Multi-input functional encryption S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ... Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014 | 440 | 2014 |
Tamper and leakage resilience in the split-state model FH Liu, A Lysyanskaya Annual Cryptology Conference, 517-532, 2012 | 160 | 2012 |
Memory delegation KM Chung, YT Kalai, FH Liu, R Raz Annual Cryptology Conference, 151-168, 2011 | 156 | 2011 |
Constant-round MPC with fairness and guarantee of output delivery S Dov Gordon, FH Liu, E Shi Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 102 | 2015 |
Multi-client verifiable computation with stronger security guarantees SD Gordon, J Katz, FH Liu, E Shi, HS Zhou Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015 | 68 | 2015 |
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices N Chandran, M Chase, FH Liu, R Nishimaki, K Xagawa International Workshop on Public Key Cryptography, 95-112, 2014 | 67 | 2014 |
Locally decodable and updatable non-malleable codes and their applications D Dachman-Soled, FH Liu, E Shi, HS Zhou Journal of Cryptology 33 (1), 319-355, 2020 | 60 | 2020 |
Efficient multi-party private set intersection against malicious adversaries E Zhang, FH Liu, Q Lai, G Jin, Y Li Proceedings of the 2019 ACM SIGSAC conference on cloud computing security …, 2019 | 59 | 2019 |
Multi-input functional encryption SD Gordon, J Katz, FH Liu, E Shi, HS Zhou Cryptology ePrint Archive, 2013 | 54 | 2013 |
Public-key cryptography from new multivariate quadratic assumptions YJ Huang, FH Liu, BY Yang Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012 | 48 | 2012 |
Practical non-malleable codes from l-more extractable hash functions A Kiayias, FH Liu, Y Tselekounis Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 41 | 2016 |
FE for inner products and its application to decentralized ABE Z Wang, X Fan, FH Liu IACR international workshop on public key cryptography, 97-127, 2019 | 38 | 2019 |
On the lattice smoothing parameter problem KM Chung, D Dadush, FH Liu, C Peikert 2013 IEEE Conference on Computational Complexity, 230-241, 2013 | 36 | 2013 |
Parameter-hiding order revealing encryption D Cash, FH Liu, A O’Neill, M Zhandry, C Zhang Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 34 | 2018 |
Proxy re-encryption and re-signatures from lattices X Fan, FH Liu Applied Cryptography and Network Security: 17th International Conference …, 2019 | 33 | 2019 |
Parallel repetition theorems for interactive arguments KM Chung, FH Liu Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010 | 31 | 2010 |
Leakage-resilient circuits revisited–optimal number of computing components without leak-free hardware D Dachman-Soled, FH Liu, HS Zhou Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015 | 29 | 2015 |
New lattice two-stage sampling technique and its applications to functional encryption–stronger security and smaller ciphertexts Q Lai, FH Liu, Z Wang Annual International Conference on the Theory and Applications of …, 2021 | 25 | 2021 |
Leakage resilient fully homomorphic encryption A Berkoff, FH Liu Theory of Cryptography Conference, 515-539, 2014 | 24 | 2014 |
Batch bootstrapping I: a new framework for SIMD bootstrapping in polynomial modulus FH Liu, H Wang Annual International Conference on the Theory and Applications of …, 2023 | 23 | 2023 |