Shuai Han

From MaRDI portal
Person:1647555


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Functional commitments for arbitrary circuits of bounded sizes
Designs, Codes and Cryptography
2024-12-11Paper
Universal composable password authenticated key exchange for the post-quantum world
 
2024-11-13Paper
More efficient public-key cryptography with leakage and tamper resilience
 
2024-11-12Paper
Multi-hop fine-grained proxy re-encryption
 
2024-11-12Paper
High accuracy AUV-aided underwater localization: far-field information fusion perspective
IEEE Transactions on Signal Processing
2024-09-16Paper
Fine-grained proxy re-encryption: definitions and constructions from LWE
 
2024-09-13Paper
Robustly reusable fuzzy extractor from isogeny
Theoretical Computer Science
2024-08-20Paper
Biometric-based two-factor authentication scheme under database leakage
Theoretical Computer Science
2024-05-02Paper
Entropy regularization methods for parameter space exploration
Information Sciences
2024-04-25Paper
Almost tight multi-user security under adaptive corruptions from LWE in the standard model
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Almost tight multi-user security under adaptive corruptions \& leakages in the standard model
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
EKE meets tight security in the universally composable framework
Lecture Notes in Computer Science
2023-11-24Paper
Fine-grained verifier NIZK and its applications
Lecture Notes in Computer Science
2023-11-16Paper
Early detection of rotating stall in axial flow compressors via deterministic learning: detectability analysis
Control Theory and Technology
2023-11-07Paper
Privacy-preserving authenticated key exchange in the standard model
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Anonymous public key encryption under corruptions
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Fuzzy authenticated key exchange with tight security
Computer Security – ESORICS 2022
2023-07-28Paper
Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness
Lecture Notes in Computer Science
2023-05-12Paper
Simulatable verifiable random function from the LWE assumption
Theoretical Computer Science
2023-04-27Paper
Approaching epidemiological dynamics of COVID-19 with physics-informed neural networks
 
2023-02-17Paper
Authenticated key exchange and signatures with tight security in the standard model
 
2022-05-18Paper
Tightly CCA-secure inner product functional encryption scheme
Theoretical Computer Science
2021-12-01Paper
Pseudorandom functions in NC class from the standard LWE assumption
Designs, Codes and Cryptography
2021-11-11Paper
Multilinear maps from obfuscation
Journal of Cryptology
2020-06-15Paper
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
 
2020-03-09Paper
Strong leakage and tamper-resilient PKE from refined hash proof system
 
2020-01-30Paper
QANIZK for adversary-dependent languages and their applications
Theoretical Computer Science
2019-06-06Paper
Reusable fuzzy extractor from the decisional Diffie-Hellman assumption
Designs, Codes and Cryptography
2018-10-10Paper
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
Designs, Codes and Cryptography
2018-06-26Paper
Tightly SIM-SO-CCA secure public key encryption from standard assumptions
 
2018-05-16Paper
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
Designs, Codes and Cryptography
2018-04-06Paper
KDM-secure public-key encryption from constant-noise LPN
 
2017-08-25Paper
How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks
Information Security and Cryptology
2017-05-05Paper
Efficient KDM-CCA secure public-key encryption for polynomial functions
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Improved bounds on negativity of superpositions
 
2013-01-28Paper


Research outcomes over time


This page was built for person: Shuai Han