Shi-Feng Sun
Shi-Feng Sun
Verified email at
Cited by
Cited by
Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero
SF Sun, MH Au, JK Liu, TH Yuen
European Symposium on Research in Computer Security, 456-474, 2017
Practical backward-secure searchable encryption from symmetric puncturable encryption
SF Sun, X Yuan, JK Liu, R Steinfeld, A Sakzad, V Vo, S Nepal
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
An efficient non-interactive multi-client searchable encryption with support for boolean queries
SF Sun, JK Liu, A Sakzad, R Steinfeld, TH Yuen
European symposium on research in computer security, 154-172, 2016
Result pattern hiding searchable encryption for conjunctive queries
S Lai, S Patranabis, A Sakzad, JK Liu, D Mukhopadhyay, R Steinfeld, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
RingCT 3.0 for blockchain confidential transaction: Shorter size and stronger security
TH Yuen, S Sun, JK Liu, MH Au, MF Esgin, Q Zhang, D Gu
International Conference on Financial Cryptography and Data Security, 464-483, 2020
Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security
C Zuo, SF Sun, JK Liu, J Shao, J Pieprzyk
European Symposium on Research in Computer Security, 228-246, 2018
Dynamic searchable symmetric encryption with forward and stronger backward privacy
C Zuo, SF Sun, JK Liu, J Shao, J Pieprzyk
European symposium on research in computer security, 283-303, 2019
Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security
V Kuchta, A Sakzad, D Stehlé, R Steinfeld, SF Sun
Annual International Conference on the Theory and Applications of …, 2020
Towards efficient verifiable conjunctive keyword search for large encrypted database
J Wang, X Chen, SF Sun, JK Liu, MH Au, ZH Zhan
European symposium on research in computer security, 83-100, 2018
SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs
C Lyu, D Gu, X Zhang, S Sun, Y Zhang, A Pande
Computer Communications 59, 37-51, 2015
Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy.
SF Sun, R Steinfeld, S Lai, X Yuan, A Sakzad, JK Liu, S Nepal, D Gu
NDSS, 2021
Economic/Academic Importance of Brassica rapa
R Sun
The Brassica rapa Genome, 1-15, 2015
Towards multi-user searchable encryption supporting Boolean query and fast decryption
Y Wang, J Wang, SF Sun, JK Liu, W Susilo, X Chen
International Conference on Provable Security, 24-38, 2017
Efficient, fast and scalable authentication for vanets
C Lyu, D Gu, X Zhang, S Sun, Y Tang
2013 IEEE Wireless Communications and Networking Conference (WCNC), 1768-1773, 2013
Efficient leakage-resilient identity-based encryption with CCA security
SF Sun, D Gu, S Liu
International Conference on Pairing-Based Cryptography, 149-167, 2013
Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks
Y Ren, X Li, SF Sun, X Yuan, X Zhang
Journal of Information Security and Applications 58, 102698, 2021
Anonymizing bitcoin transaction
DA Wijaya, JK Liu, R Steinfeld, SF Sun, X Huang
International Conference on Information Security Practice and Experience …, 2016
Public-key puncturable encryption: modular and compact constructions
SF Sun, A Sakzad, R Steinfeld, JK Liu, D Gu
IACR International Conference on Public-Key Cryptography, 309-338, 2020
Achieving searchable encryption scheme with search pattern hidden
Y Wang, SF Sun, J Wang, JK Liu, X Chen
IEEE Transactions on Services Computing, 2020
GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search
S Lai, X Yuan, SF Sun, JK Liu, Y Liu, D Liu
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20