Kai-Min Chung

From MaRDI portal
Person:1629434



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On the impossibility of general parallel fast-forwarding of Hamiltonian simulation2024-11-19Paper
Best-of-both-worlds multiparty quantum computation with publicly verifiable identifiable abort2024-11-13Paper
On the (im)possibility of time-lock puzzles in the quantum random oracle model2024-09-13Paper
On the need for large quantum depth
Journal of the ACM
2024-07-04Paper
Black-box separations for non-interactive classical commitments in a quantum world
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
scientific article; zbMATH DE number 7759460 (Why is no real title available?)
(available as arXiv preprint)
2023-11-02Paper
Collusion-resistant functional encryption for RAMs
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
A note on the post-quantum security of (ring) signatures
Public-Key Cryptography – PKC 2022
2023-08-10Paper
Post-quantum simulatable extraction with minimal assumptions: black-box and constant-round
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
On the impossibility of key agreements from quantum random oracles
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
scientific article; zbMATH DE number 7701523 (Why is no real title available?)
(available as arXiv preprint)
2023-06-26Paper
Foundations of Differentially Oblivious Algorithms
Journal of the ACM
2023-04-27Paper
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture2023-02-03Paper
Constant-round blind classical verification of quantum sampling
(available as arXiv preprint)
2022-08-30Paper
On the Algorithmic Power of Spiking Neural Networks
(available as arXiv preprint)
2022-07-18Paper
Game-theoretic fairness meets multi-party protocols: the case of leader election2022-04-22Paper
A black-box approach to post-quantum zero-knowledge in constant rounds
(available as arXiv preprint)
2022-03-31Paper
On the concurrent composition of quantum zero-knowledge
(available as arXiv preprint)
2022-03-31Paper
Round efficient secure multiparty quantum computation with identifiable abort2022-03-31Paper
Classical verification of quantum computations with efficient verifier
(available as arXiv preprint)
2022-03-23Paper
When Simple Hash Functions Suffice2022-02-04Paper
On the compressed-oracle technique, and post-quantum security of proofs of sequential work
(available as arXiv preprint)
2021-12-08Paper
On the need for large Quantum depth
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing
2021-01-19Paper
Adaptively secure garbling schemes for parallel computations2020-04-30Paper
A quantum-proof non-malleable extractor. With application to privacy amplification against active quantum adversaries
(available as arXiv preprint)
2020-02-06Paper
On quantum advantage in information theoretic single-server PIR
(available as arXiv preprint)
2020-02-04Paper
Foundations of differentially oblivious algorithms
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms
2019-10-15Paper
Quantum encryption and generalized Shannon impossibility
Designs, Codes and Cryptography
2019-09-12Paper
Game theoretic notions of fairness in multi-party coin toss2018-12-11Paper
On the complexity of simulating auxiliary input2018-07-17Paper
On the depth of oblivious parallel RAM2018-04-06Paper
scientific article; zbMATH DE number 6829293 (Why is no real title available?)
(available as arXiv preprint)
2018-01-24Paper
On the impossibility of cryptography with tamperable randomness
Algorithmica
2018-01-05Paper
Distributed algorithms for the Lovász local lemma and graph coloring
Distributed Computing
2017-09-04Paper
On the power of nonuniformity in proofs of security
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
2017-05-16Paper
Can theories be tested?
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
2017-05-16Paper
Delegating RAM computations with adaptive soundness and privacy
Theory of Cryptography
2016-12-22Paper
Non-black-box simulation from one-way functions and applications to resettable security
SIAM Journal on Computing
2016-04-25Paper
Cryptography for parallel RAM from indistinguishability obfuscation
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
2016-04-15Paper
Oblivious parallel RAM and applications
Theory of Cryptography
2016-04-08Paper
Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs
Lecture Notes in Computer Science
2015-12-10Paper
Constant-round concurrent zero-knowledge from indistinguishability obfuscation
Lecture Notes in Computer Science
2015-12-10Paper
Distributed algorithms for the Lovász local lemma and graph coloring
Proceedings of the 2014 ACM symposium on Principles of distributed computing
2015-09-03Paper
Tight parallel repetition theorems for public-coin arguments using KL-divergence
Theory of Cryptography
2015-07-06Paper
From weak to strong zero-knowledge and applications
Theory of Cryptography
2015-07-06Paper
Statistically-secure ORAM with \(\tilde{O}(\log^2 n)\) overhead
Lecture Notes in Computer Science
2015-01-06Paper
scientific article; zbMATH DE number 6351507 (Why is no real title available?)
Theory of Computing
2014-10-06Paper
\(s\)-\(t\) connectivity on digraphs with a known stationary distribution
ACM Transactions on Algorithms
2014-09-09Paper
Non-black-box simulation from one-way functions and applications to resettable security
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
On the impossibility of cryptography with tamperable randomness
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
The Randomness Complexity of Parallel Repetition
2011 IEEE 52nd Annual Symposium on Foundations of Computer Science
2014-07-30Paper
4-round resettably-sound zero knowledge
Theory of Cryptography
2014-02-18Paper
On extractability obfuscation
Theory of Cryptography
2014-02-18Paper
Functional encryption from (small) hardware tokens
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Randomness-dependent message security
Theory of Cryptography
2013-03-18Paper
Chernoff-Hoeffding bounds for Markov chains: generalized and simplified
(available as arXiv preprint)
2012-08-23Paper
The knowledge tightness of parallel zero-knowledge
Theory of Cryptography
2012-06-15Paper
AMS without 4-wise independence on product domains2012-01-23Paper
Memory delegation
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Efficient secure two-party exponentiation
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Efficient string-commitment from weak bit-commitment
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Improved delegation of computation using fully homomorphic encryption
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
An optimal algorithm for the maximum-density segment problem
Lecture Notes in Computer Science
2010-03-03Paper
Parallel repetition theorems for interactive arguments
Theory of Cryptography
2010-02-24Paper
Tight Bounds for Hashing Block Sources
Lecture Notes in Computer Science
2008-11-27Paper
An Optimal Algorithm for the Maximum-Density Segment Problem
SIAM Journal on Computing
2005-02-21Paper
Decomposition Methods for Linear Support Vector Machines
Neural Computation
2005-01-04Paper
Radius Margin Bounds for Support Vector Machines with the RBF Kernel
Neural Computation
2004-09-07Paper


Research outcomes over time


This page was built for person: Kai-Min Chung