Huijia Lin

From MaRDI portal
Person:1629406



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A systematic study of sparse LWE2024-12-13Paper
A general framework for lattice-based ABE using evasive inner-product functional encryption2024-11-12Paper
LERNA: secure single-server aggregation via key-homomorphic masking2024-08-30Paper
Indistinguishability obfuscation
International Congress of Mathematicians
2024-03-20Paper
The pseudorandom oracle model and ideal obfuscation
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
scientific article; zbMATH DE number 7799582 (Why is no real title available?)2024-02-05Paper
Multi-party homomorphic secret sharing and sublinear MPC from sparse LPN
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
On the optimal succinctness and efficiency of functional encryption and attribute-based encryption
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
New ways to garble arithmetic circuits
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Indistinguishability obfuscation from well-founded assumptions
Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing
2023-11-14Paper
ABE for circuits with constant-size secret keys and adaptive security
Theory of Cryptography
2023-08-14Paper
Two-round MPC without round collapsing revisited -- towards efficient malicious protocols
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
Succinct and adaptively secure ABE for ABP from \(k\)-Lin2023-03-29Paper
Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)2022-08-30Paper
Non-malleable commitments against quantum attacks2022-08-30Paper
Counterexamples to new circular security assumptions underlying iO2022-04-22Paper
Mr NISC: multiparty reusable non-interactive secure computation2022-03-23Paper
Information-theoretic 2-round MPC without round collapsing: adaptive security, and more2022-03-23Paper
Oblivious transfer is in MiniQCrypt
(available as arXiv preprint)
2021-12-08Paper
Multiparty reusable non-interactive secure computation from LWE2021-12-08Paper
Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification2021-12-08Paper
Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)2021-12-01Paper
Foundations of homomorphic secret sharing2021-06-15Paper
Two-round and non-interactive concurrent non-malleable commitments from time-lock puzzles
SIAM Journal on Computing
2020-08-25Paper
Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification2020-03-09Paper
Non-malleable codes against bounded polynomial time tampering2020-02-04Paper
How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\)2020-02-04Paper
Two-round adaptively secure multiparty computation from standard assumptions2018-12-11Paper
One-message zero knowledge and non-malleable commitments2018-12-11Paper
\(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits2018-07-09Paper
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
SIAM Journal on Computing
2018-07-04Paper
The hunting of the SNARK
Journal of Cryptology
2018-02-15Paper
A unified approach to constructing black-box UC protocols in trusted setup models2018-01-19Paper
Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs2017-11-03Paper
Indistinguishability obfuscation from trilinear maps and block-wise local PRGs2017-11-03Paper
On Removing Graded Encodings from Functional Encryption
Lecture Notes in Computer Science
2017-06-13Paper
The Computational Benefit of Correlated Instances
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science
2017-05-19Paper
On the power of nonuniformity in proofs of security
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
2017-05-16Paper
Delegating RAM computations with adaptive soundness and privacy
Theory of Cryptography
2016-12-22Paper
Adaptive hardness and composable security in the plain model from standard assumptions
SIAM Journal on Computing
2016-09-23Paper
Indistinguishability obfuscation from constant-degree graded encoding schemes
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Indistinguishability obfuscation with non-trivial efficiency
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Oblivious parallel RAM: improved efficiency and generic constructions
Theory of Cryptography
2016-04-08Paper
Output-compressing randomized encodings and applications
Theory of Cryptography
2016-03-23Paper
Constant-round concurrent zero-knowledge from indistinguishability obfuscation
Lecture Notes in Computer Science
2015-12-10Paper
Succinct randomized encodings and their applications
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing
2015-08-21Paper
Constant-Round Nonmalleable Commitments from Any One-Way Function
Journal of the ACM
2015-08-14Paper
Obfuscation of probabilistic circuits and applications
Theory of Cryptography
2015-07-06Paper
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma
Theory of Cryptography
2015-07-06Paper
Non-malleability amplification
Proceedings of the forty-first annual ACM symposium on Theory of computing
2015-02-04Paper
A unified framework for concurrent security
Proceedings of the forty-first annual ACM symposium on Theory of computing
2015-02-04Paper
Leakage-tolerant computation with input-independent preprocessing
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Constant-round non-malleable commitments from any one-way function
Proceedings of the forty-third annual ACM symposium on Theory of computing
2014-06-05Paper
Amplification of Chosen-Ciphertext Security
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
A unified framework for UC from only OT
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Public-Coin Concurrent Zero-Knowledge in the Global Hash Model
Theory of Cryptography
2013-03-18Paper
Black-box constructions of composable protocols without set-up
Lecture Notes in Computer Science
2012-09-25Paper
After-the-fact leakage in public-key encryption
Theory of Cryptography
2011-05-19Paper
Concurrent non-malleable zero knowledge with adaptive inputs
Theory of Cryptography
2011-05-19Paper
Concurrent non-malleable zero knowledge proofs
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Concurrent Non-malleable Commitments from Any One-Way Function
Theory of Cryptography
2008-03-05Paper


Research outcomes over time


This page was built for person: Huijia Lin