information Sciences 63, 1-11, 2020
52020
Improved bounds on negativity of superpositions
ZH Ma, ZH Chen, S Han, SM Fei, S Severini
52012
Tightly CCA-secure inner product functional encryption scheme
X Liu, S Liu, S Han, D Gu
Theoretical Computer Science 898, 1-19, 2022
42022
Computational robust fuzzy extractor
Y Wen, S Liu, Z Hu, S Han
The Computer Journal 61 (12), 1794-1805, 2018
42018
The system can't perform the operation now. Try again later.
Articles 1–20