default search action
Feng-Hao Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Xi Lin, Heyang Cao, Feng-Hao Liu, Zhedong Wang, Mingsheng Wang:
Shorter ZK-SNARKs from square span programs over ideal lattices. Cybersecur. 7(1): 33 (2024) - [j4]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Leakage-resilient sf IBE/sf ABE with optimal leakage rates from lattices. Des. Codes Cryptogr. 92(6): 1541-1597 (2024) - [j3]Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates. J. Cryptol. 37(2): 17 (2024) - [c38]Zhedong Wang, Qiqi Lai, Feng-Hao Liu:
Ring/Module Learning with Errors Under Linear Leakage - Hardness and Applications. Public Key Cryptography (2) 2024: 275-304 - 2023
- [c37]Feng-Hao Liu, En Zhang, Leiyong Qin:
Efficient Multiparty Probabilistic Threshold Private Set Intersection. CCS 2023: 2188-2201 - [c36]Tzu-Li Liu, Yu-Te Ku, Ming-Chien Ho, Feng-Hao Liu, Ming-Ching Chang, Chih-Fan Hsu, Wei-Chao Chen, Shih-Hao Hung:
An Efficient CKKS-FHEW/TFHE Hybrid Encrypted Inference Framework. ESORICS Workshops (2) 2023: 535-551 - [c35]Feng-Hao Liu, Han Wang:
Batch Bootstrapping I: - A New Framework for SIMD Bootstrapping in Polynomial Modulus. EUROCRYPT (3) 2023: 321-352 - [c34]Feng-Hao Liu, Han Wang:
Batch Bootstrapping II: - Bootstrapping in Polynomial Modulus only Requires O~(1)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\tilde{O}(1)$$\end{document} FHE Multiplications in Amortization. EUROCRYPT (3) 2023: 353-384 - [c33]Ke-Han Li, Chih-Fan Hsu, Ming-Ching Chang, Feng-Hao Liu, Shao-Yi Chien, Wei-Chao Chen:
Region-aware Photo Assurance System for Image Authentication. MIPR 2023: 1-6 - [i32]Qiqi Lai, Feng-Hao Liu, Anna Lysyanskaya, Zhedong Wang:
Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials. IACR Cryptol. ePrint Arch. 2023: 766 (2023) - [i31]Zhedong Wang, Qiqi Lai, Feng-Hao Liu:
Ring/Module Learning with Errors under Linear Leakage - Hardness and Applications. IACR Cryptol. ePrint Arch. 2023: 826 (2023) - 2022
- [c32]Daniel Apon, Chloé Cachet, Benjamin Fuller, Peter Hall, Feng-Hao Liu:
Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model. ASIACRYPT (4) 2022: 353-383 - [c31]Chih-Fan Hsu, Jing-Lun Huang, Feng-Hao Liu, Ming-Ching Chang, Wei-Chao Chen:
FedTrust: Towards Building Secure Robust and Trustworthy Moderators for Federated Learning. MIPR 2022: 318-323 - [c30]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Leakage-Resilient IBE/ ABE with Optimal Leakage Rates from Lattices. Public Key Cryptography (2) 2022: 225-255 - [i30]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts. IACR Cryptol. ePrint Arch. 2022: 779 (2022) - [i29]Daniel Apon, Chloé Cachet, Benjamin Fuller, Peter Hall, Feng-Hao Liu:
Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model. IACR Cryptol. ePrint Arch. 2022: 1108 (2022) - [i28]Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography. IACR Cryptol. ePrint Arch. 2022: 1745 (2022) - 2021
- [c29]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
New Lattice Two-Stage Sampling Technique and Its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts. EUROCRYPT (1) 2021: 498-527 - [c28]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks. Public Key Cryptography (1) 2021: 421-450 - [c27]Parhat Abla, Feng-Hao Liu, Han Wang, Zhedong Wang:
Ring-Based Identity Based Encryption - Asymptotically Shorter MPK and Tighter Security. TCC (3) 2021: 157-187 - [i27]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks. IACR Cryptol. ePrint Arch. 2021: 227 (2021) - [i26]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices. IACR Cryptol. ePrint Arch. 2021: 1665 (2021) - 2020
- [j2]Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Locally Decodable and Updatable Non-malleable Codes and Their Applications. J. Cryptol. 33(1): 319-355 (2020) - [c26]Feng-Hao Liu, Zhedong Wang:
Rounding in the Rings. CRYPTO (2) 2020: 296-326 - [c25]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More. Public Key Cryptography (1) 2020: 652-681
2010 – 2019
- 2019
- [j1]Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou:
Leakage Resilience from Program Obfuscation. J. Cryptol. 32(3): 742-824 (2019) - [c24]Xiong Fan, Feng-Hao Liu:
Proxy Re-Encryption and Re-Signatures from Lattices. ACNS 2019: 363-382 - [c23]En Zhang, Feng-Hao Liu, Qiqi Lai, Ganggang Jin, Yu Li:
Efficient Multi-Party Private Set Intersection Against Malicious Adversaries. CCSW 2019: 93-104 - [c22]Zhedong Wang, Xiong Fan, Feng-Hao Liu:
FE for Inner Products and Its Application to Decentralized ABE. Public Key Cryptography (2) 2019: 97-127 - [i25]Zhedong Wang, Xiong Fan, Feng-Hao Liu:
FE for Inner Products and Its Application to Decentralized ABE. IACR Cryptol. ePrint Arch. 2019: 33 (2019) - 2018
- [c21]David Cash, Feng-Hao Liu, Adam O'Neill, Mark Zhandry, Cong Zhang:
Parameter-Hiding Order Revealing Encryption. ASIACRYPT (1) 2018: 181-210 - [c20]Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
Non-Malleable Codes for Partial Functions with Manipulation Detection. CRYPTO (3) 2018: 577-607 - [i24]Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
Non-Malleable Codes for Partial Functions with Manipulation Detection. IACR Cryptol. ePrint Arch. 2018: 538 (2018) - [i23]David Cash, Feng-Hao Liu, Adam O'Neill, Mark Zhandry, Cong Zhang:
Parameter-Hiding Order Revealing Encryption. IACR Cryptol. ePrint Arch. 2018: 698 (2018) - 2017
- [i22]Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
Practical Non-Malleable Codes from ℓ-more Extractable Hash Functions. IACR Cryptol. ePrint Arch. 2017: 40 (2017) - [i21]Daniel Apon, Xiong Fan, Feng-Hao Liu:
Vector Encoding over Lattices and Its Applications. IACR Cryptol. ePrint Arch. 2017: 455 (2017) - [i20]Xiong Fan, Feng-Hao Liu:
Proxy Re-Encryption and Re-Signatures from Lattices. IACR Cryptol. ePrint Arch. 2017: 456 (2017) - 2016
- [c19]Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
Practical Non-Malleable Codes from l-more Extractable Hash Functions. CCS 2016: 1317-1328 - [c18]Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou:
Leakage-Resilient Public-Key Encryption from Obfuscation. Public Key Cryptography (2) 2016: 101-128 - [c17]Daniel Apon, Xiong Fan, Feng-Hao Liu:
Deniable Attribute Based Encryption for Branching Programs from LWE. TCC (B2) 2016: 299-329 - [i19]Daniel Apon, Xiong Fan, Feng-Hao Liu:
Fully-Secure Lattice-Based IBE as Compact as PKE. IACR Cryptol. ePrint Arch. 2016: 125 (2016) - [i18]Xiong Fan, Feng-Hao Liu:
Various Proxy Re-Encryption Schemes from Lattices. IACR Cryptol. ePrint Arch. 2016: 278 (2016) - [i17]Daniel Apon, Xiong Fan, Feng-Hao Liu:
Deniable Attribute Based Encryption for Branching Programs from LWE. IACR Cryptol. ePrint Arch. 2016: 562 (2016) - [i16]David Cash, Feng-Hao Liu, Adam O'Neill, Cong Zhang:
Reducing the Leakage in Practical Order-Revealing Encryption. IACR Cryptol. ePrint Arch. 2016: 661 (2016) - [i15]Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou:
Leakage-Resilient Public-Key Encryption from Obfuscation. IACR Cryptol. ePrint Arch. 2016: 730 (2016) - 2015
- [c16]S. Dov Gordon, Feng-Hao Liu, Elaine Shi:
Constant-Round MPC with Fairness and Guarantee of Output Delivery. CRYPTO (2) 2015: 63-82 - [c15]Dana Dachman-Soled, Feng-Hao Liu, Hong-Sheng Zhou:
Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware. EUROCRYPT (2) 2015: 131-158 - [c14]S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Multi-Client Verifiable Computation with Stronger Security Guarantees. TCC (2) 2015: 144-168 - [c13]Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Locally Decodable and Updatable Non-malleable Codes and Their Applications. TCC (1) 2015: 427-450 - [i14]S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Multi-Client Verifiable Computation with Stronger Security Guarantees. IACR Cryptol. ePrint Arch. 2015: 142 (2015) - [i13]S. Dov Gordon, Feng-Hao Liu, Elaine Shi:
Constant-Round MPC with Fairness and Guarantee of Output Delivery. IACR Cryptol. ePrint Arch. 2015: 371 (2015) - [i12]Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa:
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices. IACR Cryptol. ePrint Arch. 2015: 491 (2015) - [i11]Daniel Apon, Xiong Fan, Feng-Hao Liu:
Bi-Deniable Inner Product Encryption from LWE. IACR Cryptol. ePrint Arch. 2015: 993 (2015) - 2014
- [c12]Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, Hong-Sheng Zhou:
Multi-input Functional Encryption. EUROCRYPT 2014: 578-602 - [c11]Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa:
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices. Public Key Cryptography 2014: 95-112 - [c10]Alexandra Berkoff, Feng-Hao Liu:
Leakage Resilient Fully Homomorphic Encryption. TCC 2014: 515-539 - [i10]Kai-Min Chung, Daniel Dadush, Feng-Hao Liu, Chris Peikert:
On the Lattice Smoothing Parameter Problem. CoRR abs/1412.7979 (2014) - [i9]Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Locally Decodable and Updatable Non-Malleable Codes and Their Applications. IACR Cryptol. ePrint Arch. 2014: 663 (2014) - [i8]Dana Dachman-Soled, Feng-Hao Liu, Hong-Sheng Zhou:
Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components without Leak-free Hardware. IACR Cryptol. ePrint Arch. 2014: 856 (2014) - 2013
- [b1]Feng-Hao Liu:
Error Tolerant Cryptography. Brown University, USA, 2013 - [c9]Kai-Min Chung, Daniel Dadush, Feng-Hao Liu, Chris Peikert:
On the Lattice Smoothing Parameter Problem. CCC 2013: 230-241 - [i7]S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Multi-Input Functional Encryption. IACR Cryptol. ePrint Arch. 2013: 774 (2013) - [i6]Alexandra Berkoff, Feng-Hao Liu:
Leakage Resilient Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2013: 822 (2013) - 2012
- [c8]Feng-Hao Liu, Anna Lysyanskaya:
Tamper and Leakage Resilience in the Split-State Model. CRYPTO 2012: 517-532 - [c7]Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang:
Public-Key Cryptography from New Multivariate Quadratic Assumptions. Public Key Cryptography 2012: 190-205 - [i5]Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang:
Public-Key Cryptography from New Multivariate Quadratic Assumptions. IACR Cryptol. ePrint Arch. 2012: 273 (2012) - [i4]Feng-Hao Liu, Anna Lysyanskaya:
Tamper and Leakage Resilience in the Split-State Model. IACR Cryptol. ePrint Arch. 2012: 297 (2012) - 2011
- [c6]Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, Ran Raz:
Memory Delegation. CRYPTO 2011: 151-168 - [c5]Ching-Hua Yu, Sherman S. M. Chow, Kai-Min Chung, Feng-Hao Liu:
Efficient Secure Two-Party Exponentiation. CT-RSA 2011: 17-32 - [i3]Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, Ran Raz:
Memory Delegation. IACR Cryptol. ePrint Arch. 2011: 273 (2011) - 2010
- [c4]Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang:
Efficient String-Commitment from Weak Bit-Commitment. ASIACRYPT 2010: 268-282 - [c3]Feng-Hao Liu, Anna Lysyanskaya:
Algorithmic Tamper-Proof Security under Probing Attacks. SCN 2010: 106-120 - [c2]Kai-Min Chung, Feng-Hao Liu:
Parallel Repetition Theorems for Interactive Arguments. TCC 2010: 19-36
2000 – 2009
- 2009
- [i2]Kai-Min Chung, Feng-Hao Liu:
Tight Parallel Repetition Theorems for Public-coin Arguments. Electron. Colloquium Comput. Complex. TR09 (2009) - 2008
- [c1]Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang:
Secure PRNGs from Specialized Polynomial Maps over Any . PQCrypto 2008: 181-202 - 2007
- [i1]Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang, Jintai Ding:
Secure PRNGs from Specialized Polynomial Maps over Any Fq. IACR Cryptol. ePrint Arch. 2007: 405 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint