Follow
Feng-Hao Liu
Title
Cited by
Cited by
Year
Multi-input functional encryption
S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ...
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
4292014
Tamper and leakage resilience in the split-state model
FH Liu, A Lysyanskaya
Annual Cryptology Conference, 517-532, 2012
1602012
Memory delegation
KM Chung, YT Kalai, FH Liu, R Raz
Annual Cryptology Conference, 151-168, 2011
1552011
Constant-round MPC with fairness and guarantee of output delivery
S Dov Gordon, FH Liu, E Shi
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
1002015
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
N Chandran, M Chase, FH Liu, R Nishimaki, K Xagawa
International Workshop on Public Key Cryptography, 95-112, 2014
652014
Multi-client verifiable computation with stronger security guarantees
SD Gordon, J Katz, FH Liu, E Shi, HS Zhou
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
642015
Locally decodable and updatable non-malleable codes and their applications
D Dachman-Soled, FH Liu, E Shi, HS Zhou
Journal of Cryptology 33 (1), 319-355, 2020
602020
Efficient multi-party private set intersection against malicious adversaries
E Zhang, FH Liu, Q Lai, G Jin, Y Li
Proceedings of the 2019 ACM SIGSAC conference on cloud computing security …, 2019
542019
Multi-input functional encryption
SD Gordon, J Katz, FH Liu, E Shi, HS Zhou
Cryptology ePrint Archive, 2013
542013
Public-key cryptography from new multivariate quadratic assumptions
YJ Huang, FH Liu, BY Yang
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
462012
Practical non-malleable codes from l-more extractable hash functions
A Kiayias, FH Liu, Y Tselekounis
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
412016
On the lattice smoothing parameter problem
KM Chung, D Dadush, FH Liu, C Peikert
2013 IEEE Conference on Computational Complexity, 230-241, 2013
362013
FE for inner products and its application to decentralized ABE
Z Wang, X Fan, FH Liu
IACR international workshop on public key cryptography, 97-127, 2019
352019
Parameter-hiding order revealing encryption
D Cash, FH Liu, A O’Neill, M Zhandry, C Zhang
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
342018
Proxy re-encryption and re-signatures from lattices
X Fan, FH Liu
Applied Cryptography and Network Security: 17th International Conference …, 2019
332019
Parallel repetition theorems for interactive arguments
KM Chung, FH Liu
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
312010
Leakage-resilient circuits revisited–optimal number of computing components without leak-free hardware
D Dachman-Soled, FH Liu, HS Zhou
Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015
292015
New lattice two-stage sampling technique and its applications to functional encryption–stronger security and smaller ciphertexts
Q Lai, FH Liu, Z Wang
Annual International Conference on the Theory and Applications of …, 2021
232021
Leakage resilient fully homomorphic encryption
A Berkoff, FH Liu
Theory of Cryptography Conference, 515-539, 2014
232014
Batch bootstrapping I: a new framework for SIMD bootstrapping in polynomial modulus
FH Liu, H Wang
Annual International Conference on the Theory and Applications of …, 2023
212023
The system can't perform the operation now. Try again later.
Articles 1–20