Multi-input functional encryption S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ... Annual International Conference on the Theory and Applications of …, 2014 | 290 | 2014 |
Memory delegation KM Chung, YT Kalai, FH Liu, R Raz Annual Cryptology Conference, 151-168, 2011 | 146 | 2011 |
Tamper and leakage resilience in the split-state model FH Liu, A Lysyanskaya Annual Cryptology Conference, 517-532, 2012 | 124 | 2012 |
Multi-client verifiable computation with stronger security guarantees SD Gordon, J Katz, FH Liu, E Shi, HS Zhou Theory of Cryptography Conference, 144-168, 2015 | 53 | 2015 |
Locally decodable and updatable non-malleable codes and their applications D Dachman-Soled, FH Liu, E Shi, HS Zhou Journal of Cryptology 33 (1), 319-355, 2020 | 47 | 2020 |
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices N Chandran, M Chase, FH Liu, R Nishimaki, K Xagawa International Workshop on Public Key Cryptography, 95-112, 2014 | 45 | 2014 |
Public-key cryptography from new multivariate quadratic assumptions YJ Huang, FH Liu, BY Yang International Workshop on Public Key Cryptography, 190-205, 2012 | 39 | 2012 |
Multi-Input Functional Encryption. SD Gordon, J Katz, FH Liu, E Shi, HS Zhou IACR Cryptol. ePrint Arch. 2013, 774, 2013 | 38 | 2013 |
Parallel repetition theorems for interactive arguments KM Chung, FH Liu Theory of Cryptography Conference, 19-36, 2010 | 29 | 2010 |
Practical non-malleable codes from l-more extractable hash functions A Kiayias, FH Liu, Y Tselekounis Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 23 | 2016 |
Leakage-resilient circuits revisited–optimal number of computing components without leak-free hardware D Dachman-Soled, FH Liu, HS Zhou Annual International Conference on the Theory and Applications of …, 2015 | 22 | 2015 |
On the lattice smoothing parameter problem KM Chung, D Dadush, FH Liu, C Peikert 2013 IEEE Conference on Computational Complexity, 230-241, 2013 | 20 | 2013 |
Leakage resilient fully homomorphic encryption A Berkoff, FH Liu Theory of Cryptography Conference, 515-539, 2014 | 19 | 2014 |
Algorithmic tamper-proof security under probing attacks FH Liu, A Lysyanskaya International Conference on Security and Cryptography for Networks, 106-120, 2010 | 16 | 2010 |
Fully-Secure Lattice-Based IBE as Compact as PKE. D Apon, X Fan, FH Liu IACR Cryptol. ePrint Arch. 2016, 125, 2016 | 15 | 2016 |
Various Proxy Re-Encryption Schemes from Lattices. X Fan, FH Liu IACR Cryptol. ePrint Arch. 2016, 278, 2016 | 15 | 2016 |
Proxy re-encryption and re-signatures from lattices X Fan, FH Liu International Conference on Applied Cryptography and Network Security, 363-382, 2019 | 14 | 2019 |
Efficient string-commitment from weak bit-commitment KM Chung, FH Liu, CJ Lu, BY Yang International Conference on the Theory and Application of Cryptology and …, 2010 | 14 | 2010 |
Parameter-hiding order revealing encryption D Cash, FH Liu, A O’Neill, M Zhandry, C Zhang International Conference on the Theory and Application of Cryptology and …, 2018 | 13 | 2018 |
Compact identity based encryption from LWE D Apon, X Fan, F Liu Cryptol. ePrint Arch 2016, 2016 | 13 | 2016 |