Feng-Hao Liu

From MaRDI portal
Person:775998

Available identifiers

zbMath Open liu.feng-haoMaRDI QIDQ775998

List of research outcomes





PublicationDate of PublicationType
Ring/module learning with errors under linear leakage -- hardness and applications2024-11-12Paper
Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices2024-05-27Paper
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates2024-04-21Paper
Batch bootstrapping. I: A new framework for SIMD bootstrapping in polynomial modulus2023-12-12Paper
Batch bootstrapping. II: Bootstrapping in polynomial modulus only requires \(\tilde{O}(1)\) FHE multiplications in amortization2023-12-12Paper
Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices2023-08-10Paper
Ring-based identity based encryption -- asymptotically shorter MPK and tighter security2023-04-13Paper
Rounding in the rings2022-11-09Paper
Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and More2022-10-13Paper
Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks2021-12-21Paper
New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertexts2021-12-08Paper
Non-malleable codes for partial functions with manipulation detection2020-06-30Paper
Locally decodable and updatable non-malleable codes and their applications2020-03-03Paper
Proxy re-encryption and re-signatures from lattices2020-01-30Paper
FE for inner products and its application to decentralized ABE2020-01-28Paper
Leakage resilience from program obfuscation2019-08-13Paper
Parameter-hiding order revealing encryption2018-12-20Paper
Deniable Attribute Based Encryption for Branching Programs from LWE2016-12-22Paper
Leakage-Resilient Public-Key Encryption from Obfuscation2016-04-13Paper
Constant-Round MPC with Fairness and Guarantee of Output Delivery2015-12-10Paper
Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware2015-09-30Paper
Locally Decodable and Updatable Non-malleable Codes and Their Applications2015-07-06Paper
Multi-Client Verifiable Computation with Stronger Security Guarantees2015-07-06Paper
Multi-input Functional Encryption2014-05-27Paper
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices2014-03-25Paper
Leakage Resilient Fully Homomorphic Encryption2014-02-18Paper
Tamper and Leakage Resilience in the Split-State Model2012-09-25Paper
Public-Key Cryptography from New Multivariate Quadratic Assumptions2012-07-20Paper
Memory Delegation2011-08-12Paper
Efficient secure two-party exponentiation2011-02-11Paper
Efficient string-commitment from weak bit-commitment2010-12-07Paper
Algorithmic Tamper-Proof Security under Probing Attacks2010-09-10Paper
Parallel repetition theorems for interactive arguments2010-02-24Paper
Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$2008-11-11Paper

Research outcomes over time

This page was built for person: Feng-Hao Liu