Mohammad Hajiabadi

From MaRDI portal
(Redirected from Person:775974)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Randomness recoverable secret sharing schemes2024-11-22Paper
Lower-bounds on public-key operations in PIR2024-11-13Paper
Laconic branching programs from the Diffie-Hellman assumption2024-11-12Paper
Randomness recoverable secret sharing schemes
Journal of Cryptology
2024-10-11Paper
Lower bounds on assumptions behind registration-based encryption2024-08-02Paper
scientific article; zbMATH DE number 7829234 (Why is no real title available?)2024-04-09Paper
Algebraic restriction codes and their applications
Algorithmica
2023-12-13Paper
Credibility in private set membership
Lecture Notes in Computer Science
2023-11-16Paper
On the worst-case inefficiency of CGKA
Theory of Cryptography
2023-08-14Paper
How to build a trapdoor function from an encryption scheme
Lecture Notes in Computer Science
2023-05-12Paper
Laconic private set intersection and applications2023-04-13Paper
Amortizing rate-1 OT and applications to PIR and PSI2023-04-13Paper
Master-key KDM-secure IBE from pairings
Lecture Notes in Computer Science
2022-10-13Paper
Compact ring signatures from learning with errors2022-03-31Paper
Two-round oblivious transfer from CDH or LPN2022-03-23Paper
Efficient range-trapdoor functions and applications: rate-1 OT and more2021-12-01Paper
Limits on the power of garbling techniques for public-key encryption2020-06-30Paper
Rate-1 trapdoor functions from the Diffie-Hellman problem2020-05-11Paper
New techniques for efficient trapdoor functions and applications2020-02-04Paper
Registration-based encryption from standard assumptions2020-01-28Paper
Enhancements are blackbox non-trivial: impossibility of enhanced trapdoor permutations from standard trapdoor permutations2018-12-11Paper
Registration-based encryption: removing private-key generator from IBE2018-12-11Paper
Trapdoor functions from the computational Diffie-Hellman assumption2018-09-26Paper
New constructions of identity-based and key-dependent message secure encryption schemes2018-05-16Paper
Linear-time zero-knowledge proofs for arithmetic circuit satisfiability2018-02-23Paper
Reproducible circularly secure bit encryption: applications and realizations
Journal of Cryptology
2018-02-15Paper
Toward fine-grained blackbox separations between semantic and circular-security notions
Lecture Notes in Computer Science
2017-06-13Paper
Reproducible circularly-secure bit encryption: applications and realizations
Lecture Notes in Computer Science
2015-12-10Paper
Gambling, computational information and encryption security
Lecture Notes in Computer Science
2015-09-24Paper
Computational soundness of coinductive symbolic security under active attacks
Theory of Cryptography
2013-03-18Paper


Research outcomes over time


This page was built for person: Mohammad Hajiabadi