Hong-Sheng Zhou

Orcid: 0000-0003-3534-6629

According to our database1, Hong-Sheng Zhou authored at least 78 papers between 2006 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Attention is still what you need: Another Round of Exploring Shoup's GGM.
IACR Cryptol. ePrint Arch., 2025

Bandwidth-Efficient Robust Threshold ECDSA in Three Rounds.
IACR Cryptol. ePrint Arch., 2025

Threshold ECDSA in Two Rounds.
IACR Cryptol. ePrint Arch., 2025

Efficient Garbled Pseudorandom Functions and Lookup Tables from Minimal Assumption.
IACR Cryptol. ePrint Arch., 2025

Brief Announcement: Single-Round Broadcast: Impossibility, Feasibility, and More.
Proceedings of the 39th International Symposium on Distributed Computing, 2025

Single-Input Functionality Against a Dishonest Majority: Practical and Round-Optimal.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

EquiBFT: A Framework for Achieving Fairness in BFT Consensus.
Proceedings of the 45th IEEE International Conference on Distributed Computing Systems, 2025

Best-Possible Unpredictable Proof-of-Stake: An Impossibility and a Practical Design.
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025

2024
Maximizing the Utility of Cryptographic Setups: Secure PAKEs, with either functional RO or CRS.
IACR Cryptol. ePrint Arch., 2024

Distributed Point Function with Constraints, Revisited.
IACR Cryptol. ePrint Arch., 2024

Two Halves Make a Whole: How to Reconcile Soundness and Robustness in Watermarking for Large Language Models.
IACR Cryptol. ePrint Arch., 2024

Column-wise Garbling, and How to Go Beyond the Linear Model.
IACR Cryptol. ePrint Arch., 2024

Brief Announcement: Best-Possible Unpredictable Proof-Of-Stake.
Proceedings of the 38th International Symposium on Distributed Computing, 2024

Scalable Private Set Union, with Stronger Security.
Proceedings of the 33rd USENIX Security Symposium, 2024

Practical Constructions for Single Input Functionality Against a Dishonest Majority.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

On the Complexity of Cryptographic Groups and Generic Group Models.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Endemic Oblivious Transfer via Random Oracles, Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Scriptable and composable SNARKs in the trusted hardware model.
J. Comput. Secur., 2022

The Ideal Functionalities for Private Set Union, Revisited.
IACR Cryptol. ePrint Arch., 2022

Shuffle-based Private Set Union: Faster and More Secure.
Proceedings of the 31st USENIX Security Symposium, 2022

GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

An Analysis of the Algebraic Group Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

A Universally Composable Non-interactive Aggregate Cash System.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
From Random Oracles to Ideal Signatures, and Back.
IACR Cryptol. ePrint Arch., 2021

Correcting Subverted Random Oracles.
IACR Cryptol. ePrint Arch., 2021

Indifferentiable Signatures: High Performance and Fallback Security.
IACR Cryptol. ePrint Arch., 2021

A Permissionless Proof-of-Stake Blockchain with Best-Possible Unpredictability.
IACR Cryptol. ePrint Arch., 2021

Succinct Scriptable NIZK via Trusted Hardware.
Proceedings of the Computer Security - ESORICS 2021, 2021

Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Towards Quantum One-Time Memories from Stateless Hardware.
Proceedings of the 15th Conference on the Theory of Quantum Computation, 2020

2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Leakage Resilience from Program Obfuscation.
J. Cryptol., 2019

Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Statement Voting.
Proceedings of the Financial Cryptography and Data Security, 2019

Fractal: A New Paradigm for High-Performance Proof-of-Stake Blockchains.
Proceedings of the 7th International Workshop on Security in Cloud Computing, 2019

2018
Multi-key FHE for multi-bit messages.
Sci. China Inf. Sci., 2018

A Generic Paradigm for Blockchain Design.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Correcting Subverted Random Oracles.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Multi-mode Cryptocurrency Systems.
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018

TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake.
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018

Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Digital Liquid Democracy: How to Vote Your Delegation Statement.
IACR Cryptol. ePrint Arch., 2017

iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake).
IACR Cryptol. ePrint Arch., 2017

Brief Announcement: Statement Voting and Liquid Democracy.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017

Generic Semantic Security against a Kleptographic Adversary.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption.
IACR Cryptol. ePrint Arch., 2016

Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power.
IACR Cryptol. ePrint Arch., 2016

Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Leakage-Resilient Public-Key Encryption from Obfuscation.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Cryptography for Parallel RAM from Indistinguishability Obfuscation.
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016

Fair and Robust Multi-party Computation Using a Global Transaction Ledger.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Cliptography: Clipping the Power of Kleptographic Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Functional Encryption from (Small) Hardwae Tokens.
IACR Cryptol. ePrint Arch., 2015

Computation-Trace Indistinguishability Obfuscation and its Applications.
IACR Cryptol. ePrint Arch., 2015

Multi-Client Verifiable Computation with Stronger Security Guarantees.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Locally Decodable and Updatable Non-malleable Codes and Their Applications.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Distributing the setup in universally composable multi-party computation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014

Multi-input Functional Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

2013
Multi-Input Functional Encryption.
IACR Cryptol. ePrint Arch., 2013

Feasibility and Completeness of Cryptographic Tasks in the Quantum World.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Functional Encryption from (Small) Hardware Tokens.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
On the Security of the "Free-XOR" Technique.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

2011
Adaptively secure broadcast, revisited.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

2010
A Framework for the Sound Specification of Cryptographic Tasks.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

2009
Zero-Knowledge Proofs with Witness Elimination.
Proceedings of the Public Key Cryptography, 2009

Secure Function Collection with Sublinear Storage.
Proceedings of the Automata, Languages and Programming, 36th Internatilonal Colloquium, 2009

Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer.
Proceedings of the Advances in Cryptology, 2009

2008
Equivocal Blind Signatures and Adaptive UC-Security.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Sound and Fine-grain Specification of Ideal Functionalities.
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008

2007
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

Hidden Identity-Based Signatures.
Proceedings of the Financial Cryptography and Data Security, 2007

2006
Concurrent Blind Signatures Without Random Oracles.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006


  Loading...