The following pages link to Hoeteck Wee (Q315544):
Displayed 50 items.
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- Shorter identity-based encryption via asymmetric pairings (Q404944) (← links)
- Lossy trapdoor functions from homomorphic reproducible encryption (Q456129) (← links)
- Traitor-tracing from LWE made simple and attribute-based (Q1631335) (← links)
- Unbounded ABE via bilinear entropy expansion, revisited (Q1648812) (← links)
- Towards breaking the exponential barrier for general secret sharing (Q1648814) (← links)
- Conditional disclosure of secrets via non-linear reconstruction (Q1675752) (← links)
- Attribute-hiding predicate encryption in bilinear groups, revisited (Q1690193) (← links)
- Private constrained PRFs (and more) from LWE (Q1690195) (← links)
- Improved inner-product encryption with adaptive security and full attribute-hiding (Q1710620) (← links)
- A black-box construction of non-malleable encryption from semantically secure encryption (Q1747662) (← links)
- GGH15 beyond permutation branching programs: proofs, attacks, and candidates (Q1784107) (← links)
- Tight adaptively secure broadcast encryption with short ciphertexts and keys (Q1796785) (← links)
- Adaptively secure ABE for DFA from \(k\)-Lin and more (Q2055655) (← links)
- New constructions of statistical NIZKs: dual-mode DV-NIZKs and more (Q2055662) (← links)
- Functional encryption for quadratic functions from \(k\)-lin, revisited (Q2055719) (← links)
- Candidate obfuscation via oblivious LWE sampling (Q2056783) (← links)
- Time-space tradeoffs and short collisions in Merkle-Damgård hash functions (Q2096481) (← links)
- Functional encryption for attribute-weighted sums from \(k\)-Lin (Q2096503) (← links)
- Information-theoretic 2-round MPC without round collapsing: adaptive security, and more (Q2119057) (← links)
- Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin (Q2139632) (← links)
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions (Q2170046) (← links)
- Matrix PRFs: constructions, attacks, and applications to obfuscation (Q2175904) (← links)
- Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin (Q2188962) (← links)
- Doubly spatial encryption from DBDH (Q2250446) (← links)
- Obfuscating simple functionalities from knowledge assumptions (Q2289432) (← links)
- Compact adaptively secure ABE for \(\mathrm{NC}^1\) from \(k\)-lin (Q2292638) (← links)
- ABE for DFA from \(k\)-lin (Q2305000) (← links)
- Improved, black-box, non-malleable encryption from semantic security (Q2413015) (← links)
- Succinct LWE sampling, random polynomials, and obfuscation (Q2697860) (← links)
- ABE for DFA from LWE against bounded collusions, revisited (Q2697861) (← links)
- KDM-Security via Homomorphic Smooth Projective Hashing (Q2798797) (← links)
- Déjà Q: Encore! Un Petit IBE (Q2799097) (← links)
- Obfuscating Conjunctions under Entropic Ring LWE (Q2800561) (← links)
- Tightly CCA-Secure Encryption Without Pairings (Q2820476) (← links)
- FHE Circuit Privacy Almost for Free (Q2829211) (← links)
- On the Security of the TLS Protocol: A Systematic Analysis (Q2845687) (← links)
- Fully, (Almost) Tightly Secure IBE and Dual System Groups (Q2849411) (← links)
- Functional Encryption: New Perspectives and Lower Bounds (Q2849414) (← links)
- Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More (Q2894411) (← links)
- Public Key Encryption against Related Key Attacks (Q2900222) (← links)
- Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices (Q2900223) (← links)
- Efficient Password Authenticated Key Exchange via Oblivious Transfer (Q2900235) (← links)
- Functional Encryption with Bounded Collusions via Multi-party Computation (Q2914259) (← links)
- Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula (Q2922663) (← links)
- Predicate Encryption for Multi-dimensional Range Queries from Lattices (Q2941219) (← links)
- Quasi-Adaptive NIZK for Linear Subspaces Revisited (Q2948380) (← links)
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings (Q2948397) (← links)
- (Q3002813) (← links)
- Threshold and Revocation Cryptosystems via Extractable Hash Proofs (Q3003404) (← links)