Follow
Hong-Sheng Zhou
Title
Cited by
Cited by
Year
Multi-input functional encryption
S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ...
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
4462014
Fair and robust multi-party computation using a global transaction ledger
A Kiayias, HS Zhou, V Zikas
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
2152016
On the security of the “free-XOR” technique
SG Choi, J Katz, R Kumaresan, HS Zhou
Theory of Cryptography Conference, 39-53, 2012
1232012
2-hop blockchain: Combining proof-of-work and proof-of-stake securely
T Duong, L Fan, J Katz, P Thai, HS Zhou
European Symposium on Research in Computer Security, 697-712, 2020
118*2020
Cliptography: Clipping the power of kleptographic attacks
A Russell, Q Tang, M Yung, HS Zhou
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
1182016
Twinscoin: A cryptocurrency via proof-of-work and proof-of-stake
T Duong, A Chepurnoy, L Fan, HS Zhou
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and …, 2018
1052018
Generic semantic security against a kleptographic adversary
A Russell, Q Tang, M Yung, HS Zhou
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
84*2017
Multi-client verifiable computation with stronger security guarantees
SD Gordon, J Katz, FH Liu, E Shi, HS Zhou
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
682015
Adaptively secure broadcast, revisited
JA Garay, J Katz, R Kumaresan, HS Zhou
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of …, 2011
672011
Cryptography for parallel RAM from indistinguishability obfuscation
YC Chen, SSM Chow, KM Chung, RWF Lai, WK Lin, HS Zhou
Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016
66*2016
Somewhat non-committing encryption and efficient adaptively secure oblivious transfer
JA Garay, D Wichs, HS Zhou
Annual International Cryptology Conference, 505-523, 2009
642009
Locally decodable and updatable non-malleable codes and their applications
D Dachman-Soled, FH Liu, E Shi, HS Zhou
Journal of Cryptology 33 (1), 319-355, 2020
612020
Designing proof of human-work puzzles for cryptocurrency and beyond
J Blocki, HS Zhou
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
592016
Concurrent blind signatures without random oracles
A Kiayias, HS Zhou
International Conference on Security and Cryptography for Networks, 49-62, 2006
57*2006
Multi-input functional encryption
SD Gordon, J Katz, FH Liu, E Shi, HS Zhou
Cryptology ePrint Archive, 2013
542013
Efficient, adaptively secure, and composable oblivious transfer with a single, global CRS
SG Choi, J Katz, H Wee, HS Zhou
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
502013
Statement voting
B Zhang, HS Zhou
Financial Cryptography and Data Security 2019, 2019
40*2019
Shuffle-based Private Set Union: Faster and More Secure
Y Jia, SF Sun, HS Zhou, J Du, D Gu
31st USENIX Security Symposium (USENIX Security 22) 2022, 2947--2964, 2022
382022
Best-Possible Unpredictable Proof-of-Stake: An Impossibility and a Practical Design
P Thai, L Fan, J Katz, HS Zhou
https://eprint.iacr.org/2021/660, 2021
38*2021
Correcting subverted random oracles
A Russell, Q Tang, M Yung, HS Zhou
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
382018
The system can't perform the operation now. Try again later.
Articles 1–20