CRYPTAI’s Publications

Recent and selected papers

  • d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases, accepted by USENIX Security (A* conference) 2024.
  • Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages, accepted by ESORICS (A conference) 2024.
  • Query Recovery from Easy to Hard: Jigsaw Attack against SSE, accepted by USENIX Security (A* conference) 2024.
  • Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE, accepted by CSF (A conference) 2024.
  • PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption, accepted by PETS (A conference) 2024.
  • High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption, USENIX Security (A* conference) 2023.
  • CCA-1 Secure Updatable Encryption with Adaptive Security, Asiacrypt (A conference) 2023.
  • The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption, NDSS (A* conference) 2023.
  • FLVoogd: Robust And Privacy Preserving Federated Learning, ACML 2022.
  • More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks, ACSAC (A conference) 2022.
  • MVOC: A Lighter Multi-Client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption, ESORICS (A conference) 2022.
  • Explore More, Reveal More - VAL: Volume and Access Pattern Leakage-abuse Attack with Leaked Documents, ESORICS (A conference) 2022.
  • No-directional and Backward-leak Uni-directional Updatable Encryption are Equivalent, ESORICS (A conference) 2022.
  • DEKS: a Secure Cloud-based Searchable Service can Make Attackers Pay, ESORICS (A conference) 2022.
  • DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints, IEEE CVPR (A* conference) 2022.
  • Practical algorithm substitution attack on extractable signatures, Designs, Codes and Cryptography.
  • Two password models, IEEE ICASSP 2022.
  • PIVODL:Privacy-preserving vertical federated learning over distributed labels, IEEE Transactions on Artificial Intelligence.
  • Incrementally Updateable Honey Password Vaults, USENIX Security (A* conference) 2021.
  • Practical Threshold Multi-Factor Authentication, IEEE Transactions on Information Forensics and Security (top two computer security and cryptography publication).
  • FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing, IEEE Transactions on Dependable and Secure Computing (top seven computer security and cryptography publication).
  • ROSE: Robust Searchable Encryption With Forward and Backward Security, IEEE Transactions on Information Forensics and Security (top two computer security and cryptography publication).
  • HPAKE: Honey Password-authenticated Key Exchange for Fast and Safer Online Authentication, IEEE Transactions on Information Forensics and Security (top two computer security and cryptography publication).
  • On-the-Fly Privacy for Location Histograms, IEEE Transactions on Dependable and Secure Computing (top two computer security and cryptography publication).
  • Dual Access Control for Cloud-Based Data Storage and Sharing, IEEE Transactions on Dependable and Secure Computing (top two computer security and cryptography publication).

  • Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control. ESORICS.
  • Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data. ESORICS (best research paper award).
  • Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List. ACNS.
  • Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data. AsiaCCS.
  • A data hiding approach for sensitive smartphone data. UbiComp.
  • An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing. ESORICS.