Name
Papers
Collaborators
HUIJIA LIN
32
47
Citations 
PageRank 
Referers 
191
16.51
407
Referees 
References 
413
389
Search Limit
100413
Title
Citations
PageRank
Year
The Pseudorandom Oracle Model and Ideal Obfuscation.00.342022
On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption.00.342022
ABE for Circuits with Constant-Size Secret Keys and Adaptive Security.00.342022
QuORAM: A Quorum-Replicated Fault Tolerant ORAM Datastore.00.342022
Two-Round MPC without Round Collapsing Revisited - Towards Efficient Malicious Protocols.00.342022
Compact Adaptively Secure ABE from k-Lin: Beyond NC1 and towards NL.00.342020
Multiparty Reusable Non-Interactive Secure Computation.00.342020
Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles00.342020
Succinct and Adaptively Secure ABE for ABP from k-Lin.00.342020
Simplifying Constructions and Assumptions for i풪.00.342019
k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits.00.342018
Pharos: Privacy Hazards of Replicating ORAM Stores.00.342018
Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation.00.342018
k-Round MPC from k-Round OT via Garbled Interactive Circuits.20.362017
On Removing Graded Encodings from Functional Encryption.30.362017
Indistinguishability Obfuscation from Bilinear Maps and Block-Wise Local PRGs.00.342017
Foundations of Homomorphic Secret Sharing.30.392017
Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles30.392017
A Unified Approach to Constructing Black-Box UC Protocols in Trusted Setup Models.10.352017
Two-Round Concurrent Non-Malleable Commitment from Time-Lock Puzzles.00.342017
Indistinguishability Obfuscation from DDH on 5-linear Maps and Locality-5 PRGs.00.342016
Obfuscation of Probabilistic Circuits and Applications.421.212014
The Hunting of the SNARK.20.382014
The Computational Benefit of Correlated Instances10.352014
Succinct Garbling Schemes and Applications.120.552014
Amplification of Chosen-Ciphertext Security.60.412013
Public-Coin concurrent zero-knowledge in the global hash model160.532013
Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions.20.352012
Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs.50.432011
Non-malleability amplification190.602009
Composable Information Gradients in Wireless Sensor Networks301.222008
RICH: Automatically Protecting Against Integer-Based Vulnerabilities443.232007