Hong-Sheng Zhou

According to our database1, Hong-Sheng Zhou authored at least 47 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Leakage Resilience from Program Obfuscation.
J. Cryptology, 2019

(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
J. Cryptology, 2019

Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Statement Voting.
Proceedings of the Financial Cryptography and Data Security, 2019

2018
Multi-mode Cryptocurrency Systems.
IACR Cryptology ePrint Archive, 2018

Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation.
IACR Cryptology ePrint Archive, 2018

Towards Quantum One-Time Memories from Stateless Hardware.
IACR Cryptology ePrint Archive, 2018

A Generic Paradigm for Blockchain Design.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Correcting Subverted Random Oracles.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Digital Liquid Democracy: How to Vote Your Delegation Statement.
IACR Cryptology ePrint Archive, 2017

iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake).
IACR Cryptology ePrint Archive, 2017

TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake.
IACR Cryptology ePrint Archive, 2017

Brief Announcement: Statement Voting and Liquid Democracy.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017

Generic Semantic Security against a Kleptographic Adversary.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption.
IACR Cryptology ePrint Archive, 2016

Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power.
IACR Cryptology ePrint Archive, 2016

Leakage-Resilient Public-Key Encryption from Obfuscation.
IACR Cryptology ePrint Archive, 2016

Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond.
IACR Cryptology ePrint Archive, 2016

A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Cryptography for Parallel RAM from Indistinguishability Obfuscation.
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016

2015
Cliptography: Clipping the Power of Kleptographic Attacks.
IACR Cryptology ePrint Archive, 2015

Fair and Robust Multi-Party Computation using a Global Transaction Ledger.
IACR Cryptology ePrint Archive, 2015

Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2015

Multi-Client Verifiable Computation with Stronger Security Guarantees.
IACR Cryptology ePrint Archive, 2015

Feasibility and Completeness of Cryptographic Tasks in the Quantum World.
IACR Cryptology ePrint Archive, 2015

Functional Encryption from (Small) Hardwae Tokens.
IACR Cryptology ePrint Archive, 2015

Computation-Trace Indistinguishability Obfuscation and its Applications.
IACR Cryptology ePrint Archive, 2015

Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation.
IACR Cryptology ePrint Archive, 2014

Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components without Leak-free Hardware.
IACR Cryptology ePrint Archive, 2014

Locally Decodable and Updatable Non-Malleable Codes and Their Applications.
IACR Cryptology ePrint Archive, 2014

Distributing the setup in universally composable multi-party computation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014

Multi-input Functional Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

2013
Multi-Input Functional Encryption.
IACR Cryptology ePrint Archive, 2013

Functional Encryption from (Small) Hardware Tokens.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.
IACR Cryptology ePrint Archive, 2012

2011
On the Security of the Free-XOR Technique.
IACR Cryptology ePrint Archive, 2011

Adaptively secure broadcast, revisited.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

2009
Hidden identity-based signatures.
IET Information Security, 2009

Zero-Knowledge Proofs with Witness Elimination.
Proceedings of the Public Key Cryptography, 2009

Secure Function Collection with Sublinear Storage.
Proceedings of the Automata, Languages and Programming, 36th Internatilonal Colloquium, 2009

2008
Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer.
IACR Cryptology ePrint Archive, 2008

A Framework for the Sound Specification of Cryptographic Tasks.
IACR Cryptology ePrint Archive, 2008

Sound and Fine-grain Specification of Ideal Functionalities.
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008

2007
Equivocal Blind Signatures and Adaptive UC-Security.
IACR Cryptology ePrint Archive, 2007

Trading Static for Adaptive Security in Universally Composable Zero-Knowledge.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

2005
Concurrent Blind Signatures without Random Oracles.
IACR Cryptology ePrint Archive, 2005


  Loading...