Lei Fan

Orcid: 0000-0003-3975-091X

Affiliations:
  • Shanghai Jiao Tong University, School of Cyber Science and Engineering, Shanghai, China
  • Shanghai Jiao Tong University, School of Electronic Information and Electrical Engineering, Shanghai, China


According to our database1, Lei Fan authored at least 28 papers between 2002 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Chitu: Avoiding Unnecessary Fallback in Byzantine Consensus.
Proceedings of the 2025 USENIX Annual Technical Conference, 2025

Best-Possible Unpredictable Proof-of-Stake: An Impossibility and a Practical Design.
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025

2024
Two Halves Make a Whole: How to Reconcile Soundness and Robustness in Watermarking for Large Language Models.
IACR Cryptol. ePrint Arch., 2024

Column-wise Garbling, and How to Go Beyond the Linear Model.
IACR Cryptol. ePrint Arch., 2024

Brief Announcement: Best-Possible Unpredictable Proof-Of-Stake.
Proceedings of the 38th International Symposium on Distributed Computing, 2024

A Universally Composable Key Management System Using Trusted Hardware.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

2023
Pldb: Protecting LSM-based Key-Value Store using Trusted Execution Environment.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Flexible Advancement in Asynchronous BFT Consensus.
Proceedings of the 29th Symposium on Operating Systems Principles, 2023

Bridging the Gap of Timing Assumptions in Byzantine Consensus.
Proceedings of the 24th International Middleware Conference, 2023

2021
A Permissionless Proof-of-Stake Blockchain with Best-Possible Unpredictability.
IACR Cryptol. ePrint Arch., 2021

2020
An Efficient and Robust Aggregation Algorithm for Learning Federated CNN.
Proceedings of the SPML 2020: 3rd International Conference on Signal Processing and Machine Learning, 2020

Cerberus: Privacy-Preserving Computation in Edge Computing.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
A New Structure of Blockchain to Simplify the Verification.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2018
Generate Public Randomness Based on Blockchain.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Generic Paradigm for Blockchain Design.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

A Binary Feature Extraction Based Data Provenance System Implemented on Flink Platform.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2018

2017
iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake).
IACR Cryptol. ePrint Arch., 2017

TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake.
IACR Cryptol. ePrint Arch., 2017

2016
Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power.
IACR Cryptol. ePrint Arch., 2016

2015
Classified security protection evaluation for vehicle information system.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

2013
The Algorithm of AAES.
IACR Cryptol. ePrint Arch., 2013

Implementing quasi-parallel breadth-first search in MapReduce for large-scale social network mining.
Proceedings of the Fifth International Conference on Computational Aspects of Social Networks, 2013

2008
Building network attack graph for alert causal correlation.
Comput. Secur., 2008

Behavior-Aware Role Based Trust Management.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2006
Cryptanalysis and improvement on Yang-Shieh authentication schemes.
Proceedings of the 2006 International Conference on Privacy, 2006

2004
Cryptanalysis on a Blind Signature Scheme Based on ElGamal Signature.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004

2002
An enhancement of timestamp-based password authentication scheme.
Comput. Secur., 2002


  Loading...