Mohammad Hajiabadi

According to our database1, Mohammad Hajiabadi authored at least 32 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Minicrypt PRFs Do Not Admit Black-Box Oblivious Evaluations.
IACR Cryptol. ePrint Arch., 2025

A Framework for Witness Encryption from Linearly Verifiable SNARKs and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
On the Black-Box Complexity of Private-Key Inner-Product Functional Encryption.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Laconic Branching Programs from the Diffie-Hellman Assumption.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

Lower-Bounds on Public-Key Operations in PIR.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2023
Lower Bounds on Assumptions Behind Registration-Based Encryption.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Credibility in Private Set Membership.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Randomness Recoverable Secret Sharing Schemes.
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023

2022
On the Worst-Case Inefficiency of CGKA.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Algebraic Restriction Codes and Their Applications.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

2021
Amortizing Rate-1 OT and Applications to PIR and PSI.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Laconic Private Set Intersection and Applications.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Compact Ring Signatures from Learning with Errors.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

How to Build a Trapdoor Function from an Encryption Scheme.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Master-Key KDM-Secure IBE from Pairings.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Two-Round Oblivious Transfer from CDH or LPN.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Registration-Based Encryption from Standard Assumptions.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

New Techniques for Efficient Trapdoor Functions and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Rate-1 Trapdoor Functions from the Diffie-Hellman Problem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Enhancements are Blackbox Non-trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Registration-Based Encryption: Removing Private-Key Generator from IBE.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Limits on the Power of Garbling Techniques for Public-Key Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Trapdoor Functions from the Computational Diffie-Hellman Assumption.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Encryption security against key-dependent-message attacks: applications, realizations and separations.
PhD thesis, 2016

On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

2015
Gambling, Computational Information and Encryption Security.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015

Reproducible Circularly-Secure Bit Encryption: Applications and Realizations.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2013
Computational Soundness of Coinductive Symbolic Security under Active Attacks.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013


  Loading...