dalen17 at sjtu dot edu dot cn
Associate professor @ SJTU
Working on cryptography
My research interests focus on public-key cryptography with provable security.
In particular, I am interested in the design of cryptographic schemes
Tenure-track associate professor, Shanghai Jiao Tong University, China, Jan 2024 - Present
Tenure-track assistant professor, Shanghai Jiao Tong University, China, Jul 2020 - Dec 2023
Cyptographic algorithm engineer, Ant Group, China, Dec 2018 - Jun 2020
Postdoctoral researcher, Karlsruhe Institute of Technology, Germany, Oct 2017 - Sep 2018
PH.D. in Computer Science, Shanghai Jiao Tong University, China, Sep 2012 - Sep 2017
B.S. in Mathematics & in Physics (Zhiyuan Honors Class), Shanghai Jiao Tong University, China, Sep 2008 - Jun 2012
NIS7019: Cryptographic Algorithms (Graduate, Spring 2021, Spring 2022, Spring 2023, Spring 2024)
NIS4333: Modern Cryptography (Undergraduate, Spring 2023, Spring 2024)
MATH6010: Graph and Networks (Graduate, Autumn 2021)
CS1501: Thinking and Methodology in Programming (C++) (Undergraduate, Autumn 2021)
Universal Composable Password Authenticated Key Exchange for the Post-Quantum World [eprint]
You Lyu, Shengli Liu, and Shuai Han
In Proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2024)
More Efficient Public-Key Cryptography with Leakage and Tamper Resilience [eprint]
Shuai Han, Shengli Liu, and Dawu Gu
In Proceedings of the 27th International Conference on Practice and Theory in Public-Key Cryptography (PKC 2024)
Multi-Hop Fine-Grained Proxy Re-Encryption [eprint]
Yunxiao Zhou, Shengli Liu, and Shuai Han
In Proceedings of the 27th International Conference on Practice and Theory in Public-Key Cryptography (PKC 2024)
Fine-Grained Proxy Re-Encryption: Definitions & Constructions from LWE [eprint]
Yunxiao Zhou, Shengli Liu, Shuai Han, and Haibin Zhang
In Proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2023)
Almost Tight Multi-User Security under Adaptive Corruptions from LWE in the Standard Model [eprint]
Shuai Han, Shengli Liu, Zhedong Wang, and Dawu Gu
In Proceedings of the 43rd International Cryptology Conference (CRYPTO 2023)
Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model [eprint]
Shuai Han, Shengli Liu, and Dawu Gu
In Proceedings of the 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2023)
Fine-grained Verifier NIZK and Its Applications
Xiangyu Liu, Shengli Liu, Shuai Han, and Dawu Gu
In Proceedings of the 26th International Conference on Practice and Theory in Public-Key Cryptography (PKC 2023)
EKE Meets Tight Security in the Universally Composable Framework [eprint]
Xiangyu Liu, Shengli Liu, Shuai Han, and Dawu Gu
In Proceedings of the 26th International Conference on Practice and Theory in Public-Key Cryptography (PKC 2023)
Privacy-Preserving Authenticated Key Exchange in the Standard Model [eprint]
You Lyu, Shengli Liu, Shuai Han, and Dawu Gu
In Proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2022)
Anonymous Public Key Encryption under Corruptions [eprint]
Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, and Jian Weng
In Proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2022)
Fuzzy Authenticated Key Exchange with Tight Security
Mingming Jiang, Shengli Liu, Shuai Han, and Dawu Gu
In Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS 2022)
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness [eprint]
Shuai Han, Shengli Liu, and Dawu Gu
In Proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2021)
Optimized Paillier’s Cryptosystem with Fast Encryption and Decryption
Huanyu Ma, Shuai Han, and Hao Lei
In Proceedings of the 37th Annual Computer Security Applications Conference (ACSAC 2021)
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model [eprint]
Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, and Sven Schäge
In Proceedings of the 41st International Cryptology Conference (CRYPTO 2021)
Authentication System Based on Fuzzy Extractors
Mingming Jiang, Shengli Liu, Shuai Han, and Dawu Gu
In Proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2021)
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System [eprint]
Shuai Han, Shengli Liu, Lin Lyu, and Dawu Gu
In Proceedings of the 39th International Cryptology Conference (CRYPTO 2019)
Strong Leakage and Tamper-Resilient Public Key Encryption from Refined Hash Proof Systems
Shi-Feng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, and Joseph Liu
In Proceedings of the 17th International Conference on Applied Cryptography and Network Security (ACNS 2019)
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions [eprint]
Lin Lyu, Shengli Liu, Shuai Han, and Dawu Gu
In Proceedings of the 21st International Conference on Practice and Theory in Public-Key Cryptography (PKC 2018)
KDM-Secure Public-Key Encryption from Constant-Noise LPN [eprint] [slides]
Shuai Han, and Shengli Liu
In Proceedings of the 22nd Australasian Conference on Information Security and Privacy (ACISP 2017)
Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions [eprint] [slides]
Shuai Han, Shengli Liu, and Lin Lyu
In Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2016)
How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks
Baodong Qin, Shuai Han, Yu Chen, Shengli Liu, and Zhuo Wei
In Proceedings of the 12th International Conference on Information Security and Cryptology (INSCRYPT 2016)
Homomorphic Linear Authentication Schemes from epsilon-Authentication Codes [slides]
Shuai Han, Shengli Liu, Fangguo Zhang, and Kefei Chen
In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIACCS 2016)
An Efficient Key-Versatile KDM-Secure Storage Scheme [pdf] [slides]
Chenglong Ying, Shengli Liu, and Shuai Han
In Proceedings of the International Conference on Computational Science and Engineering Applications (CSEA 2015)
Proofs of Retrievability Based on MRD Codes [eprint] [slides]
Shuai Han, Shengli Liu, Kefei Chen, and Dawu Gu
In Proceedings of the 10th International Conference on Information Security Practice and Experience (ISPEC 2014)
Leakage-Resilient CCA-Secure Inner-Product Functional Encryption [paper, in Chinese]
Shuai Han, Shengli Liu, and Dawu Gu
Journal of Cryptologic Research (2023)
Simulatable Verifiable Random Function from the LWE Assumption
Yiming Li, Shengli Liu, Shuai Han, Dawu Gu, and Jian Weng
Theoretical Computer Science (2023)
Generic Construction of 1-out-of-n Oblivious Signatures
Yu Zhou, Shengli Liu, and Shuai Han
IEICE Transactions on Information and Systems (2022)
Tightly CCA-secure Inner Product Functional Encryption Scheme
Xiangyu Liu, Shengli Liu, Shuai Han, and Dawu Gu
Theoretical Computer Science (2022)
Pseudorandom Functions in NC Class from the Standard LWE Assumption
Yiming Li, Shengli Liu, Shuai Han, and Dawu Gu
Designs, Codes and Cryptography (2021)
Multilinear Maps from Obfuscation
Martin R. Albrecht, Pooya Farshim, Shuai Han, Dennis Hofheinz, Enrique Larraia, and Kenneth G. Paterson
Journal of Cryptology (2020)
New Insights on Linear Cryptanalysis
Zhiqiang Liu, Shuai Han, Qingju Wang, Wei Li, Ya Liu, and Dawu Gu
Science China Information Sciences (2020)
QANIZK for Adversary-Dependent Languages and Their Applications
Shuai Han, Shengli Liu, and Lin Lyu
Theoretical Computer Science (2019)
Proofs of Retrievability from Linearly Homomorphic Structure-Preserving Signatures
Xiao Zhang, Shengli Liu, and Shuai Han
International Journal of Information and Computer Security (2019)
Tightly Secure Encryption Schemes against Related-Key Attacks
Shuai Han, Shengli Liu, Lin Lyu, and Dawu Gu
The Computer Journal (2018)
Computational Robust Fuzzy Extractor
Yunhua Wen, Shengli Liu, Ziyuan Hu, and Shuai Han
The Computer Journal (2018)
Reusable Fuzzy Extractor from the Decisional Diffie-Hellman Assumption
Yunhua Wen, Shengli Liu, and Shuai Han
Designs, Codes and Cryptography (2018)
Super-Strong RKA Secure MAC, PKE and SE from Tag-based Hash Proof System [eprint]
Shuai Han, Shengli Liu, and Lin Lyu
Designs, Codes and Cryptography (2018)
Tightly CCA-Secure Identity-Based Encryption with Ciphertext Pseudorandomness
Shuai Han, Shengli Liu, Baodong Qing, and Dawu Gu
Designs, Codes and Cryptography (2018)
Public-Key Encryption with Tight Simulation-Based Selective-Opening Security
Lin Lyu, Shengli Liu, and Shuai Han
The Computer Journal (2018)
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption
Shuai Han, Shengli Liu, and Lin Lyu
Security and Communication Networks (2017)
Public Key Cryptosystems Secure Against Memory Leakage Attacks
Shi-Feng Sun, Shuai Han, Dawu Gu, and Shengli Liu
IET Information Security (2016)
Improved Bounds on Negativity of Superpositions
Zhihao Ma, Zhihua Chen, Shuai Han, Shaoming Fei, and Simone Severini
Quantum Information and Computation (2012)
I have served as program committee member and external reviewer for several cryptography conferences and journals.
Program committee member:
Inscrypt 2021, APKC 2022, 2023, 2024, AsiaJCIS 2022, SocialSec 2022.
Conference external reviewer:
CRYPTO, EUROCRYPT, ASIACRYPT, PKC, TCC, ACISP, ICISC, ISPEC, Pairing, ProvSec.
Journal external reviewer:
IEEE Transactions on Information Forensics and Security, Designs, Codes and Cryptography, Security and Communication Networks, Frontiers of Computer Science, IEEE Wireless Communications Magazine, Theoretical Computer Science.
Last updated: Mar 2024