Huijia Lin

From MaRDI portal
Person:1629406

Available identifiers

zbMath Open lin.huijiaMaRDI QIDQ1629406

List of research outcomes

PublicationDate of PublicationType
Indistinguishability obfuscation2024-03-20Paper
The pseudorandom oracle model and ideal obfuscation2024-02-06Paper
https://portal.mardi4nfdi.de/entity/Q61870152024-02-05Paper
Multi-party homomorphic secret sharing and sublinear MPC from sparse LPN2024-02-02Paper
Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)2024-01-16Paper
On the optimal succinctness and efficiency of functional encryption and attribute-based encryption2023-12-12Paper
New ways to garble arithmetic circuits2023-12-08Paper
Indistinguishability obfuscation from well-founded assumptions2023-11-14Paper
ABE for circuits with constant-size secret keys and adaptive security2023-08-14Paper
Two-round MPC without round collapsing revisited -- towards efficient malicious protocols2023-06-12Paper
Succinct and adaptively secure ABE for ABP from \(k\)-Lin2023-03-29Paper
Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)2022-08-30Paper
Non-malleable commitments against quantum attacks2022-08-30Paper
Counterexamples to new circular security assumptions underlying iO2022-04-22Paper
Mr NISC: multiparty reusable non-interactive secure computation2022-03-23Paper
Information-theoretic 2-round MPC without round collapsing: adaptive security, and more2022-03-23Paper
Oblivious transfer is in MiniQCrypt2021-12-08Paper
Multiparty reusable non-interactive secure computation from LWE2021-12-08Paper
Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification2021-12-08Paper
Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)2021-12-01Paper
Foundations of Homomorphic Secret Sharing2021-06-15Paper
Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles2020-08-25Paper
Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification2020-03-09Paper
How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\)2020-02-04Paper
Non-malleable codes against bounded polynomial time tampering2020-02-04Paper
Two-round adaptively secure multiparty computation from standard assumptions2018-12-11Paper
One-message zero knowledge and non-malleable commitments2018-12-11Paper
\(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits2018-07-09Paper
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings2018-07-04Paper
The hunting of the SNARK2018-02-15Paper
A unified approach to constructing black-box UC protocols in trusted setup models2018-01-19Paper
Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs2017-11-03Paper
Indistinguishability obfuscation from trilinear maps and block-wise local PRGs2017-11-03Paper
On Removing Graded Encodings from Functional Encryption2017-06-13Paper
The Computational Benefit of Correlated Instances2017-05-19Paper
On the power of nonuniformity in proofs of security2017-05-16Paper
Delegating RAM Computations with Adaptive Soundness and Privacy2016-12-22Paper
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions2016-09-23Paper
Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes2016-09-09Paper
Indistinguishability Obfuscation with Non-trivial Efficiency2016-04-13Paper
Oblivious Parallel RAM: Improved Efficiency and Generic Constructions2016-04-08Paper
Output-Compressing Randomized Encodings and Applications2016-03-23Paper
Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation2015-12-10Paper
Succinct Randomized Encodings and their Applications2015-08-21Paper
Constant-Round Nonmalleable Commitments from Any One-Way Function2015-08-14Paper
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma2015-07-06Paper
Obfuscation of Probabilistic Circuits and Applications2015-07-06Paper
A unified framework for concurrent security2015-02-04Paper
Non-malleability amplification2015-02-04Paper
Leakage-Tolerant Computation with Input-Independent Preprocessing2014-08-07Paper
Constant-round non-malleable commitments from any one-way function2014-06-05Paper
Amplification of Chosen-Ciphertext Security2013-05-31Paper
A Unified Framework for UC from Only OT2013-03-19Paper
Public-Coin Concurrent Zero-Knowledge in the Global Hash Model2013-03-18Paper
Black-Box Constructions of Composable Protocols without Set-Up2012-09-25Paper
After-the-Fact Leakage in Public-Key Encryption2011-05-19Paper
Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs2011-05-19Paper
Concurrent Non-Malleable Zero Knowledge Proofs2010-08-24Paper
Concurrent Non-malleable Commitments from Any One-Way Function2008-03-05Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Huijia Lin