Feng-Hao Liu

From MaRDI portal
(Redirected from Person:775998)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Ring/module learning with errors under linear leakage -- hardness and applications2024-11-12Paper
Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
Designs, Codes and Cryptography
2024-05-27Paper
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates
Journal of Cryptology
2024-04-21Paper
Batch bootstrapping. I: A new framework for SIMD bootstrapping in polynomial modulus
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
Batch bootstrapping. II: Bootstrapping in polynomial modulus only requires \(\tilde{O}(1)\) FHE multiplications in amortization
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
Public-Key Cryptography – PKC 2022
2023-08-10Paper
Ring-based identity based encryption -- asymptotically shorter MPK and tighter security2023-04-13Paper
Rounding in the rings2022-11-09Paper
Almost tight security in lattices with polynomial moduli -- PRF, IBE, all-but-many LTF, and more
Lecture Notes in Computer Science
2022-10-13Paper
Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks2021-12-21Paper
New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertexts2021-12-08Paper
Non-malleable codes for partial functions with manipulation detection2020-06-30Paper
Locally decodable and updatable non-malleable codes and their applications
Journal of Cryptology
2020-03-03Paper
Proxy re-encryption and re-signatures from lattices2020-01-30Paper
FE for inner products and its application to decentralized ABE2020-01-28Paper
Leakage resilience from program obfuscation
Journal of Cryptology
2019-08-13Paper
Parameter-hiding order revealing encryption2018-12-20Paper
Deniable Attribute Based Encryption for Branching Programs from LWE
Theory of Cryptography
2016-12-22Paper
Leakage-resilient public-key encryption from obfuscation
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Constant-Round MPC with Fairness and Guarantee of Output Delivery
Lecture Notes in Computer Science
2015-12-10Paper
Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Locally decodable and updatable non-malleable codes and their applications
Theory of Cryptography
2015-07-06Paper
Multi-client verifiable computation with stronger security guarantees
Theory of Cryptography
2015-07-06Paper
Multi-input functional encryption
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Leakage resilient fully homomorphic encryption
Theory of Cryptography
2014-02-18Paper
Tamper and Leakage Resilience in the Split-State Model
Lecture Notes in Computer Science
2012-09-25Paper
Public-key cryptography from new multivariate quadratic assumptions
Public Key Cryptography – PKC 2012
2012-07-20Paper
Memory delegation
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Efficient secure two-party exponentiation
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Efficient string-commitment from weak bit-commitment
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Algorithmic Tamper-Proof Security under Probing Attacks
Lecture Notes in Computer Science
2010-09-10Paper
Parallel repetition theorems for interactive arguments
Theory of Cryptography
2010-02-24Paper
Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$
Post-Quantum Cryptography
2008-11-11Paper


Research outcomes over time


This page was built for person: Feng-Hao Liu