


default search action
Jiahui Liu 0003
Person information
- affiliation: Fujitsu Research, San Diego, CA, USA
- affiliation: Massachusetts Institute of Technology, Cambridge, MA, USA
- affiliation: University of Texas at Austin, TX, USA
Other persons with the same name
- Jiahui Liu — disambiguation page
- Jiahui Liu 0001
— Beijing Institute of Technology, National Engineering Laboratory for Electric Vehicles, China
- Jiahui Liu 0002 — Northwestern University, Intelligent Information Laboratory, Evanston, IL, USA
- Jiahui Liu 0004
— University of Science and Technology (UST), School of Automation and Electrical Engineering, Beijing, China
- Jiahui Liu 0005
— Shandong University of Science and Technology, College of Mathematics and Systems Science, Qingdao, China
- Jiahui Liu 0006
— KTH Royal Institute of Technology, Stockholm, Sweden
- Jiahui Liu 0007
— Dalian Maritime University, School of Information Science and Technology, China
- Jiahui Liu 0008
— Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, College of Artificial Intelligence, China
- Jiahui Liu 0009
— Nanyang Technological University, School of Civil and Environmental Engineering, Singapore
- Jiahui Liu 0010
— Nankai University, College of Software, College of Computer Science, Tianjin, China
- Jiahui Liu 0011
— Shanghai Jiao Tong University, School of Aeronautics and Astronautics, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c13]Orestis Chardouvelis, Vipul Goyal, Aayush Jain, Jiahui Liu
:
Quantum Key Leasing for PKE and FHE with a Classical Lessor. EUROCRYPT (3) 2025: 248-277 - [c12]Aparna Gupte
, Jiahui Liu
, Justin Raizes
, Bhaskar Roberts
, Vinod Vaikuntanathan
:
Quantum One-Time Programs, Revisited. STOC 2025: 213-221 - [c11]Jiahui Liu
, Saachi Mutreja
, Henry Yuen
:
QMA vs QCMA and Pseudorandomness. STOC 2025: 1520-1531 - 2024
- [c10]Prabhanjan Ananth, Vipul Goyal, Jiahui Liu
, Qipeng Liu
:
Unclonable Secret Sharing. ASIACRYPT (9) 2024: 129-157 - [c9]Jiahui Liu
, Mark Zhandry
:
Composability in Watermarking Schemes. TCC (3) 2024: 400-430 - [i23]Prabhanjan Ananth, Vipul Goyal, Jiahui Liu, Qipeng Liu:
Unclonable Secret Sharing. CoRR abs/2406.11008 (2024) - [i22]Nai-Hui Chia, Kai-Min Chung, Xiao Liang, Jiahui Liu:
The Black-Box Simulation Barrier Persists in a Fully Quantum World. CoRR abs/2409.06317 (2024) - [i21]Jiahui Liu, Mark Zhandry:
Composability in Watermarking Schemes. CoRR abs/2410.10712 (2024) - [i20]Aparna Gupte, Jiahui Liu, Justin Raizes, Bhaskar Roberts, Vinod Vaikuntanathan:
Quantum One-Time Programs, Revisited. CoRR abs/2411.01876 (2024) - [i19]Jiahui Liu, Saachi Mutreja, Henry Yuen:
QMA vs. QCMA and Pseudorandomness. CoRR abs/2411.14416 (2024) - [i18]Prabhanjan Ananth, Vipul Goyal, Jiahui Liu, Qipeng Liu:
Unclonable Secret Sharing. IACR Cryptol. ePrint Arch. 2024: 716 (2024) - [i17]Nai-Hui Chia, Kai-Min Chung, Xiao Liang, Jiahui Liu:
The Black-Box Simulation Barrier Persists in a Fully Quantum World. IACR Cryptol. ePrint Arch. 2024: 1413 (2024) - [i16]Jiahui Liu, Mark Zhandry:
Composability in Watermarking Schemes. IACR Cryptol. ePrint Arch. 2024: 1662 (2024) - [i15]Aparna Gupte, Jiahui Liu, Justin Raizes, Bhaskar Roberts, Vinod Vaikuntanathan:
Quantum One-Time Programs, Revisited. IACR Cryptol. ePrint Arch. 2024: 1934 (2024) - 2023
- [c8]Jiahui Liu
, Hart Montgomery
, Mark Zhandry
:
Another Round of Breaking and Making Quantum Money: - How to Not Build It from Lattices, and More. EUROCRYPT (1) 2023: 611-638 - [i14]Orestis Chardouvelis, Vipul Goyal, Aayush Jain, Jiahui Liu:
Quantum Key Leasing for PKE and FHE with a Classical Lessor. CoRR abs/2310.14328 (2023) - [i13]Orestis Chardouvelis, Vipul Goyal, Aayush Jain, Jiahui Liu:
Quantum Key Leasing for PKE and FHE with a Classical Lessor. IACR Cryptol. ePrint Arch. 2023: 1640 (2023) - 2022
- [c7]Jiahui Liu, Qipeng Liu, Luowen Qian
:
Beating Classical Impossibility of Position Verification. ITCS 2022: 100:1-100:11 - [c6]Jiahui Liu
, Qipeng Liu
, Luowen Qian
, Mark Zhandry
:
Collusion Resistant Copy-Protection for Watermarkable Functionalities. TCC (1) 2022: 294-323 - [i12]Hart Montgomery, Jiahui Liu, Mark Zhandry:
Another Round of Breaking and Making Quantum Money: How to Not Build It from Lattices, and More. CoRR abs/2211.11994 (2022) - [i11]Jiahui Liu, Qipeng Liu, Luowen Qian:
Beating Classical Impossibility of Position Verification. IACR Cryptol. ePrint Arch. 2022: 8 (2022) - [i10]Jiahui Liu, Qipeng Liu, Luowen Qian, Mark Zhandry:
Collusion Resistant Copy-Protection for Watermarkable Functionalities. IACR Cryptol. ePrint Arch. 2022: 1429 (2022) - [i9]Hart Montgomery, Jiahui Liu, Mark Zhandry:
Another Round of Breaking and Making Quantum Money: How to Not Build It from Lattices, and More. IACR Cryptol. ePrint Arch. 2022: 1620 (2022) - 2021
- [c5]Rishab Goyal, Jiahui Liu, Brent Waters:
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups. ASIACRYPT (4) 2021: 311-341 - [c4]Scott Aaronson, Jiahui Liu, Qipeng Liu, Mark Zhandry
, Ruizhe Zhang:
New Approaches for Quantum Copy-Protection. CRYPTO (1) 2021: 526-555 - [c3]Andrea Coladangelo
, Jiahui Liu, Qipeng Liu, Mark Zhandry
:
Hidden Cosets and Applications to Unclonable Cryptography. CRYPTO (1) 2021: 556-584 - [c2]Jiahui Liu, Satyanarayana Vusirikala:
Secure Multiparty Computation in the Bounded Storage Model. IMACC 2021: 289-325 - [i8]Andrea Coladangelo, Jiahui Liu, Qipeng Liu, Mark Zhandry:
Hidden Cosets and Applications to Unclonable Cryptography. CoRR abs/2107.05692 (2021) - [i7]Jiahui Liu, Qipeng Liu, Luowen Qian:
Beating Classical Impossibility of Position Verification. CoRR abs/2109.07517 (2021) - [i6]Rishab Goyal, Jiahui Liu, Brent Waters:
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups. IACR Cryptol. ePrint Arch. 2021: 343 (2021) - [i5]Andrea Coladangelo, Jiahui Liu, Qipeng Liu, Mark Zhandry:
Hidden Cosets and Applications to Unclonable Cryptography. IACR Cryptol. ePrint Arch. 2021: 946 (2021) - [i4]Jiahui Liu, Satyanarayana Vusirikala:
Secure Multiparty Computation in the Bounded Storage Model. IACR Cryptol. ePrint Arch. 2021: 1327 (2021) - 2020
- [i3]Scott Aaronson, Jiahui Liu, Ruizhe Zhang:
Quantum Copy-Protection from Hidden Subspaces. CoRR abs/2004.09674 (2020) - [i2]Scott Aaronson, Jiahui Liu, Qipeng Liu, Mark Zhandry, Ruizhe Zhang:
New Approaches for Quantum Copy-Protection. IACR Cryptol. ePrint Arch. 2020: 1339 (2020)
2010 – 2019
- 2018
- [c1]Lucas Kowalczyk, Jiahui Liu, Tal Malkin, Kailash Meiyappan:
Mitigating the One-Use Restriction in Attribute-Based Encryption. ICISC 2018: 23-36 - [i1]Lucas Kowalczyk, Jiahui Liu, Tal Malkin, Kailash Meiyappan:
Mitigating the One-Use Restriction in Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2018: 645 (2018)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-07-11 23:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint