dalen17 at sjtu dot edu dot cn
Associate professor @ SJTU
Working on cryptography
My research interests focus on public-key cryptography with provable security.
In particular, I am interested in the design of cryptographic schemes
Tenure-track associate professor, Shanghai Jiao Tong University, China, Jan 2024 - Present
Tenure-track assistant professor, Shanghai Jiao Tong University, China, Jul 2020 - Dec 2023
Cyptographic algorithm engineer, Ant Group, China, Dec 2018 - Jun 2020
Postdoctoral researcher, Karlsruhe Institute of Technology, Germany, Oct 2017 - Sep 2018
PH.D. in Computer Science, Shanghai Jiao Tong University, China, Sep 2012 - Sep 2017
B.S. in Mathematics & in Physics (Zhiyuan Honors Class), Shanghai Jiao Tong University, China, Sep 2008 - Jun 2012
NIS7019: Cryptographic Algorithms (Graduate, Spring 2021, Spring 2022, Spring 2023, Spring 2024)
NIS4333: Modern Cryptography (Undergraduate, Spring 2023, Spring 2024)
MATH6010: Graph and Networks (Graduate, Autumn 2021)
CS1501: Thinking and Methodology in Programming (C++) (Undergraduate, Autumn 2021)
Anamorphic Authenticated Key Exchange: Double Key Distribution under Surveillance [eprint]
Weihao Wang, Shuai Han, and Shengli Liu
ASIACRYPT 2024
Efficient Asymmetric PAKE Compiler from KEM and AE [eprint]
You Lyu, Shengli Liu, and Shuai Han
ASIACRYPT 2024
Reusable Fuzzy Extractor from Isogeny
Yu Zhou, Shengli Liu, and Shuai Han
ProvSec 2024
Universal Composable Password Authenticated Key Exchange for the Post-Quantum World [eprint]
You Lyu, Shengli Liu, and Shuai Han
EUROCRYPT 2024
More Efficient Public-Key Cryptography with Leakage and Tamper Resilience [eprint]
Shuai Han, Shengli Liu, and Dawu Gu
PKC 2024
Multi-Hop Fine-Grained Proxy Re-Encryption [eprint]
Yunxiao Zhou, Shengli Liu, and Shuai Han
PKC 2024
Fine-Grained Proxy Re-Encryption: Definitions & Constructions from LWE [eprint]
Yunxiao Zhou, Shengli Liu, Shuai Han, and Haibin Zhang
ASIACRYPT 2023
Almost Tight Multi-User Security under Adaptive Corruptions from LWE in the Standard Model [eprint]
Shuai Han, Shengli Liu, Zhedong Wang, and Dawu Gu
CRYPTO 2023
Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model [eprint]
Shuai Han, Shengli Liu, and Dawu Gu
EUROCRYPT 2023
Fine-grained Verifier NIZK and Its Applications
Xiangyu Liu, Shengli Liu, Shuai Han, and Dawu Gu
PKC 2023
EKE Meets Tight Security in the Universally Composable Framework [eprint]
Xiangyu Liu, Shengli Liu, Shuai Han, and Dawu Gu
PKC 2023
Privacy-Preserving Authenticated Key Exchange in the Standard Model [eprint]
You Lyu, Shengli Liu, Shuai Han, and Dawu Gu
ASIACRYPT 2022
Anonymous Public Key Encryption under Corruptions [eprint]
Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, and Jian Weng
ASIACRYPT 2022
Fuzzy Authenticated Key Exchange with Tight Security
Mingming Jiang, Shengli Liu, Shuai Han, and Dawu Gu
ESORICS 2022
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness [eprint]
Shuai Han, Shengli Liu, and Dawu Gu
ASIACRYPT 2021
Optimized Paillier’s Cryptosystem with Fast Encryption and Decryption
Huanyu Ma, Shuai Han, and Hao Lei
ACSAC 2021
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model [eprint]
Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, and Sven Schäge
CRYPTO 2021
Authentication System Based on Fuzzy Extractors
Mingming Jiang, Shengli Liu, Shuai Han, and Dawu Gu
WASA 2021
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System [eprint]
Shuai Han, Shengli Liu, Lin Lyu, and Dawu Gu
CRYPTO 2019
Strong Leakage and Tamper-Resilient Public Key Encryption from Refined Hash Proof Systems
Shi-Feng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, and Joseph Liu
ACNS 2019
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions [eprint]
Lin Lyu, Shengli Liu, Shuai Han, and Dawu Gu
PKC 2018
KDM-Secure Public-Key Encryption from Constant-Noise LPN [eprint]
Shuai Han, and Shengli Liu
ACISP 2017
Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions [eprint]
Shuai Han, Shengli Liu, and Lin Lyu
ASIACRYPT 2016
How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks
Baodong Qin, Shuai Han, Yu Chen, Shengli Liu, and Zhuo Wei
INSCRYPT 2016
Homomorphic Linear Authentication Schemes from epsilon-Authentication Codes
Shuai Han, Shengli Liu, Fangguo Zhang, and Kefei Chen
ASIACCS 2016
An Efficient Key-Versatile KDM-Secure Storage Scheme
Chenglong Ying, Shengli Liu, and Shuai Han
CSEA 2015
Proofs of Retrievability Based on MRD Codes [eprint]
Shuai Han, Shengli Liu, Kefei Chen, and Dawu Gu
ISPEC 2014
Functional Commitments for Arbitrary Circuits of Bounded Sizes
Jinrui Sha, Shengli Liu, and Shuai Han
Designs, Codes and Cryptography (2024)
Robustly Reusable Fuzzy Extractor from Isogeny
Yu Zhou, Shengli Liu, and Shuai Han
Theoretical Computer Science (2024)
Biometric-Based Two-Factor Authentication Scheme under Database Leakage
Mingming Jiang, Shengli Liu, Shuai Han, and Dawu Gu
Theoretical Computer Science (2024)
Leakage-Resilient CCA-Secure Inner-Product Functional Encryption [paper, in Chinese]
Shuai Han, Shengli Liu, and Dawu Gu
Journal of Cryptologic Research (2023)
Simulatable Verifiable Random Function from the LWE Assumption
Yiming Li, Shengli Liu, Shuai Han, Dawu Gu, and Jian Weng
Theoretical Computer Science (2023)
Generic Construction of 1-out-of-n Oblivious Signatures
Yu Zhou, Shengli Liu, and Shuai Han
IEICE Transactions on Information and Systems (2022)
Tightly CCA-secure Inner Product Functional Encryption Scheme
Xiangyu Liu, Shengli Liu, Shuai Han, and Dawu Gu
Theoretical Computer Science (2022)
Pseudorandom Functions in NC Class from the Standard LWE Assumption
Yiming Li, Shengli Liu, Shuai Han, and Dawu Gu
Designs, Codes and Cryptography (2021)
Multilinear Maps from Obfuscation
Martin R. Albrecht, Pooya Farshim, Shuai Han, Dennis Hofheinz, Enrique Larraia, and Kenneth G. Paterson
Journal of Cryptology (2020)
New Insights on Linear Cryptanalysis
Zhiqiang Liu, Shuai Han, Qingju Wang, Wei Li, Ya Liu, and Dawu Gu
Science China Information Sciences (2020)
QANIZK for Adversary-Dependent Languages and Their Applications
Shuai Han, Shengli Liu, and Lin Lyu
Theoretical Computer Science (2019)
Proofs of Retrievability from Linearly Homomorphic Structure-Preserving Signatures
Xiao Zhang, Shengli Liu, and Shuai Han
International Journal of Information and Computer Security (2019)
Tightly Secure Encryption Schemes against Related-Key Attacks
Shuai Han, Shengli Liu, Lin Lyu, and Dawu Gu
The Computer Journal (2018)
Computational Robust Fuzzy Extractor
Yunhua Wen, Shengli Liu, Ziyuan Hu, and Shuai Han
The Computer Journal (2018)
Reusable Fuzzy Extractor from the Decisional Diffie-Hellman Assumption
Yunhua Wen, Shengli Liu, and Shuai Han
Designs, Codes and Cryptography (2018)
Super-Strong RKA Secure MAC, PKE and SE from Tag-based Hash Proof System [eprint]
Shuai Han, Shengli Liu, and Lin Lyu
Designs, Codes and Cryptography (2018)
Tightly CCA-Secure Identity-Based Encryption with Ciphertext Pseudorandomness
Shuai Han, Shengli Liu, Baodong Qing, and Dawu Gu
Designs, Codes and Cryptography (2018)
Public-Key Encryption with Tight Simulation-Based Selective-Opening Security
Lin Lyu, Shengli Liu, and Shuai Han
The Computer Journal (2018)
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption
Shuai Han, Shengli Liu, and Lin Lyu
Security and Communication Networks (2017)
Public Key Cryptosystems Secure Against Memory Leakage Attacks
Shi-Feng Sun, Shuai Han, Dawu Gu, and Shengli Liu
IET Information Security (2016)
Improved Bounds on Negativity of Superpositions
Zhihao Ma, Zhihua Chen, Shuai Han, Shaoming Fei, and Simone Severini
Quantum Information and Computation (2012)
I have served as program committee member and external reviewer for several cryptography conferences and journals.
Program committee member:
Inscrypt 2021, APKC 2022, 2023, 2024, AsiaJCIS 2022, SocialSec 2022, ACNS 2025, PKC 2025.
Conference external reviewer:
CRYPTO, EUROCRYPT, ASIACRYPT, PKC, TCC, ACISP, ICISC, ISPEC, Pairing, ProvSec.
Journal external reviewer:
IEEE Transactions on Information Forensics and Security, Designs, Codes and Cryptography, Security and Communication Networks, Frontiers of Computer Science, IEEE Wireless Communications Magazine, Theoretical Computer Science.
Last updated: Oct 2024