Huijia Lin

From MaRDI portal
Person:1629406

Available identifiers

zbMath Open lin.huijiaMaRDI QIDQ1629406

List of research outcomes





PublicationDate of PublicationType
A systematic study of sparse LWE2024-12-13Paper
A general framework for lattice-based ABE using evasive inner-product functional encryption2024-11-12Paper
LERNA: secure single-server aggregation via key-homomorphic masking2024-08-30Paper
Indistinguishability obfuscation2024-03-20Paper
The pseudorandom oracle model and ideal obfuscation2024-02-06Paper
https://portal.mardi4nfdi.de/entity/Q61870152024-02-05Paper
Multi-party homomorphic secret sharing and sublinear MPC from sparse LPN2024-02-02Paper
Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)2024-01-16Paper
On the optimal succinctness and efficiency of functional encryption and attribute-based encryption2023-12-12Paper
New ways to garble arithmetic circuits2023-12-08Paper
Indistinguishability obfuscation from well-founded assumptions2023-11-14Paper
ABE for circuits with constant-size secret keys and adaptive security2023-08-14Paper
Two-round MPC without round collapsing revisited -- towards efficient malicious protocols2023-06-12Paper
Succinct and adaptively secure ABE for ABP from \(k\)-Lin2023-03-29Paper
Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)2022-08-30Paper
Non-malleable commitments against quantum attacks2022-08-30Paper
Counterexamples to new circular security assumptions underlying iO2022-04-22Paper
Mr NISC: multiparty reusable non-interactive secure computation2022-03-23Paper
Information-theoretic 2-round MPC without round collapsing: adaptive security, and more2022-03-23Paper
Oblivious transfer is in MiniQCrypt2021-12-08Paper
Multiparty reusable non-interactive secure computation from LWE2021-12-08Paper
Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification2021-12-08Paper
Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)2021-12-01Paper
Foundations of Homomorphic Secret Sharing2021-06-15Paper
Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles2020-08-25Paper
Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification2020-03-09Paper
Non-malleable codes against bounded polynomial time tampering2020-02-04Paper
How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\)2020-02-04Paper
Two-round adaptively secure multiparty computation from standard assumptions2018-12-11Paper
One-message zero knowledge and non-malleable commitments2018-12-11Paper
\(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits2018-07-09Paper
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings2018-07-04Paper
The hunting of the SNARK2018-02-15Paper
A unified approach to constructing black-box UC protocols in trusted setup models2018-01-19Paper
Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs2017-11-03Paper
Indistinguishability obfuscation from trilinear maps and block-wise local PRGs2017-11-03Paper
On Removing Graded Encodings from Functional Encryption2017-06-13Paper
The Computational Benefit of Correlated Instances2017-05-19Paper
On the power of nonuniformity in proofs of security2017-05-16Paper
Delegating RAM Computations with Adaptive Soundness and Privacy2016-12-22Paper
Adaptive hardness and composable security in the plain model from standard assumptions2016-09-23Paper
Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes2016-09-09Paper
Indistinguishability Obfuscation with Non-trivial Efficiency2016-04-13Paper
Oblivious Parallel RAM: Improved Efficiency and Generic Constructions2016-04-08Paper
Output-Compressing Randomized Encodings and Applications2016-03-23Paper
Constant-round concurrent zero-knowledge from indistinguishability obfuscation2015-12-10Paper
Succinct randomized encodings and their applications2015-08-21Paper
Constant-Round Nonmalleable Commitments from Any One-Way Function2015-08-14Paper
Obfuscation of probabilistic circuits and applications2015-07-06Paper
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma2015-07-06Paper
Non-malleability amplification2015-02-04Paper
A unified framework for concurrent security2015-02-04Paper
Leakage-tolerant computation with input-independent preprocessing2014-08-07Paper
Constant-round non-malleable commitments from any one-way function2014-06-05Paper
Amplification of Chosen-Ciphertext Security2013-05-31Paper
A unified framework for UC from only OT2013-03-19Paper
Public-Coin Concurrent Zero-Knowledge in the Global Hash Model2013-03-18Paper
Black-box constructions of composable protocols without set-up2012-09-25Paper
After-the-fact leakage in public-key encryption2011-05-19Paper
Concurrent non-malleable zero knowledge with adaptive inputs2011-05-19Paper
Concurrent non-malleable zero knowledge proofs2010-08-24Paper
Concurrent Non-malleable Commitments from Any One-Way Function2008-03-05Paper

Research outcomes over time

This page was built for person: Huijia Lin