Shifeng Sun

Orcid: 0000-0002-2814-4124

Affiliations:
  • Shanghai Jiao Tong University, China
  • Monash University, VIC, Australia


According to our database1, Shifeng Sun authored at least 82 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy.
Proc. Priv. Enhancing Technol., 2025

2024
Efficient cryptanalysis of an encrypted database supporting data interoperability.
VLDB J., September, 2024

Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage.
IEEE Trans. Mob. Comput., April, 2024

Updatable searchable symmetric encryption: Definitions and constructions.
Theor. Comput. Sci., February, 2024

Towards Practical Multi-Client Order-Revealing Encryption: Improvement and Application.
IEEE Trans. Dependable Secur. Comput., 2024

Efficient KZG-based Univariate Sum-check and Lookup Argument.
IACR Cryptol. ePrint Arch., 2024

Scalable Private Set Union, with Stronger Security.
IACR Cryptol. ePrint Arch., 2024

MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority.
Proceedings of the 33rd USENIX Security Symposium, 2024

Practical Non-interactive Encrypted Conjunctive Search with Leakage Suppression.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

BlindShuffler: Universal and Trustless Mixing for Confidential Transactions.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

SecuPath: A Secure and Privacy-Preserving Multiparty Path Planning Framework in UAV Applications.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

Non-interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Verifiable Privacy-Enhanced Rotation Invariant LBP Feature Extraction in Fog Computing.
IEEE Trans. Ind. Informatics, December, 2023

Shorter Linkable Ring Signature Based on Middle-Product Learning with Errors Problem.
Comput. J., December, 2023

ShieldDB: An Encrypted Document Database With Padding Countermeasures.
IEEE Trans. Knowl. Data Eng., April, 2023

Incremental symmetric puncturable encryption with support for unbounded number of punctures.
Des. Codes Cryptogr., April, 2023

Outsourcing LDA-Based Face Recognition to an Untrusted Cloud.
IEEE Trans. Dependable Secur. Comput., 2023

Polynomial IOPs for Memory Consistency Checks in Zero-Knowledge Virtual Machines.
IACR Cryptol. ePrint Arch., 2023

Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings.
Proceedings of the Information Security - 26th International Conference, 2023

Blockchain-based Trustless Fair Payment Protocol for Verifiable Confidential Outsourcing Computation.
Proceedings of the IEEE International Conference on Blockchain, 2023

2022
Achieving Searchable Encryption Scheme With Search Pattern Hidden.
IEEE Trans. Serv. Comput., 2022

Forward and Backward Private DSSE for Range Queries.
IEEE Trans. Dependable Secur. Comput., 2022

Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation.
IEEE Trans. Dependable Secur. Comput., 2022

Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes.
IEEE Trans. Dependable Secur. Comput., 2022

Geometric Range Search on Encrypted Data With Forward/Backward Security.
IEEE Trans. Dependable Secur. Comput., 2022

${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions.
IEEE Trans. Dependable Secur. Comput., 2022

The Ideal Functionalities for Private Set Union, Revisited.
IACR Cryptol. ePrint Arch., 2022

Shuffle-based Private Set Union: Faster and More Secure.
IACR Cryptol. ePrint Arch., 2022

MixCT: Mixing Confidential Transactions from Homomorphic Commitment.
IACR Cryptol. ePrint Arch., 2022

Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage.
Frontiers Comput. Sci., 2022

OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control.
Proceedings of the Information Security - 25th International Conference, 2022

VOProof: Efficient zkSNARKs from Vector Oracle Compilers.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

A Universally Composable Non-interactive Aggregate Cash System.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Enabling Authorized Encrypted Search for Multi-Authority Medical Databases.
IEEE Trans. Emerg. Top. Comput., 2021

Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks.
J. Inf. Secur. Appl., 2021

Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security.
IACR Cryptol. ePrint Arch., 2021

Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Efficient Multi-client Order-Revealing Encryption and Its Applications.
Proceedings of the Computer Security - ESORICS 2021, 2021

Redactable Blockchain Supporting Supervision and Self-Management.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries.
IACR Cryptol. ePrint Arch., 2020

Public-Key Puncturable Encryption: Modular and Compact Constructions.
IACR Cryptol. ePrint Arch., 2020

Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes.
IACR Cryptol. ePrint Arch., 2020

Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.
IACR Cryptol. ePrint Arch., 2020

Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
J. Univers. Comput. Sci., 2019

Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy.
IACR Cryptol. ePrint Arch., 2019

RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
IACR Cryptol. ePrint Arch., 2019

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward/Backward Privacy.
CoRR, 2019

GraphSE<sup>2</sup>: An Encrypted Graph Database for Privacy-Preserving Social Search.
CoRR, 2019

Toward Forward Secure SSE Supporting Conjunctive Keyword Search.
IEEE Access, 2019

A Secure and Practical Blockchain Scheme for IoT.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Making Monero Hard-to-Trace and More Efficient.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey.
Proceedings of the Network and System Security - 13th International Conference, 2019

DGM: A Dynamic and Revocable Group Merkle Signature.
Proceedings of the Computer Security - ESORICS 2019, 2019

GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Result Pattern Hiding Searchable Encryption for Conjunctive Queries.
IACR Cryptol. ePrint Arch., 2018

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security.
Proceedings of the Computer Security, 2018

Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database.
Proceedings of the Computer Security, 2018

A Multi-client DSSE Scheme Supporting Range Queries.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Public key encryption resilient to leakage and tampering attacks.
J. Comput. Syst. Sci., 2017

Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman.
Inf. Sci., 2017

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
IACR Cryptol. ePrint Arch., 2017

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Proceedings of the Provable Security, 2017

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Efficient chosen ciphertext secure identity-based encryption against key leakage attacks.
Secur. Commun. Networks, 2016

Privacy-preserving data sharing scheme over cloud for social applications.
J. Netw. Comput. Appl., 2016

Public key cryptosystems secure against memory leakage attacks.
IET Inf. Secur., 2016

An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries.
IACR Cryptol. ePrint Arch., 2016

RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions.
Comput. J., 2016

Anonymizing Bitcoin Transaction.
Proceedings of the Information Security Practice and Experience, 2016

Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations.
Int. J. Distributed Sens. Networks, 2015

SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs.
Comput. Commun., 2015

Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks.
Comput. J., 2015

2013
Efficient, fast and scalable authentication for VANETs.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Efficient Leakage-Resilient Identity-Based Encryption with CCA Security.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013


  Loading...