Feng-Hao Liu
Feng-Hao Liu
Geverifieerd e-mailadres voor fau.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Multi-input functional encryption
S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ...
Annual International Conference on the Theory and Applications of …, 2014
3072014
Memory delegation
KM Chung, YT Kalai, FH Liu, R Raz
Annual Cryptology Conference, 151-168, 2011
1492011
Tamper and leakage resilience in the split-state model
FH Liu, A Lysyanskaya
Annual Cryptology Conference, 517-532, 2012
1282012
Multi-client verifiable computation with stronger security guarantees
SD Gordon, J Katz, FH Liu, E Shi, HS Zhou
Theory of Cryptography Conference, 144-168, 2015
532015
Locally decodable and updatable non-malleable codes and their applications
D Dachman-Soled, FH Liu, E Shi, HS Zhou
Journal of Cryptology 33 (1), 319-355, 2020
512020
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
N Chandran, M Chase, FH Liu, R Nishimaki, K Xagawa
International Workshop on Public Key Cryptography, 95-112, 2014
482014
Multi-Input Functional Encryption.
SD Gordon, J Katz, FH Liu, E Shi, HS Zhou
IACR Cryptol. ePrint Arch. 2013, 774, 2013
422013
Public-key cryptography from new multivariate quadratic assumptions
YJ Huang, FH Liu, BY Yang
International Workshop on Public Key Cryptography, 190-205, 2012
422012
Parallel repetition theorems for interactive arguments
KM Chung, FH Liu
Theory of Cryptography Conference, 19-36, 2010
322010
Practical non-malleable codes from l-more extractable hash functions
A Kiayias, FH Liu, Y Tselekounis
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
262016
Leakage-resilient circuits revisited–optimal number of computing components without leak-free hardware
D Dachman-Soled, FH Liu, HS Zhou
Annual International Conference on the Theory and Applications of …, 2015
222015
On the lattice smoothing parameter problem
KM Chung, D Dadush, FH Liu, C Peikert
2013 IEEE Conference on Computational Complexity, 230-241, 2013
222013
Leakage resilient fully homomorphic encryption
A Berkoff, FH Liu
Theory of Cryptography Conference, 515-539, 2014
182014
Parameter-hiding order revealing encryption
D Cash, FH Liu, A O’Neill, M Zhandry, C Zhang
International Conference on the Theory and Application of Cryptology and …, 2018
172018
Fully-Secure Lattice-Based IBE as Compact as PKE.
D Apon, X Fan, FH Liu
IACR Cryptol. ePrint Arch. 2016, 125, 2016
172016
Algorithmic tamper-proof security under probing attacks
FH Liu, A Lysyanskaya
International Conference on Security and Cryptography for Networks, 106-120, 2010
172010
Proxy re-encryption and re-signatures from lattices
X Fan, FH Liu
International Conference on Applied Cryptography and Network Security, 363-382, 2019
162019
Various Proxy Re-Encryption Schemes from Lattices.
X Fan, FH Liu
IACR Cryptol. ePrint Arch. 2016, 278, 2016
162016
Efficient string-commitment from weak bit-commitment
KM Chung, FH Liu, CJ Lu, BY Yang
International Conference on the Theory and Application of Cryptology and …, 2010
142010
FE for inner products and its application to decentralized ABE
Z Wang, X Fan, FH Liu
IACR International Workshop on Public Key Cryptography, 97-127, 2019
132019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20