20132019
If you made any changes in Pure these will be visible here soon.

Research Output 2013 2019

2019

Enabling authorized encrypted search for multi-authority medical databases

Xu, L., Sun, S., Yuan, X., Liu, J. K., Zuo, C. & Chungen, X., 18 Mar 2019, (Accepted/In press) In : IEEE Transactions on Emerging Topics in Computing. 12 p.

Research output: Contribution to journalArticleResearchpeer-review

2018

Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security

Zuo, C., Sun, S. F., Liu, J. K., Shao, J. & Pieprzyk, J., 2018, Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018 Barcelona, Spain, September 3–7, 2018 Proceedings, Part II. Lopez, J., Zhou, J. & Soriano, M. (eds.). Cham Switzerland: Springer, p. 228-246 19 p. (Lecture Notes in Computer Science ; vol. 11099 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Practical backward-Secure Searchable Encryption from symmetric puncturable encryption

Sun, S-F., Yuan, X., Liu, J. K., Steinfeld, R., Sakzad, A., Vo, V. & Nepal, S., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada . Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 763-780 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Result pattern hiding searchable encryption for conjunctive queries

Lai, S., Patranabis, S., Sakzad, A., Liu, J. K., Mukhopadhyay, D., Steinfeld, R., Sun, S-F., Liu, D. & Zuo, C., 2018, CCS’18 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security: October 15-19, 2018 Toronto, ON, Canada. Backes, M. & Wang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 745-762 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards efficient verifiable conjunctive keyword search for large encrypted database

Wang, J., Chen, X., Sun, S-F., Liu, J. K., Au, M. H. & Zhan, Z-H., 2018, Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018 Barcelona, Spain, September 3–7, 2018 Proceedings, Part II. Lopez, J., Zhou, J. & Soriano, M. (eds.). Cham Switzerland: Springer, p. 83-100 18 p. (Lecture Notes in Computer Science ; vol. 11099 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2017

Public key encryption resilient to leakage and tampering attacks

Sun, S-F., Gu, D., Parampalli, U., Yu, Y. & Qin, B., 1 Nov 2017, In : Journal of Computer and System Sciences. 89, p. 142-156 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Related-key secure key encapsulation from extended computational bilinear Diffie–Hellman

Qin, B., Liu, S., Sun, S., Deng, R. H. & Gu, D., 1 Sep 2017, In : Information Sciences. 406-407, p. 1-11 11 p.

Research output: Contribution to journalArticleResearchpeer-review

RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero

Sun, S-F., Au, M. H., Liu, J. K. & Yuen, T. H., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Foley, S., Snekkenes, E. & Gollmann, D. (eds.). Cham, Switzerland: Springer, Vol. 10493 . p. 456-474 19 p. (Lecture Notes in Computer Science; vol. 10493 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Towards multi-user searchable encryption supporting boolean query and fast decryption

Wang, Y., Wang, J., Sun, S-F., Liu, J. K., Susilo, W. & Chen, X., 2017, Provable Security: 11th International Conference, ProvSec 2017, 2017, Xi'an, China, October 23-25, 2017. Okamoto, T., Yu, Y., Ao, M. H. & Li, Y. (eds.). Cham Switzerland: Springer, Vol. 10592 . p. 24-38 15 p. (Lecture Notes in Computer Science ; vol. 10592 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2016

An efficient non-interactive multi-client searchable encryption with support for boolean queries

Sun, S-F., Liu, J. K., Sakzad, A., Steinfeld, R. & Yuen, T. H., 15 Sep 2016, Computer Security - ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26–30, 2016, Proceedings, Part I. Askoxylakis, I., Ioannidis, S., Katsikas, S. & Meadows, C. (eds.). Switzerland: Springer, p. 154-172 19 p. (Lecture Notes in Computer Science ; vol. 9878 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Anonymizing bitcoin transaction

Wijaya, D. A., Liu, J. K., Steinfeld, R., Sun, S. F. & Huang, X., 2016, Information Security Practice and Experience : 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16–18, 2016, Proceedings. Bao, F., Chen, L., Deng, R. H. & Wang, G. (eds.). Cham, Switzerland: Springer, p. 271-283 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10060 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Efficient chosen ciphertext secure identity-based encryption against key leakage attacks

Sun, S-F., Gu, D. & Liu, S., 25 Jul 2016, In : Security and Communication Networks. 9, 11, p. 1417-1434 18 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Efficient completely non-malleable and RKA secure public key encryptions

Sun, S-F., Parampalli, U., Yuen, T. H., Yu, Y. & Gu, D., 2016, Information Security and Privacy: 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II. Liu, J. K. & Steinfeld, R. (eds.). Switzerland: Springer, p. 134-150 17 p. (Lecture Notes in Computer Science; vol. 9723).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Efficient construction of completely non-malleable CCA secure public key encryption

Sun, S. F., Gu, D., Liu, J. K., Parampalli, U. & Yuen, T. H., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Wang, X. & Huang, X. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 901-906 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Privacy-preserving data sharing scheme over cloud for social applications

Lyu, C., Sun, S-F., Zhang, Y., Pande, A., Lu, H. & Gu, D., 1 Oct 2016, In : Journal of Network and Computer Applications. 74, p. 44-55 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Public key cryptosystems secure against memory leakage attacks

Sun, S-F., Han, S., Gu, D. & Liu, S., 1 Nov 2016, In : IET Information Security. 10, 6, p. 403-412 10 p.

Research output: Contribution to journalArticleResearchpeer-review

RKA-secure public key encryptions against efficiently invertible functions

Sun, S-F., Liu, J. K., Yu, Y., Qin, B. & Gu, D., 2016, In : Computer Journal. 59, 11, p. 1637-1658 22 p.

Research output: Contribution to journalArticleResearchpeer-review

2015

Fully secure wicked identity-based encryption against key leakage attacks

Sun, S-F., Gu, D. & Huang, Z., Oct 2015, In : Computer Journal. 58, 10, p. 2520-2536 17 p.

Research output: Contribution to journalArticleResearchpeer-review

SGOR: secure and scalable geographic opportunistic routing with received signal strength in WSNs

Lyu, C., Gu, D., Zhang, X., Sun, S., Zhang, Y. & Pande, A., 15 Mar 2015, In : Computer Communications. 59, p. 37-51 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Towards efficient, secure, and fine-grained access control system in MSNs with flexible revocations

Sun, S-F., Lyu, C., Gu, D., Zhang, Y. & Ren, Y., 2015, In : International Journal of Distributed Sensor Networks. 2015, 15 p., 857405.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
2014

Efficient leakage-resilient identity-based encryption with CCA security

Sun, S-F., Gu, D. & Liu, S., 2014, Pairing-Based Cryptography – Pairing 2013: 6th International Conference Beijing, China, November 22-24, 2013 Revised Selected Papers. Cao, Z. & Zhang, F. (eds.). Cham Switzerland: Springer, p. 149-167 19 p. (Lecture Notes in Computer Science; vol. 8365). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2013

Efficient, fast and scalable authentication for VANETs

Lyu, C., Gu, D., Zhang, X., Sun, S. & Tang, Y., 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC). Wang, J. (ed.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1768-1773 6 p. 6554831

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review