Shifeng Sun

According to our database1, Shifeng Sun authored at least 28 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
J. UCS, 2019

RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
IACR Cryptology ePrint Archive, 2019

GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security.
Proceedings of the Computer Security, 2018

Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database.
Proceedings of the Computer Security, 2018

A Multi-client DSSE Scheme Supporting Range Queries.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Result Pattern Hiding Searchable Encryption for Conjunctive Queries.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Public key encryption resilient to leakage and tampering attacks.
J. Comput. Syst. Sci., 2017

Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman.
Inf. Sci., 2017

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
IACR Cryptology ePrint Archive, 2017

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Proceedings of the Provable Security, 2017

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Efficient chosen ciphertext secure identity-based encryption against key leakage attacks.
Security and Communication Networks, 2016

Privacy-preserving data sharing scheme over cloud for social applications.
J. Network and Computer Applications, 2016

Public key cryptosystems secure against memory leakage attacks.
IET Information Security, 2016

RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions.
Comput. J., 2016

Anonymizing Bitcoin Transaction.
Proceedings of the Information Security Practice and Experience, 2016

An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries.
Proceedings of the Computer Security - ESORICS 2016, 2016

Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations.
IJDSN, 2015

SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs.
Computer Communications, 2015

Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks.
Comput. J., 2015

2013
Efficient, fast and scalable authentication for VANETs.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Efficient Leakage-Resilient Identity-Based Encryption with CCA Security.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

2012
Data-Driven Integrated Modeling and Intelligent Control Methods of Grinding Process.
Proceedings of the Advances in Neural Networks - ISNN 2012, 2012


  Loading...