Search
International Association for Cryptologic Research
What's new
Archive
Paper awards
Videos
Authors
Coauthors
By year
By venue
All Committees
Most Committees
Report errors
About
Hong-Sheng Zhou
Search web for home page
Program Committees
1
2017
TCC
pc
2
2014
Asiacrypt
pc
3
2010
Asiacrypt
pc
Publications
year
title
booktitle
pages
1
2018
Correcting Subverted Random Oracles
crypto
241-271
2
2018
Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation
asiacrypt
575-606
3
2016
Fair and Robust Multi-party Computation Using a Global Transaction Ledger
eurocrypt
online
4
2016
Leakage-Resilient Public-Key Encryption from Obfuscation
pkc
online
5
2016
Cliptography: Clipping the Power of Kleptographic Attacks
asiacrypt
34-64
6
2016
Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond
tcc
517-546
7
2015
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
eprint
280
8
2015
Computation-Trace Indistinguishability Obfuscation and its Applications
eprint
406
9
2015
Fair and Robust Multi-Party Computation using a Global Transaction Ledger
eprint
574
10
2015
Feasibility and Completeness of Cryptographic Tasks in the Quantum World
eprint
385
11
2015
Cliptography: Clipping the Power of Kleptographic Attacks
eprint
online
12
2015
Multi-Client Verifiable Computation with Stronger Security Guarantees
eprint
142
13
2015
Functional Encryption from (Small) Hardwae Tokens
eprint
153
14
2015
Locally Decodable and Updatable Non-malleable Codes and Their Applications
tcc
online
15
2015
Multi-Client Verifiable Computation with Stronger Security Guarantees
tcc
online
16
2015
Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware
eurocrypt
online
17
2015
Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting
crypto
online
18
2014
Multi-input Functional Encryption
eurocrypt
online
19
2014
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
tcc
online
20
2014
Non-Interactive Cryptography in the RAM Model of Computation
eprint
154
21
2013
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
PKC
72
22
2013
Feasibility and Completeness of Cryptographic Tasks in the Quantum World
TCC
online
23
2013
Functional Encryption from (Small) Hardware Tokens
asiacrypt
online
24
2012
On the Security of the "Free-XOR" Technique
tcc
online
25
2009
Zero-Knowledge Proofs with Witness Elimination
pkc
124-138
26
2009
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer
crypto
online
27
2008
Equivocal Blind Signatures and Adaptive UC-Security
tcc
online
28
2008
Sound and Fine-grain Specification of Cryptographic Tasks
eprint
online
29
2008
Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer
eprint
online
30
2007
Equivocal Blind Signatures and Adaptive UC-Security
eprint
online
31
2007
Hidden Identity-Based Signatures
eprint
online
32
2005
Concurrent Blind Signatures without Random Oracles
eprint
online
Coauthors of Hong-Sheng Zhou
Joël Alwen (1)
Daniel Apon (1)
Jeremiah Blocki (1)
Yu-Chi Chen (1)
Yu Chen (1)
Seung Geol Choi (3)
Sherman S. M. Chow (1)
Kai-Min Chung (3)
Dana Dachman-Soled (3)
Xiong Fan (1)
Serge Fehr (2)
Juan A. Garay (3)
Shafi Goldwasser (1)
S. Dov Gordon (4)
Vipul Goyal (1)
Abhishek Jain (1)
Jonathan Katz (12)
Aggelos Kiayias (8)
Ranjit Kumaresan (1)
Russell W. F. Lai (1)
Wei-Kai Lin (1)
Feng-Hao Liu (7)
Adam O'Neill (1)
Rafail Ostrovsky (1)
Alexander Russell (3)
Amit Sahai (1)
Dominique Schröder (1)
Elaine Shi (5)
Fang Song (2)
Qiang Tang (3)
Aishwarya Thiruvengadam (1)
Yuyu Wang (1)
Hoeteck Wee (1)
Daniel Wichs (2)
Arkady Yerukhimovich (1)
Moti Yung (3)
Vassilis Zikas (5)