Jiahui Liu

Orcid: 0000-0003-4380-8168

Affiliations:
  • Fujitsu Research, San Diego, CA, USA
  • Massachusetts Institute of Technology, Cambridge, MA, USA
  • University of Texas at Austin, TX, USA


According to our database1, Jiahui Liu authored at least 15 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
QMA vs QCMA and Pseudorandomness.
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025

Quantum One-Time Programs, Revisited.
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025

Quantum Key Leasing for PKE and FHE with a Classical Lessor.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2024
The Black-Box Simulation Barrier Persists in a Fully Quantum World.
IACR Cryptol. ePrint Arch., 2024

Composability in Watermarking Schemes.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Unclonable Secret Sharing.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Another Round of Breaking and Making Quantum Money: - How to Not Build It from Lattices, and More.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Collusion Resistant Copy-Protection for Watermarkable Functionalities.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Beating Classical Impossibility of Position Verification.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

2021
Secure Multiparty Computation in the Bounded Storage Model.
Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021

Hidden Cosets and Applications to Unclonable Cryptography.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

New Approaches for Quantum Copy-Protection.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Quantum Copy-Protection from Hidden Subspaces.
CoRR, 2020

2018
Mitigating the One-Use Restriction in Attribute-Based Encryption.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018


  Loading...