Multi-input functional encryption S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ... Annual International Conference on the Theory and Applications of …, 2014 | 325 | 2014 |
Memory delegation KM Chung, YT Kalai, FH Liu, R Raz Annual Cryptology Conference, 151-168, 2011 | 151 | 2011 |
Tamper and leakage resilience in the split-state model FH Liu, A Lysyanskaya Annual Cryptology Conference, 517-532, 2012 | 128 | 2012 |
Constant-round MPC with fairness and guarantee of output delivery S Dov Gordon, FH Liu, E Shi Annual Cryptology Conference, 63-82, 2015 | 68 | 2015 |
Multi-client verifiable computation with stronger security guarantees SD Gordon, J Katz, FH Liu, E Shi, HS Zhou Theory of Cryptography Conference, 144-168, 2015 | 57 | 2015 |
Locally decodable and updatable non-malleable codes and their applications D Dachman-Soled, FH Liu, E Shi, HS Zhou Journal of Cryptology 33 (1), 319-355, 2020 | 51 | 2020 |
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices N Chandran, M Chase, FH Liu, R Nishimaki, K Xagawa International Workshop on Public Key Cryptography, 95-112, 2014 | 51 | 2014 |
Multi-input functional encryption SD Gordon, J Katz, FH Liu, E Shi, HS Zhou Cryptology ePrint Archive, 2013 | 44 | 2013 |
Public-key cryptography from new multivariate quadratic assumptions YJ Huang, FH Liu, BY Yang International Workshop on Public Key Cryptography, 190-205, 2012 | 42 | 2012 |
Parallel repetition theorems for interactive arguments KM Chung, FH Liu Theory of Cryptography Conference, 19-36, 2010 | 31 | 2010 |
Practical non-malleable codes from l-more extractable hash functions A Kiayias, FH Liu, Y Tselekounis Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 29 | 2016 |
Leakage-resilient circuits revisited–optimal number of computing components without leak-free hardware D Dachman-Soled, FH Liu, HS Zhou Annual International Conference on the Theory and Applications of …, 2015 | 26 | 2015 |
On the lattice smoothing parameter problem KM Chung, D Dadush, FH Liu, C Peikert arXiv preprint arXiv:1412.7979, 2014 | 24 | 2014 |
Leakage resilient fully homomorphic encryption A Berkoff, FH Liu Theory of Cryptography Conference, 515-539, 2014 | 22 | 2014 |
FE for inner products and its application to decentralized ABE Z Wang, X Fan, FH Liu IACR International Workshop on Public Key Cryptography, 97-127, 2019 | 21 | 2019 |
Proxy re-encryption and re-signatures from lattices X Fan, FH Liu International Conference on Applied Cryptography and Network Security, 363-382, 2019 | 20 | 2019 |
Parameter-hiding order revealing encryption D Cash, FH Liu, A O’Neill, M Zhandry, C Zhang International Conference on the Theory and Application of Cryptology and …, 2018 | 19 | 2018 |
Efficient multi-party private set intersection against malicious adversaries E Zhang, FH Liu, Q Lai, G Jin, Y Li Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019 | 17 | 2019 |
Algorithmic tamper-proof security under probing attacks FH Liu, A Lysyanskaya International Conference on Security and Cryptography for Networks, 106-120, 2010 | 17 | 2010 |
Various proxy re-encryption schemes from lattices X Fan, FH Liu Cryptology ePrint Archive, 2016 | 16 | 2016 |