Feng-Hao Liu

Orcid: 0000-0003-4298-3925

According to our database1, Feng-Hao Liu authored at least 62 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
GPU Acceleration for FHEW/TFHE Bootstrapping.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025

Optimizing Encrypted Neural Networks: Model Design, Quantization and Fine-Tuning Using FHEW/TFHE.
Proc. Priv. Enhancing Technol., 2025

Discrete Gaussians Modulo Sub-Lattices: New Leftover Hash Lemmas for Discrete Gaussians.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

A Comprehensive Evaluation of Encrypted DNN Inference Methods.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2025

2024
Shorter ZK-SNARKs from square span programs over ideal lattices.
Cybersecur., December, 2024

(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates.
J. Cryptol., June, 2024

Leakage-resilient sf IBE/sf ABE with optimal leakage rates from lattices.
Des. Codes Cryptogr., June, 2024

Scalable Two-Round n-out-of-n and Multi-Signatures from Lattices in the Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2024

Revisiting the Robustness of (R/M)LWR under Polynomial Moduli with Applications to Lattice-Based Compact SO-CCA Security.
IACR Cryptol. ePrint Arch., 2024

More Efficient Functional Bootstrapping for General Functions in Polynomial Modulus.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Ring/Module Learning with Errors Under Linear Leakage - Hardness and Applications.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

Invited Paper: Efficient Design of FHEW/TFHE Bootstrapping Implementation with Scalable Parameters.
Proceedings of the 43rd IEEE/ACM International Conference on Computer-Aided Design, 2024

Faster FHE-Based Single-Server Private Information Retrieval.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2023

Region-aware Photo Assurance System for Image Authentication.
Proceedings of the 6th IEEE International Conference on Multimedia Information Processing and Retrieval, 2023

Batch Bootstrapping II: - Bootstrapping in Polynomial Modulus only Requires Õ(1) FHE Multiplications in Amortization.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Batch Bootstrapping I: - A New Framework for SIMD Bootstrapping in Polynomial Modulus.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

An Efficient CKKS-FHEW/TFHE Hybrid Encrypted Inference Framework.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Efficient Multiparty Probabilistic Threshold Private Set Intersection.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography.
IACR Cryptol. ePrint Arch., 2022

Leakage-Resilient IBE/ ABE with Optimal Leakage Rates from Lattices.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

FedTrust: Towards Building Secure Robust and Trustworthy Moderators for Federated Learning.
Proceedings of the 5th IEEE International Conference on Multimedia Information Processing and Retrieval, 2022

Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Ring-Based Identity Based Encryption - Asymptotically Shorter MPK and Tighter Security.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

New Lattice Two-Stage Sampling Technique and Its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Rounding in the Rings.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Leakage Resilience from Program Obfuscation.
J. Cryptol., 2019

FE for Inner Products and Its Application to Decentralized ABE.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Efficient Multi-Party Private Set Intersection Against Malicious Adversaries.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

Proxy Re-Encryption and Re-Signatures from Lattices.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Non-Malleable Codes for Partial Functions with Manipulation Detection.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Parameter-Hiding Order Revealing Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Vector Encoding over Lattices and Its Applications.
IACR Cryptol. ePrint Arch., 2017

2016
Various Proxy Re-Encryption Schemes from Lattices.
IACR Cryptol. ePrint Arch., 2016

Reducing the Leakage in Practical Order-Revealing Encryption.
IACR Cryptol. ePrint Arch., 2016

Fully-Secure Lattice-Based IBE as Compact as PKE.
IACR Cryptol. ePrint Arch., 2016

Deniable Attribute Based Encryption for Branching Programs from LWE.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Leakage-Resilient Public-Key Encryption from Obfuscation.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Practical Non-Malleable Codes from l-more Extractable Hash Functions.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Bi-Deniable Inner Product Encryption from LWE.
IACR Cryptol. ePrint Arch., 2015

Multi-Client Verifiable Computation with Stronger Security Guarantees.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Locally Decodable and Updatable Non-malleable Codes and Their Applications.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Constant-Round MPC with Fairness and Guarantee of Output Delivery.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Leakage Resilient Fully Homomorphic Encryption.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Multi-input Functional Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

2013
Error Tolerant Cryptography.
PhD thesis, 2013

Multi-Input Functional Encryption.
IACR Cryptol. ePrint Arch., 2013

On the Lattice Smoothing Parameter Problem.
Proceedings of the 28th Conference on Computational Complexity, 2013

2012
Public-Key Cryptography from New Multivariate Quadratic Assumptions.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Tamper and Leakage Resilience in the Split-State Model.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
Efficient Secure Two-Party Exponentiation.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Memory Delegation.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010
Parallel Repetition Theorems for Interactive Arguments.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

Algorithmic Tamper-Proof Security under Probing Attacks.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Efficient String-Commitment from Weak Bit-Commitment.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
Tight Parallel Repetition Theorems for Public-coin Arguments.
Electron. Colloquium Comput. Complex., 2009

2008
Secure PRNGs from Specialized Polynomial Maps over Any .
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

2007
Secure PRNGs from Specialized Polynomial Maps over Any F<sub>q</sub>.
IACR Cryptol. ePrint Arch., 2007


  Loading...