Shuai Han
Shuai Han
Verified email at
Cited by
Cited by
Multilinear maps from obfuscation
MR Albrecht, P Farshim, S Han, D Hofheinz, E Larraia, KG Paterson
Journal of Cryptology, 1-34, 2020
Reusable fuzzy extractor from the decisional Diffie–Hellman assumption
Y Wen, S Liu, S Han
Designs, Codes and Cryptography 86 (11), 2495-2512, 2018
Efficient KDM-CCA secure public-key encryption for polynomial functions
S Han, S Liu, L Lyu
International Conference on the Theory and Application of Cryptology and …, 2016
Tightly SIM-SO-CCA secure public key encryption from standard assumptions
L Lyu, S Liu, S Han, D Gu
IACR International Workshop on Public Key Cryptography, 62-92, 2018
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
S Han, S Liu, L Lyu, D Gu
Annual International Cryptology Conference, 417-447, 2019
New insights on linear cryptanalysis
Z Liu, S Han, Q Wang, W Li, Y Liu, D Gu
Science China Information Sciences 63 (1), 1-11, 2020
Proofs of retrievability based on MRD codes
S Han, S Liu, K Chen, D Gu
International Conference on Information Security Practice and Experience …, 2014
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
S Han, S Liu, L Lyu
Designs, Codes and Cryptography 86 (7), 1411-1449, 2018
Proofs of Data Possession and Retrievability Based on MRD Codes.
S Han, S Liu, K Chen, D Gu
IACR Cryptol. ePrint Arch. 2013, 789, 2013
Improved bounds on negativity of superpositions
ZH Ma, ZH Chen, S Han, SM Fei, S Severini
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
S Han, S Liu, B Qin, D Gu
Designs, Codes and Cryptography 86 (3), 517-554, 2018
Authenticated key exchange and signatures with tight security in the standard model
S Han, T Jager, E Kiltz, S Liu, J Pan, D Riepel, S Schäge
Annual International Cryptology Conference, 670-700, 2021
Proofs of retrievability from linearly homomorphic structure-preserving signatures
X Zhang, S Liu, S Han
International Journal of Information and Computer Security 11 (2), 178-202, 2019
Public-key encryption with tight simulation-based selective-opening security
L Lyu, S Liu, S Han
The Computer Journal 61 (2), 288-318, 2018
KDM-secure public-key encryption from constant-noise LPN
S Han, S Liu
Australasian Conference on Information Security and Privacy, 44-64, 2017
Public key cryptosystems secure against memory leakage attacks
SF Sun, S Han, D Gu, S Liu
IET Information Security 10 (6), 403-412, 2016
Authentication System Based on Fuzzy Extractors
M Jiang, S Liu, S Han, D Gu
International Conference on Wireless Algorithms, Systems, and Applications …, 2021
QANIZK for adversary-dependent languages and their applications
S Han, S Liu, L Lyu
Theoretical Computer Science 779, 47-71, 2019
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System
SF Sun, D Gu, MH Au, S Han, Y Yu, J Liu
International Conference on Applied Cryptography and Network Security, 486-506, 2019
Computational Robust Fuzzy Extractor
Y Wen, S Liu, Z Hu, S Han
The Computer Journal 61 (12), 1794-1805, 2018
The system can't perform the operation now. Try again later.
Articles 1–20