Feng-Hao Liu
Feng-Hao Liu
Bestätigte E-Mail-Adresse bei fau.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Multi-input functional encryption
S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ...
Annual International Conference on the Theory and Applications of …, 2014
2602014
Memory delegation
KM Chung, YT Kalai, FH Liu, R Raz
Annual Cryptology Conference, 151-168, 2011
1432011
Tamper and leakage resilience in the split-state model
FH Liu, A Lysyanskaya
Annual Cryptology Conference, 517-532, 2012
1202012
Multi-client verifiable computation with stronger security guarantees
SD Gordon, J Katz, FH Liu, E Shi, HS Zhou
Theory of Cryptography Conference, 144-168, 2015
472015
Locally decodable and updatable non-malleable codes and their applications
D Dachman-Soled, FH Liu, E Shi, HS Zhou
Journal of Cryptology 33 (1), 319-355, 2020
462020
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
N Chandran, M Chase, FH Liu, R Nishimaki, K Xagawa
International Workshop on Public Key Cryptography, 95-112, 2014
372014
Public-key cryptography from new multivariate quadratic assumptions
YJ Huang, FH Liu, BY Yang
International Workshop on Public Key Cryptography, 190-205, 2012
372012
Parallel repetition theorems for interactive arguments
KM Chung, FH Liu
Theory of Cryptography Conference, 19-36, 2010
282010
Leakage-resilient circuits revisited–optimal number of computing components without leak-free hardware
D Dachman-Soled, FH Liu, HS Zhou
Annual International Conference on the Theory and Applications of …, 2015
212015
Practical non-malleable codes from l-more extractable hash functions
A Kiayias, FH Liu, Y Tselekounis
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
192016
On the lattice smoothing parameter problem
KM Chung, D Dadush, FH Liu, C Peikert
2013 IEEE Conference on Computational Complexity, 230-241, 2013
172013
Algorithmic tamper-proof security under probing attacks
FH Liu, A Lysyanskaya
International Conference on Security and Cryptography for Networks, 106-120, 2010
162010
Leakage resilient fully homomorphic encryption
A Berkoff, FH Liu
Theory of Cryptography Conference, 515-539, 2014
152014
Various Proxy Re-Encryption Schemes from Lattices.
X Fan, FH Liu
IACR Cryptol. ePrint Arch. 2016, 278, 2016
142016
Fully-Secure Lattice-Based IBE as Compact as PKE.
D Apon, X Fan, FH Liu
IACR Cryptol. ePrint Arch. 2016, 125, 2016
132016
Efficient string-commitment from weak bit-commitment
KM Chung, FH Liu, CJ Lu, BY Yang
International Conference on the Theory and Application of Cryptology and …, 2010
132010
Leakage-resilient public-key encryption from obfuscation
D Dachman-Soled, SD Gordon, FH Liu, A O’Neill, HS Zhou
Public-Key Cryptography--PKC 2016, 101-128, 2016
122016
Compact identity based encryption from LWE
D Apon, X Fan, F Liu
Cryptology ePrint Archive 2016, 2016
112016
Parameter-hiding order revealing encryption
D Cash, FH Liu, A O’Neill, M Zhandry, C Zhang
International Conference on the Theory and Application of Cryptology and …, 2018
102018
Deniable attribute based encryption for branching programs from LWE
D Apon, X Fan, FH Liu
Theory of Cryptography Conference, 299-329, 2016
92016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20