Shuai Han

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Functional commitments for arbitrary circuits of bounded sizes
Designs, Codes and Cryptography
2024-12-11Paper
Universal composable password authenticated key exchange for the post-quantum world2024-11-13Paper
More efficient public-key cryptography with leakage and tamper resilience2024-11-12Paper
Multi-hop fine-grained proxy re-encryption2024-11-12Paper
High accuracy AUV-aided underwater localization: far-field information fusion perspective
IEEE Transactions on Signal Processing
2024-09-16Paper
Fine-grained proxy re-encryption: definitions and constructions from LWE2024-09-13Paper
Robustly reusable fuzzy extractor from isogeny
Theoretical Computer Science
2024-08-20Paper
Biometric-based two-factor authentication scheme under database leakage
Theoretical Computer Science
2024-05-02Paper
Entropy regularization methods for parameter space exploration
Information Sciences
2024-04-25Paper
Almost tight multi-user security under adaptive corruptions from LWE in the standard model
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Almost tight multi-user security under adaptive corruptions \& leakages in the standard model
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
EKE meets tight security in the universally composable framework
Lecture Notes in Computer Science
2023-11-24Paper
Fine-grained verifier NIZK and its applications
Lecture Notes in Computer Science
2023-11-16Paper
Early detection of rotating stall in axial flow compressors via deterministic learning: detectability analysis
Control Theory and Technology
2023-11-07Paper
Privacy-preserving authenticated key exchange in the standard model
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Anonymous public key encryption under corruptions
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Fuzzy authenticated key exchange with tight security
Computer Security – ESORICS 2022
2023-07-28Paper
Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness
Lecture Notes in Computer Science
2023-05-12Paper
Simulatable verifiable random function from the LWE assumption
Theoretical Computer Science
2023-04-27Paper
Approaching epidemiological dynamics of COVID-19 with physics-informed neural networks2023-02-17Paper
Authenticated key exchange and signatures with tight security in the standard model2022-05-18Paper
Tightly CCA-secure inner product functional encryption scheme
Theoretical Computer Science
2021-12-01Paper
Pseudorandom functions in NC class from the standard LWE assumption
Designs, Codes and Cryptography
2021-11-11Paper
Multilinear maps from obfuscation
Journal of Cryptology
2020-06-15Paper
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system2020-03-09Paper
Strong leakage and tamper-resilient PKE from refined hash proof system2020-01-30Paper
QANIZK for adversary-dependent languages and their applications
Theoretical Computer Science
2019-06-06Paper
Reusable fuzzy extractor from the decisional Diffie-Hellman assumption
Designs, Codes and Cryptography
2018-10-10Paper
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
Designs, Codes and Cryptography
2018-06-26Paper
Tightly SIM-SO-CCA secure public key encryption from standard assumptions2018-05-16Paper
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
Designs, Codes and Cryptography
2018-04-06Paper
KDM-secure public-key encryption from constant-noise LPN2017-08-25Paper
How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks
Information Security and Cryptology
2017-05-05Paper
Efficient KDM-CCA secure public-key encryption for polynomial functions
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Improved bounds on negativity of superpositions2013-01-28Paper


Research outcomes over time


This page was built for person: Shuai Han