Mohammad Hajiabadi

From MaRDI portal
Person:775974

Available identifiers

zbMath Open hajiabadi.mohammadMaRDI QIDQ775974

List of research outcomes





PublicationDate of PublicationType
Randomness recoverable secret sharing schemes2024-11-22Paper
Lower-bounds on public-key operations in PIR2024-11-13Paper
Laconic branching programs from the Diffie-Hellman assumption2024-11-12Paper
Randomness recoverable secret sharing schemes2024-10-11Paper
Lower bounds on assumptions behind registration-based encryption2024-08-02Paper
https://portal.mardi4nfdi.de/entity/Q61262222024-04-09Paper
Algebraic restriction codes and their applications2023-12-13Paper
Credibility in private set membership2023-11-16Paper
On the worst-case inefficiency of CGKA2023-08-14Paper
How to build a trapdoor function from an encryption scheme2023-05-12Paper
Laconic private set intersection and applications2023-04-13Paper
Amortizing rate-1 OT and applications to PIR and PSI2023-04-13Paper
Master-Key KDM-Secure IBE from Pairings2022-10-13Paper
Compact ring signatures from learning with errors2022-03-31Paper
Two-round oblivious transfer from CDH or LPN2022-03-23Paper
Efficient range-trapdoor functions and applications: rate-1 OT and more2021-12-01Paper
Limits on the power of garbling techniques for public-key encryption2020-06-30Paper
Rate-1 trapdoor functions from the Diffie-Hellman problem2020-05-11Paper
New techniques for efficient trapdoor functions and applications2020-02-04Paper
Registration-based encryption from standard assumptions2020-01-28Paper
Enhancements are blackbox non-trivial: impossibility of enhanced trapdoor permutations from standard trapdoor permutations2018-12-11Paper
Registration-based encryption: removing private-key generator from IBE2018-12-11Paper
Trapdoor functions from the computational Diffie-Hellman assumption2018-09-26Paper
New constructions of identity-based and key-dependent message secure encryption schemes2018-05-16Paper
Linear-time zero-knowledge proofs for arithmetic circuit satisfiability2018-02-23Paper
Reproducible circularly secure bit encryption: applications and realizations2018-02-15Paper
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions2017-06-13Paper
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations2015-12-10Paper
Gambling, Computational Information and Encryption Security2015-09-24Paper
Computational Soundness of Coinductive Symbolic Security under Active Attacks2013-03-18Paper

Research outcomes over time

This page was built for person: Mohammad Hajiabadi