Hoeteck Wee

From MaRDI portal
(Redirected from Person:315544)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Polynomial commitments from lattices: post-quantum security, fast verification and transparent setup
 
2025-01-10Paper
Circuit ABE with \(\mathsf{poly}(\mathrm{depth},\lambda )\)-sized ciphertexts and keys from lattices
 
2024-12-13Paper
Laconic function evaluation and ABE for RAMs from (Ring-)LWE
 
2024-12-13Paper
Succinct functional commitments for circuits from \(k\)-\textsf{Lin}
 
2024-11-12Paper
Lattice-based functional commitments: fast verification and cryptanalysis
 
2024-09-13Paper
Distributed broadcast encryption from bilinear groups
 
2024-09-13Paper
Succinct vector, polynomial, and functional commitments from lattices
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
One-One Constrained Pseudorandom Functions.
 
2023-11-02Paper
Witness encryption and null-iO from evasive LWE
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Multi-authority ABE from lattices without random oracles
Theory of Cryptography
2023-08-14Paper
ABE for DFA from LWE against bounded collusions, revisited
 
2023-04-13Paper
Succinct LWE sampling, random polynomials, and obfuscation
 
2023-04-13Paper
Functional encryption for attribute-weighted sums from \(k\)-Lin
 
2022-11-09Paper
Time-space tradeoffs and short collisions in Merkle-Damgård hash functions
 
2022-11-09Paper
Optimal broadcast encryption and CP-ABE from evasive lattice assumptions
 
2022-08-30Paper
On the inner product predicate and a generalization of matching vector families
 
2022-07-21Paper
Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin
 
2022-05-18Paper
Information-theoretic 2-round MPC without round collapsing: adaptive security, and more
 
2022-03-23Paper
Candidate obfuscation via oblivious LWE sampling
 
2021-12-08Paper
Functional encryption for quadratic functions from \(k\)-lin, revisited
 
2021-12-01Paper
Adaptively secure ABE for DFA from \(k\)-Lin and more
 
2021-12-01Paper
New constructions of statistical NIZKs: dual-mode DV-NIZKs and more
 
2021-12-01Paper
scientific article; zbMATH DE number 7286918 (Why is no real title available?)
Theory of Computing
2020-12-17Paper
Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin
Journal of Cryptology
2020-06-15Paper
Matrix PRFs: constructions, attacks, and applications to obfuscation
 
2020-04-30Paper
ABE for DFA from \(k\)-lin
 
2020-03-09Paper
Compact adaptively secure ABE for \(\mathrm{NC}^1\) from \(k\)-lin
 
2020-02-04Paper
Obfuscating simple functionalities from knowledge assumptions
 
2020-01-28Paper
Improved inner-product encryption with adaptive security and full attribute-hiding
 
2019-01-23Paper
Traitor-tracing from LWE made simple and attribute-based
 
2018-12-06Paper
Tight adaptively secure broadcast encryption with short ciphertexts and keys
 
2018-10-17Paper
On the Inner Product Predicate and a Generalization of Matching Vector Families
 
2018-10-04Paper
GGH15 beyond permutation branching programs: proofs, attacks, and candidates
 
2018-09-26Paper
Attribute-based encryption for circuits
Journal of the ACM
2018-08-02Paper
Towards breaking the exponential barrier for general secret sharing
 
2018-07-09Paper
Unbounded ABE via bilinear entropy expansion, revisited
 
2018-07-09Paper
A black-box construction of non-malleable encryption from semantically secure encryption
Journal of Cryptology
2018-04-26Paper
Improved, black-box, non-malleable encryption from semantic security
Designs, Codes and Cryptography
2018-04-06Paper
Private constrained PRFs (and more) from LWE
 
2018-01-19Paper
Attribute-hiding predicate encryption in bilinear groups, revisited
 
2018-01-19Paper
Conditional disclosure of secrets via non-linear reconstruction
 
2017-11-03Paper
Multi-input inner-product functional encryption from pairings
Lecture Notes in Computer Science
2017-06-13Paper
Targeted homomorphic attribute-based encryption
Theory of Cryptography
2016-12-22Paper
FHE circuit privacy almost for free
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Leakage-resilient cryptography from minimal assumptions
Journal of Cryptology
2016-09-21Paper
Tightly CCA-secure encryption without pairings
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Obfuscating conjunctions under entropic ring LWE
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
2016-04-15Paper
KDM-security via homomorphic smooth projective hashing
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Déjà Q: encore! Un petit IBE
Theory of Cryptography
2016-04-08Paper
Security Against Related Randomness Attacks via Reconstructive Extractors
Cryptography and Coding
2016-01-12Paper
Structure-preserving signatures from standard assumptions, revisited
Lecture Notes in Computer Science
2015-12-10Paper
Communication complexity of conditional disclosure of secrets and attribute-based encryption
Lecture Notes in Computer Science
2015-12-10Paper
Predicate encryption for circuits from LWE
Lecture Notes in Computer Science
2015-12-10Paper
Implicit zero-knowledge arguments and applications to the malicious setting
Lecture Notes in Computer Science
2015-12-10Paper
Quasi-adaptive NIZK for linear subspaces revisited
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Improved dual system ABE in prime-order groups via predicate encodings
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Predicate encryption for multi-dimensional range queries from lattices
Lecture Notes in Computer Science
2015-08-27Paper
Selfish caching in distributed systems, a game-theoretic analysis
Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing
2015-08-03Paper
Inaccessible entropy
Proceedings of the forty-first annual ACM symposium on Theory of computing
2015-02-04Paper
Semi-adaptive attribute-based encryption and improved delegation for Boolean formula
Lecture Notes in Computer Science
2014-10-14Paper
Shorter identity-based encryption via asymmetric pairings
Designs, Codes and Cryptography
2014-09-04Paper
Attribute-based encryption for circuits
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
Doubly spatial encryption from DBDH
Theoretical Computer Science
2014-07-07Paper
Partial garbling schemes and their applications
Automata, Languages, and Programming
2014-07-01Paper
On the complexity of UC commitments
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Dual System Encryption via Predicate Encodings
Theory of Cryptography
2014-02-18Paper
Fully, (Almost) Tightly Secure IBE and Dual System Groups
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Functional encryption: new perspectives and lower bounds
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
On the security of the TLS protocol: a systematic analysis
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Leakage-resilient cryptography from minimal assumptions
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Multi-party computation of polynomials and branching programs without simultaneous interaction
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Efficient, adaptively secure, and composable oblivious transfer with a single, global CRS
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Shorter IBE and signatures via asymmetric pairings
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Lossy trapdoor functions from homomorphic reproducible encryption
Information Processing Letters
2012-10-23Paper
Functional encryption with bounded collusions via multi-party computation
Lecture Notes in Computer Science
2012-09-25Paper
Public Key Encryption against Related Key Attacks
Public Key Cryptography – PKC 2012
2012-07-20Paper
Efficient password authenticated key exchange via oblivious transfer
Public Key Cryptography – PKC 2012
2012-07-20Paper
Functional encryption for threshold functions (or fuzzy IBE) from lattices
Public Key Cryptography – PKC 2012
2012-07-20Paper
Dual projective hashing and its applications -- lossy trapdoor functions and more
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Threshold and revocation cryptosystems via extractable hash proofs
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Optimal cryptographic hardness of learning monotone functions
Theory of Computing
2011-05-24Paper
On the round complexity of zero-knowledge proofs based on one-way permutations
Lecture Notes in Computer Science
2010-08-31Paper
Efficient chosen-ciphertext security via extractable hash proofs
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
On obfuscating point functions
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
2010-08-16Paper
Constant-round non-malleable commitments from sub-exponential one-way functions
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Encryption schemes secure against chosen-ciphertext selective opening attacks
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Universal one-way hash functions via inaccessible entropy
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Improved non-committing encryption with applications to adaptively secure protocols
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Zero knowledge in the random oracle model, revisited
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Amplifying Collision Resistance: A Complexity-Theoretic Treatment
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Simple, Black-Box Constructions of Adaptively Secure Protocols
Theory of Cryptography
2009-03-03Paper
Black-Box Constructions of Two-Party Protocols from One-Way Functions
Theory of Cryptography
2009-03-03Paper
Optimal Cryptographic Hardness of Learning Monotone Functions
Automata, Languages and Programming
2008-08-28Paper
Pebbling and Proofs of Work
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
Theory of Cryptography
2008-03-05Paper
One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments
Theory of Cryptography
2007-08-30Paper
Lower Bounds for Non-interactive Zero-Knowledge
Theory of Cryptography
2007-08-30Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
Lecture Notes in Computer Science
2005-08-25Paper


Research outcomes over time


This page was built for person: Hoeteck Wee