×
Author ID: liu.shengli Recent zbMATH articles by "Liu, Shengli"
Published as: Liu, Shengli; Liu, Sheng-Li; Liu, Sheng-li
Homepage: https://english.seiee.sjtu.edu.cn/english/detail/841_671.htm
Documents Indexed: 85 Publications since 1999
Co-Authors: 67 Co-Authors with 84 Joint Publications
2,033 Co-Co-Authors

Publications by Year

Citations contained in zbMATH Open

55 Publications have been cited 362 times in 225 Documents Cited by Year
Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter. Zbl 1326.94117
Qin, Baodong; Liu, Shengli
25
2013
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. Zbl 1312.94071
Liu, Shengli; Weng, Jian; Zhao, Yunlei
18
2013
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited. Zbl 1314.94075
Huang, Zhengan; Liu, Shengli; Qin, Baodong
16
2013
Chosen-ciphertext secure proxy re-encryption without pairings. Zbl 1362.94026
Deng, Robert H.; Weng, Jian; Liu, Shengli; Chen, Kefei
16
2008
Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms. Zbl 1319.94078
Liu, Shengli; Paterson, Kenneth G.
16
2015
Continuous non-malleable key derivation and its application to related-key security. Zbl 1345.94085
Qin, Baodong; Liu, Shengli; Yuen, Tsz Hon; Deng, Robert H.; Chen, Kefei
16
2015
Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing. Zbl 1335.94074
Qin, Baodong; Liu, Shengli
16
2014
Server-aided revocable identity-based encryption. Zbl 1499.68057
Qin, Baodong; Deng, Robert H.; Li, Yingjiu; Liu, Shengli
15
2015
Two-pass authenticated key exchange with explicit authentication and tight security. Zbl 1511.94184
Liu, Xiangyu; Liu, Shengli; Gu, Dawu; Weng, Jian
13
2020
Robustly reusable fuzzy extractor from standard assumptions. Zbl 1447.94058
Wen, Yunhua; Liu, Shengli
13
2018
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system. Zbl 1507.68061
Han, Shuai; Liu, Shengli; Lyu, Lin; Gu, Dawu
12
2019
Identity-based key-insulated signature with secure key-updates. Zbl 1172.94629
Weng, Jian; Liu, Shengli; Chen, Kefei; Li, Xiangxue
12
2006
Authenticated key exchange and signatures with tight security in the standard model. Zbl 1489.94123
Han, Shuai; Jager, Tibor; Kiltz, Eike; Liu, Shengli; Pan, Jiaxin; Riepel, Doreen; Schäge, Sven
12
2021
Insight of the protection for data security under selective opening attacks. Zbl 1435.68079
Huang, Zhengan; Liu, Shengli; Mao, Xianping; Chen, Kefei; Li, Jin
11
2017
Identity-based encryption secure against selective opening chosen-ciphertext attack. Zbl 1326.94107
Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Weng, Jian; Zhao, Yunlei
11
2014
Tightly SIM-SO-CCA secure public key encryption from standard assumptions. Zbl 1385.94058
Lyu, Lin; Liu, Shengli; Han, Shuai; Gu, Dawu
11
2018
Reusable fuzzy extractor from the decisional Diffie-Hellman assumption. Zbl 1437.94077
Wen, Yunhua; Liu, Shengli; Han, Shuai
10
2018
Efficient KDM-CCA secure public-key encryption for polynomial functions. Zbl 1407.94118
Han, Shuai; Liu, Shengli; Lyu, Lin
9
2016
Efficient CCA-secure PKE from identity-based techniques. Zbl 1272.94047
Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Kou, Weidong
9
2010
Identity-based threshold key-insulated encryption without random oracles. Zbl 1153.94437
Weng, Jian; Liu, Shengli; Chen, Kefei; Zheng, Dong; Qiu, Weidong
8
2008
Reusable fuzzy extractor from LWE. Zbl 1444.94107
Wen, Yunhua; Liu, Shengli
8
2018
Identity-based parallel key-insulated encryption without random oracles: Security notions and construction. Zbl 1175.94120
Weng, Jian; Liu, Shengli; Chen, Kefei; Ma, Changshe
7
2006
Generic constructions of robustly reusable fuzzy extractor. Zbl 1509.94138
Wen, Yunhua; Liu, Shengli; Gu, Dawu
7
2019
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Zbl 1204.94078
Weng, Jian; Deng, Robert H.; Liu, Shengli; Chen, Kefei
6
2010
Analysis of information leakage in quantum key agreement. Zbl 1105.94319
Liu, Shengli; Zheng, Dong; Cheng, Kefei
5
2006
A generic construction of tightly secure signatures in the multi-user setting. Zbl 1455.94221
Zhang, Xiao; Liu, Shengli; Gu, Dawu; Liu, Joseph K.
5
2019
Efficient leakage-resilient identity-based encryption with CCA security. Zbl 1307.94101
Sun, Shi-Feng; Gu, Dawu; Liu, Shengli
4
2014
Revocable identity-based encryption from the computational Diffie-Hellman problem. Zbl 1444.94071
Hu, Ziyuan; Liu, Shengli; Chen, Kefei; Liu, Joseph K.
4
2018
Efficient computation outsourcing for inverting a class of homomorphic functions. Zbl 1355.68079
Zhang, Fangguo; Ma, Xu; Liu, Shengli
4
2014
Chameleon all-but-one TDFs and their application to chosen-ciphertext security. Zbl 1291.94116
Lai, Junzuo; Deng, Robert H.; Liu, Shengli
3
2011
Robustly reusable fuzzy extractor with imperfect randomness. Zbl 1462.94034
Cui, Nan; Liu, Shengli; Gu, Dawu; Weng, Jian
3
2021
Identity-based strong key-insulated signature without random oracles. Zbl 1199.68150
Weng, Jian; Chen, Kefei; Liu, Shengli; Li, Xiangxue
3
2008
A practical protocol for advantage distillation and information reconciliation. Zbl 1026.94534
Liu, Shengli; Van Tilborg, Henk C. A.; Van Dijk, Marten
2
2003
Tightly-secure signatures from the decisional composite residuosity assumption. Zbl 1416.94063
Zhang, Xiao; Liu, Shengli; Gu, Dawu
2
2017
Non-malleability under selective opening attacks: implication and separation. Zbl 1459.94115
Huang, Zhengan; Liu, Shengli; Mao, Xianping; Chen, Kefei
2
2015
Key updating technique in identity-based encryption. Zbl 1217.94101
Liu, Shengli; Long, Yu; Chen, Kefei
2
2011
Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness. Zbl 1514.94094
Han, Shuai; Liu, Shengli; Gu, Dawu
2
2021
Certificateless key-insulated signature without random oracles. Zbl 1209.94051
Wan, Zhong-Mei; Lai, Xue-Jia; Weng, Jian; Liu, Sheng-Li; Long, Yu
2
2009
Combined BFGS-chaos method for solving geometric constraint. Zbl 1130.93375
Ou-Yang, Yingxiu; Tang, Min; Liu, Shengli; Dong, Jinxiang
2
2005
Efficient and proactive threshold signcryption. Zbl 1127.68389
Ma, Changshe; Chen, Kefei; Zheng, Dong; Liu, Shengli
2
2005
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness. Zbl 1391.68028
Han, Shuai; Liu, Shengli; Qin, Baodong; Gu, Dawu
2
2018
ID-based threshold decryption secure against adaptive chosen-ciphertext attack. Zbl 1120.68051
Long, Yu; Chen, Kefei; Liu, Shengli
2
2007
Almost tight multi-user security under adaptive corruptions & leakages in the standard model. Zbl 07776100
Han, Shuai; Liu, Shengli; Gu, Dawu
2
2023
Cryptanalysis of LKK proxy signature. Zbl 1084.94522
Zheng, Dong; Liu, Shengli; Chen, Kefei
1
2004
The Hamiltonian structure-preserving control and some applications to nonlinear astrodynamics. Zbl 1266.37056
Xu, Ming; Wei, Yan; Liu, Shengli
1
2013
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited. Zbl 1322.68069
Huang, Zhengan; Liu, Shengli; Qin, Baodong; Chen, Kefei
1
2015
Tightly secure chameleon hash functions in the multi-user setting and their applications. Zbl 1464.94040
Liu, Xiangyu; Liu, Shengli; Gu, Dawu
1
2020
EKE meets tight security in the universally composable framework. Zbl 07770272
Liu, Xiangyu; Liu, Shengli; Han, Shuai; Gu, Dawu
1
2023
Strong key-insulated signature in the standard model. Zbl 1218.94046
Wan, Zhong-mei; Lai, Xue-jia; Weng, Jian; Liu, Sheng-li; Long, Yu; Hong, Xuan
1
2010
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system. Zbl 1420.94071
Han, Shuai; Liu, Shengli; Lyu, Lin
1
2018
Solving ECDLP via list decoding. Zbl 1426.94140
Zhang, Fangguo; Liu, Shengli
1
2019
Verifiable encrypted signatures without random oracles. Zbl 1105.94316
Li, Xiangxue; Chen, Kefei; Liu, Shengli; Li, Shiqun
1
2006
Tightly CCA-secure inner product functional encryption scheme. Zbl 1481.94114
Liu, Xiangyu; Liu, Shengli; Han, Shuai; Gu, Dawu
1
2022
Privacy-preserving authenticated key exchange in the standard model. Zbl 1519.94170
Lyu, You; Liu, Shengli; Han, Shuai; Gu, Dawu
1
2023
Fuzzy authenticated key exchange with tight security. Zbl 1524.94067
Jiang, Mingming; Liu, Shengli; Han, Shuai; Gu, Dawu
1
2022
Almost tight multi-user security under adaptive corruptions & leakages in the standard model. Zbl 07776100
Han, Shuai; Liu, Shengli; Gu, Dawu
2
2023
EKE meets tight security in the universally composable framework. Zbl 07770272
Liu, Xiangyu; Liu, Shengli; Han, Shuai; Gu, Dawu
1
2023
Privacy-preserving authenticated key exchange in the standard model. Zbl 1519.94170
Lyu, You; Liu, Shengli; Han, Shuai; Gu, Dawu
1
2023
Tightly CCA-secure inner product functional encryption scheme. Zbl 1481.94114
Liu, Xiangyu; Liu, Shengli; Han, Shuai; Gu, Dawu
1
2022
Fuzzy authenticated key exchange with tight security. Zbl 1524.94067
Jiang, Mingming; Liu, Shengli; Han, Shuai; Gu, Dawu
1
2022
Authenticated key exchange and signatures with tight security in the standard model. Zbl 1489.94123
Han, Shuai; Jager, Tibor; Kiltz, Eike; Liu, Shengli; Pan, Jiaxin; Riepel, Doreen; Schäge, Sven
12
2021
Robustly reusable fuzzy extractor with imperfect randomness. Zbl 1462.94034
Cui, Nan; Liu, Shengli; Gu, Dawu; Weng, Jian
3
2021
Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness. Zbl 1514.94094
Han, Shuai; Liu, Shengli; Gu, Dawu
2
2021
Two-pass authenticated key exchange with explicit authentication and tight security. Zbl 1511.94184
Liu, Xiangyu; Liu, Shengli; Gu, Dawu; Weng, Jian
13
2020
Tightly secure chameleon hash functions in the multi-user setting and their applications. Zbl 1464.94040
Liu, Xiangyu; Liu, Shengli; Gu, Dawu
1
2020
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system. Zbl 1507.68061
Han, Shuai; Liu, Shengli; Lyu, Lin; Gu, Dawu
12
2019
Generic constructions of robustly reusable fuzzy extractor. Zbl 1509.94138
Wen, Yunhua; Liu, Shengli; Gu, Dawu
7
2019
A generic construction of tightly secure signatures in the multi-user setting. Zbl 1455.94221
Zhang, Xiao; Liu, Shengli; Gu, Dawu; Liu, Joseph K.
5
2019
Solving ECDLP via list decoding. Zbl 1426.94140
Zhang, Fangguo; Liu, Shengli
1
2019
Robustly reusable fuzzy extractor from standard assumptions. Zbl 1447.94058
Wen, Yunhua; Liu, Shengli
13
2018
Tightly SIM-SO-CCA secure public key encryption from standard assumptions. Zbl 1385.94058
Lyu, Lin; Liu, Shengli; Han, Shuai; Gu, Dawu
11
2018
Reusable fuzzy extractor from the decisional Diffie-Hellman assumption. Zbl 1437.94077
Wen, Yunhua; Liu, Shengli; Han, Shuai
10
2018
Reusable fuzzy extractor from LWE. Zbl 1444.94107
Wen, Yunhua; Liu, Shengli
8
2018
Revocable identity-based encryption from the computational Diffie-Hellman problem. Zbl 1444.94071
Hu, Ziyuan; Liu, Shengli; Chen, Kefei; Liu, Joseph K.
4
2018
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness. Zbl 1391.68028
Han, Shuai; Liu, Shengli; Qin, Baodong; Gu, Dawu
2
2018
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system. Zbl 1420.94071
Han, Shuai; Liu, Shengli; Lyu, Lin
1
2018
Insight of the protection for data security under selective opening attacks. Zbl 1435.68079
Huang, Zhengan; Liu, Shengli; Mao, Xianping; Chen, Kefei; Li, Jin
11
2017
Tightly-secure signatures from the decisional composite residuosity assumption. Zbl 1416.94063
Zhang, Xiao; Liu, Shengli; Gu, Dawu
2
2017
Efficient KDM-CCA secure public-key encryption for polynomial functions. Zbl 1407.94118
Han, Shuai; Liu, Shengli; Lyu, Lin
9
2016
Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms. Zbl 1319.94078
Liu, Shengli; Paterson, Kenneth G.
16
2015
Continuous non-malleable key derivation and its application to related-key security. Zbl 1345.94085
Qin, Baodong; Liu, Shengli; Yuen, Tsz Hon; Deng, Robert H.; Chen, Kefei
16
2015
Server-aided revocable identity-based encryption. Zbl 1499.68057
Qin, Baodong; Deng, Robert H.; Li, Yingjiu; Liu, Shengli
15
2015
Non-malleability under selective opening attacks: implication and separation. Zbl 1459.94115
Huang, Zhengan; Liu, Shengli; Mao, Xianping; Chen, Kefei
2
2015
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited. Zbl 1322.68069
Huang, Zhengan; Liu, Shengli; Qin, Baodong; Chen, Kefei
1
2015
Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing. Zbl 1335.94074
Qin, Baodong; Liu, Shengli
16
2014
Identity-based encryption secure against selective opening chosen-ciphertext attack. Zbl 1326.94107
Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Weng, Jian; Zhao, Yunlei
11
2014
Efficient leakage-resilient identity-based encryption with CCA security. Zbl 1307.94101
Sun, Shi-Feng; Gu, Dawu; Liu, Shengli
4
2014
Efficient computation outsourcing for inverting a class of homomorphic functions. Zbl 1355.68079
Zhang, Fangguo; Ma, Xu; Liu, Shengli
4
2014
Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter. Zbl 1326.94117
Qin, Baodong; Liu, Shengli
25
2013
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. Zbl 1312.94071
Liu, Shengli; Weng, Jian; Zhao, Yunlei
18
2013
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited. Zbl 1314.94075
Huang, Zhengan; Liu, Shengli; Qin, Baodong
16
2013
The Hamiltonian structure-preserving control and some applications to nonlinear astrodynamics. Zbl 1266.37056
Xu, Ming; Wei, Yan; Liu, Shengli
1
2013
Chameleon all-but-one TDFs and their application to chosen-ciphertext security. Zbl 1291.94116
Lai, Junzuo; Deng, Robert H.; Liu, Shengli
3
2011
Key updating technique in identity-based encryption. Zbl 1217.94101
Liu, Shengli; Long, Yu; Chen, Kefei
2
2011
Efficient CCA-secure PKE from identity-based techniques. Zbl 1272.94047
Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Kou, Weidong
9
2010
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Zbl 1204.94078
Weng, Jian; Deng, Robert H.; Liu, Shengli; Chen, Kefei
6
2010
Strong key-insulated signature in the standard model. Zbl 1218.94046
Wan, Zhong-mei; Lai, Xue-jia; Weng, Jian; Liu, Sheng-li; Long, Yu; Hong, Xuan
1
2010
Certificateless key-insulated signature without random oracles. Zbl 1209.94051
Wan, Zhong-Mei; Lai, Xue-Jia; Weng, Jian; Liu, Sheng-Li; Long, Yu
2
2009
Chosen-ciphertext secure proxy re-encryption without pairings. Zbl 1362.94026
Deng, Robert H.; Weng, Jian; Liu, Shengli; Chen, Kefei
16
2008
Identity-based threshold key-insulated encryption without random oracles. Zbl 1153.94437
Weng, Jian; Liu, Shengli; Chen, Kefei; Zheng, Dong; Qiu, Weidong
8
2008
Identity-based strong key-insulated signature without random oracles. Zbl 1199.68150
Weng, Jian; Chen, Kefei; Liu, Shengli; Li, Xiangxue
3
2008
ID-based threshold decryption secure against adaptive chosen-ciphertext attack. Zbl 1120.68051
Long, Yu; Chen, Kefei; Liu, Shengli
2
2007
Identity-based key-insulated signature with secure key-updates. Zbl 1172.94629
Weng, Jian; Liu, Shengli; Chen, Kefei; Li, Xiangxue
12
2006
Identity-based parallel key-insulated encryption without random oracles: Security notions and construction. Zbl 1175.94120
Weng, Jian; Liu, Shengli; Chen, Kefei; Ma, Changshe
7
2006
Analysis of information leakage in quantum key agreement. Zbl 1105.94319
Liu, Shengli; Zheng, Dong; Cheng, Kefei
5
2006
Verifiable encrypted signatures without random oracles. Zbl 1105.94316
Li, Xiangxue; Chen, Kefei; Liu, Shengli; Li, Shiqun
1
2006
Combined BFGS-chaos method for solving geometric constraint. Zbl 1130.93375
Ou-Yang, Yingxiu; Tang, Min; Liu, Shengli; Dong, Jinxiang
2
2005
Efficient and proactive threshold signcryption. Zbl 1127.68389
Ma, Changshe; Chen, Kefei; Zheng, Dong; Liu, Shengli
2
2005
Cryptanalysis of LKK proxy signature. Zbl 1084.94522
Zheng, Dong; Liu, Shengli; Chen, Kefei
1
2004
A practical protocol for advantage distillation and information reconciliation. Zbl 1026.94534
Liu, Shengli; Van Tilborg, Henk C. A.; Van Dijk, Marten
2
2003
all top 5

Cited by 454 Authors

28 Liu, Shengli
18 Gu, Dawu
14 Han, Shuai
14 Weng, Jian
11 Pan, Jiaxin
10 Huang, Zhengan
10 Yang, Bo
10 Zhou, Yanwei
9 Deng, Robert Huijie
9 Qin, Baodong
8 Matsuda, Takahiro
8 Mu, Yi
8 Susilo, Willy
7 Jager, Tibor
7 Lai, Junzuo
6 Long, Yu
6 Takayasu, Atsushi
6 Watanabe, Yohei
5 Chen, Kefei
5 Chen, Yu
5 Emura, Keita
5 Jia, Dingding
5 Li, Bao
5 Li, Jiguo
5 Liu, Joseph K. K.
5 Lyu, Lin
5 Tanaka, Keisuke
5 Wagner, Benedikt
5 Xia, Zhe
5 Zhang, Futai
4 Faust, Sebastian
4 Fuller, Benjamin
4 Hanaoka, Goichiro
4 Kitagawa, Fuyuki
4 Li, Jin
4 Lu, Xianhui
4 Lu, Yang
4 Seo, Jae Hong
4 Sun, Shifeng
4 Venturi, Daniele
4 Zeng, Runzhi
4 Zhang, Mingwu
4 Zheng, Dong
3 Au, Man Ho
3 Cao, Zhenfu
3 Chen, Jianhong
3 Cheng, Xiangguo
3 Chow, Sherman S. M.
3 Diemert, Denis
3 Dutta, Ratna
3 Faonio, Antonio
3 Fu, Anmin
3 Gellert, Kai
3 Guo, Fuchun
3 Hao, Rong
3 Hofheinz, Dennis
3 Libert, Benoît
3 Mukherjee, Pratyay
3 Nishimaki, Ryo
3 Rao, Y. Sreenivasa
3 Shikata, Junji
3 Sun, Yinxia
3 Wan, Zhongmei
3 Wang, Huaxiong
3 Wen, Yunhua
3 Xu, Qiuliang
3 Yang, Guomin
3 Yang, Rupeng
3 Yu, Jia
3 Yu, Yu
3 Zhang, Yichen
2 Bao, Feng
2 Bootle, Jonathan
2 Boyen, Xavier
2 Chang, Jinyong
2 Chen, Jie
2 Chen, Kefei
2 Chen, Wenbin
2 Chu, Cheng-Kang
2 Cui, Hui
2 Cui, Nan
2 Damgård, Ivan Bjerre
2 Deng, Yi
2 Duong, Dung Hoang
2 Fujisaki, Eiichiro
2 Fukushima, Kazuhide
2 Guo, Yuyan
2 Hara, Keisuke
2 He, Kai
2 Hong, Xuan
2 Hu, Chengyu
2 Hu, Ziyuan
2 Katsumata, Shuichi
2 Kiltz, Eike
2 Kiyomoto, Shinsaku
2 Kong, Fanyu
2 Lai, Xuejia
2 Lee, Hyungtae
2 Li, Qinyi
2 Liang, Kaitai
...and 354 more Authors

Citations by Year