Hong-Sheng Zhou
タイトル
引用先
引用先
Multi-input functional encryption
S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ...
Annual International Conference on the Theory and Applications of …, 2014
2802014
Fair and robust multi-party computation using a global transaction ledger
A Kiayias, HS Zhou, V Zikas
Annual International Conference on the Theory and Applications of …, 2016
1132016
On the security of the “free-XOR” technique
SG Choi, J Katz, R Kumaresan, HS Zhou
Theory of Cryptography Conference, 39-53, 2012
752012
Cliptography: Clipping the power of kleptographic attacks
A Russell, Q Tang, M Yung, HS Zhou
International Conference on the Theory and Application of Cryptology and …, 2016
632016
Concurrent blind signatures without random oracles
A Kiayias, HS Zhou
International Conference on Security and Cryptography for Networks, 49-62, 2006
54*2006
2-hop blockchain: Combining proof-of-work and proof-of-stake securely
T Duong, L Fan, J Katz, P Thai, HS Zhou
European Symposium on Research in Computer Security, 697-712, 2020
53*2020
Multi-client verifiable computation with stronger security guarantees
SD Gordon, J Katz, FH Liu, E Shi, HS Zhou
Theory of Cryptography Conference, 144-168, 2015
532015
Somewhat non-committing encryption and efficient adaptively secure oblivious transfer
JA Garay, D Wichs, HS Zhou
Annual International Cryptology Conference, 505-523, 2009
512009
Cryptography for parallel RAM from indistinguishability obfuscation
YC Chen, SSM Chow, KM Chung, RWF Lai, WK Lin, HS Zhou
Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016
48*2016
Locally decodable and updatable non-malleable codes and their applications
D Dachman-Soled, FH Liu, E Shi, HS Zhou
Journal of Cryptology 33 (1), 319-355, 2020
472020
Twinscoin: A cryptocurrency via proof-of-work and proof-of-stake
T Duong, A Chepurnoy, L Fan, HS Zhou
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and …, 2018
46*2018
Efficient, adaptively secure, and composable oblivious transfer with a single, global CRS
SG Choi, J Katz, H Wee, HS Zhou
International Workshop on Public Key Cryptography, 73-88, 2013
412013
Generic semantic security against a kleptographic adversary
A Russell, Q Tang, M Yung, HS Zhou
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
39*2017
Multi-Input Functional Encryption.
SD Gordon, J Katz, FH Liu, E Shi, HS Zhou
IACR Cryptol. ePrint Arch. 2013, 774, 2013
382013
Adaptively secure broadcast, revisited
JA Garay, J Katz, R Kumaresan, HS Zhou
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of …, 2011
382011
Equivocal blind signatures and adaptive UC-security
A Kiayias, HS Zhou
Theory of Cryptography Conference, 340-355, 2008
332008
Designing proof of human-work puzzles for cryptocurrency and beyond
J Blocki, HS Zhou
Theory of Cryptography Conference, 517-546, 2016
282016
Remarks on unknown key-share attack on authenticated multiple-key agreement protocol
HS Zhou, L Fan, JH Li
Electronics Letters 39 (17), 1248-1249, 2003
232003
Leakage-resilient circuits revisited–optimal number of computing components without leak-free hardware
D Dachman-Soled, FH Liu, HS Zhou
Annual International Conference on the Theory and Applications of …, 2015
222015
Feasibility and completeness of cryptographic tasks in the quantum world
S Fehr, J Katz, F Song, HS Zhou, V Zikas
Theory of Cryptography Conference, 281-296, 2013
222013
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20