关注
Shi-Feng Sun
Shi-Feng Sun
在 sjtu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero
SF Sun, MH Au, JK Liu, TH Yuen
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
3692017
Practical backward-secure searchable encryption from symmetric puncturable encryption
SF Sun, X Yuan, JK Liu, R Steinfeld, A Sakzad, V Vo, S Nepal
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2472018
Result pattern hiding searchable encryption for conjunctive queries
S Lai, S Patranabis, A Sakzad, JK Liu, D Mukhopadhyay, R Steinfeld, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
2152018
An efficient non-interactive multi-client searchable encryption with support for boolean queries
SF Sun, JK Liu, A Sakzad, R Steinfeld, TH Yuen
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
1532016
Ringct 3.0 for blockchain confidential transaction: Shorter size and stronger security
TH Yuen, S Sun, JK Liu, MH Au, MF Esgin, Q Zhang, D Gu
Financial Cryptography and Data Security: 24th International Conference, FC …, 2020
1302020
Practical non-interactive searchable encryption with forward and backward privacy
SF Sun, R Steinfeld, S Lai, X Yuan, A Sakzad, JK Liu, S Nepal, D Gu
Usenix Network and Distributed System Security Symposium 2021, 2021
1082021
Dynamic searchable symmetric encryption with forward and stronger backward privacy
C Zuo, SF Sun, JK Liu, J Shao, J Pieprzyk
European symposium on research in computer security, 283-303, 2019
1012019
Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security
C Zuo, SF Sun, JK Liu, J Shao, J Pieprzyk
European symposium on research in computer security, 228-246, 2018
852018
Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security
V Kuchta, A Sakzad, D Stehlé, R Steinfeld, SF Sun
Annual International Conference on the Theory and Applications of …, 2020
762020
Achieving searchable encryption scheme with search pattern hidden
Y Wang, SF Sun, J Wang, JK Liu, X Chen
IEEE Transactions on Services Computing 15 (2), 1012-1025, 2020
552020
Redactable blockchain supporting supervision and self-management
Y Jia, SF Sun, Y Zhang, Z Liu, D Gu
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
532021
Towards efficient verifiable conjunctive keyword search for large encrypted database
J Wang, X Chen, SF Sun, JK Liu, MH Au, ZH Zhan
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
522018
Forward and backward private DSSE for range queries
C Zuo, SF Sun, JK Liu, J Shao, J Pieprzyk, L Xu
IEEE Transactions on Dependable and Secure Computing 19 (1), 328-338, 2020
472020
Shuffle-based private set union: Faster and more secure
Y Jia, SF Sun, HS Zhou, J Du, D Gu
31st USENIX Security Symposium (USENIX Security 22), 2947-2964, 2022
462022
Privacy-preserving batch verification signature scheme based on blockchain for vehicular ad-hoc networks
Y Ren, X Li, SF Sun, X Yuan, X Zhang
Journal of Information Security and Applications 58, 102698, 2021
462021
Non-interactive multi-client searchable encryption: Realization and implementation
SF Sun, C Zuo, JK Liu, A Sakzad, R Steinfeld, TH Yuen, X Yuan, D Gu
IEEE Transactions on Dependable and Secure Computing 19 (1), 452-467, 2020
452020
Graphse²: An encrypted graph database for privacy-preserving social search
S Lai, X Yuan, SF Sun, JK Liu, Y Liu, D Liu
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
452019
Practical post-quantum few-time verifiable random function with applications to algorand
MF Esgin, V Kuchta, A Sakzad, R Steinfeld, Z Zhang, S Sun, S Chu
International Conference on Financial Cryptography and Data Security, 560-578, 2021
382021
Economic/Academic Importance of Brassica rapa
R Sun
The Brassica rapa genome, 1-15, 2015
38*2015
SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs
C Lyu, D Gu, X Zhang, S Sun, Y Zhang, A Pande
Computer Communications 59, 37-51, 2015
372015
系统目前无法执行此操作,请稍后再试。
文章 1–20