Huijia Lin
According to our database1,
Huijia Lin
authored at least 96 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Lattice-Based Post-Quantum iO from Circular Security with Random Opening Assumption (Part II: zeroizing attacks against private-coin evasive LWE assumptions).
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 65th IEEE Annual Symposium on Foundations of Computer Science, 2024
A General Framework for Lattice-Based ABE Using Evasive Inner-Product Functional Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
2023
Attribute-Based Encryption for Circuits of Unbounded Depth from Lattices: Garbled Circuits of Optimal Size, Laconic Functional Evaluation, and More.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 64th IEEE Annual Symposium on Foundations of Computer Science, 2023
Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-quantum i풪.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the Thirty Sixth Annual Conference on Learning Theory, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Indistinguishability Obfuscation from LPN over $\mathbb {F}_p$, DLIN, and PRGs in NC<sup>0</sup>.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Two-Round MPC Without Round Collapsing Revisited - Towards Efficient Malicious Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the STOC '21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, 2021
Proceedings of the 41st IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Information-Theoretic 2-Round MPC Without Round Collapsing: Adaptive Security, and More.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
How to leverage hardness of constant degree expanding polynomials over R to build iO.
IACR Cryptol. ePrint Arch., 2019
How to Leverage Hardness of Constant-Degree Expanding Polynomials over \mathbb R R to build i풪 i O.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
SIAM J. Comput., 2018
Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the 9th Innovations in Theoretical Computer Science Conference, 2018
k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the 21st International Conference on Extending Database Technology, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
Understanding the Security Challenges of Oblivious Cloud Storage with Asynchronous Accesses.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles.
Proceedings of the 58th IEEE Annual Symposium on Foundations of Computer Science, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Indistinguishability Obfuscation from DDH-Like Assumptions on Constant-Degree Graded Encodings.
Proceedings of the IEEE 57th Annual Symposium on Foundations of Computer Science, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
2015
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Innovations in Theoretical Computer Science, 2013
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013
Proceedings of the Advances in Cryptology, 2013
2012
Concurrent Security.
PhD thesis, 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011
2010
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010
Proceedings of the Advances in Cryptology, 2010
2009
A unified framework for concurrent security: universal composability from stand-alone non-malleability.
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009
2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the 7th International Conference on Information Processing in Sensor Networks, 2008
2007
Proceedings of the Network and Distributed System Security Symposium, 2007