What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Hong-Sheng Zhou
Google Scholar
ORCID:
0000-0003-3534-6629
42
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/pkc
Single-Input Functionality Against a Dishonest Majority: Practical and Round-Optimal.
Zhelei Zhou
Bingsheng Zhang
Hong-Sheng Zhou
Kui Ren
2025
conf/eurosp
Best-Possible Unpredictable Proof-of-Stake: An Impossibility and a Practical Design.
Lei Fan
Jonathan Katz
Zhenghao Lu
Phuc Thai
Hong-Sheng Zhou
2024
conf/uss
Scalable Private Set Union, with Stronger Security.
Yanxue Jia
Shi-Feng Sun
Hong-Sheng Zhou
Dawu Gu
2024
conf/eurosp
Practical Constructions for Single Input Functionality Against a Dishonest Majority.
Zhelei Zhou
Bingsheng Zhang
Hong-Sheng Zhou
Kui Ren
2024
conf/asiacrypt
On the Complexity of Cryptographic Groups and Generic Group Models.
Keyu Ji
Cong Zhang
Taiyu Wang
Bingsheng Zhang
Hong-Sheng Zhou
Xin Wang
Kui Ren
2023
conf/eurocrypt
Endemic Oblivious Transfer via Random Oracles, Revisited.
Zhelei Zhou
Bingsheng Zhang
Hong-Sheng Zhou
Kui Ren
2022
conf/uss
Shuffle-based Private Set Union: Faster and More Secure.
Yanxue Jia
Shifeng Sun
Hong-Sheng Zhou
Jiajun Du
Dawu Gu
2022
conf/asiacrypt
GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility.
Zhelei Zhou
Bingsheng Zhang
Hong-Sheng Zhou
Kui Ren
2022
conf/asiacrypt
A Universally Composable Non-interactive Aggregate Cash System.
Yanxue Jia
Shifeng Sun
Hong-Sheng Zhou
Dawu Gu
2022
conf/asiacrypt
An Analysis of the Algebraic Group Model.
Cong Zhang
Hong-Sheng Zhou
Jonathan Katz
2021
conf/esorics
Succinct Scriptable NIZK via Trusted Hardware.
Bingsheng Zhang
Yuan Chen
Jiaqi Li
Yajin Zhou
Phuc Thai
Hong-Sheng Zhou
Kui Ren
2021
conf/esorics
Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation.
Yibiao Lu
Bingsheng Zhang
Hong-Sheng Zhou
Weiran Liu
Lei Zhang
Kui Ren
2020
journals/joc
Locally Decodable and Updatable Non-malleable Codes and Their Applications.
Dana Dachman-Soled
Feng-Hao Liu
Elaine Shi
Hong-Sheng Zhou
2020
conf/esorics
2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely.
Tuyet Duong
Lei Fan
Jonathan Katz
Phuc Thai
Hong-Sheng Zhou
2019
journals/joc
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
Seung Geol Choi
Jonathan Katz
Dominique Schröder
Arkady Yerukhimovich
Hong-Sheng Zhou
2019
journals/joc
Leakage Resilience from Program Obfuscation.
Dana Dachman-Soled
S. Dov Gordon
Feng-Hao Liu
Adam O'Neill
Hong-Sheng Zhou
2019
conf/fc
Statement Voting.
Bingsheng Zhang
Hong-Sheng Zhou
2019
conf/pkc
Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog.
Sherman S. M. Chow
Alexander Russell
Qiang Tang
Moti Yung
Yongjun Zhao
Hong-Sheng Zhou
2018
conf/ccs
TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake.
Tuyet Duong
Alexander Chepurnoy
Lei Fan
Hong-Sheng Zhou
2018
conf/ccs
Multi-mode Cryptocurrency Systems.
Tuyet Duong
Alexander Chepurnoy
Hong-Sheng Zhou
2018
conf/crypto
Correcting Subverted Random Oracles.
Alexander Russell
Qiang Tang
Moti Yung
Hong-Sheng Zhou
2018
conf/asiacrypt
Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation.
Yu Chen
Yuyu Wang
Hong-Sheng Zhou
2017
conf/ccs
Generic Semantic Security against a Kleptographic Adversary.
Alexander Russell
Qiang Tang
Moti Yung
Hong-Sheng Zhou
2016
conf/pkc
Leakage-Resilient Public-Key Encryption from Obfuscation.
Dana Dachman-Soled
S. Dov Gordon
Feng-Hao Liu
Adam O'Neill
Hong-Sheng Zhou
2016
conf/eurocrypt
Fair and Robust Multi-party Computation Using a Global Transaction Ledger.
Aggelos Kiayias
Hong-Sheng Zhou
Vassilis Zikas
2016
conf/asiacrypt
Cliptography: Clipping the Power of Kleptographic Attacks.
Alexander Russell
Qiang Tang
Moti Yung
Hong-Sheng Zhou
2016
conf/tcc
Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond.
Jeremiah Blocki
Hong-Sheng Zhou
2015
conf/crypto
Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting.
Joël Alwen
Rafail Ostrovsky
Hong-Sheng Zhou
Vassilis Zikas
2015
conf/eurocrypt
Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware.
Dana Dachman-Soled
Feng-Hao Liu
Hong-Sheng Zhou
2015
conf/tcc
Multi-Client Verifiable Computation with Stronger Security Guarantees.
S. Dov Gordon
Jonathan Katz
Feng-Hao Liu
Elaine Shi
Hong-Sheng Zhou
2015
conf/tcc
Locally Decodable and Updatable Non-malleable Codes and Their Applications.
Dana Dachman-Soled
Feng-Hao Liu
Elaine Shi
Hong-Sheng Zhou
2014
conf/eurocrypt
Multi-input Functional Encryption.
Shafi Goldwasser
S. Dov Gordon
Vipul Goyal
Abhishek Jain
Jonathan Katz
Feng-Hao Liu
Amit Sahai
Elaine Shi
Hong-Sheng Zhou
2014
conf/tcc
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
Seung Geol Choi
Jonathan Katz
Dominique Schröder
Arkady Yerukhimovich
Hong-Sheng Zhou
2013
conf/pkc
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.
Seung Geol Choi
Jonathan Katz
Hoeteck Wee
Hong-Sheng Zhou
2013
conf/pkc
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.
Jonathan Katz
Aishwarya Thiruvengadam
Hong-Sheng Zhou
2013
conf/asiacrypt
Functional Encryption from (Small) Hardware Tokens.
Kai-Min Chung
Jonathan Katz
Hong-Sheng Zhou
2013
conf/tcc
Feasibility and Completeness of Cryptographic Tasks in the Quantum World.
Serge Fehr
Jonathan Katz
Fang Song
Hong-Sheng Zhou
Vassilis Zikas
2012
conf/tcc
On the Security of the "Free-XOR" Technique.
Seung Geol Choi
Jonathan Katz
Ranjit Kumaresan
Hong-Sheng Zhou
2009
conf/crypto
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer.
Juan A. Garay
Daniel Wichs
Hong-Sheng Zhou
2009
conf/pkc
Zero-Knowledge Proofs with Witness Elimination.
Aggelos Kiayias
Hong-Sheng Zhou
2008
conf/tcc
Equivocal Blind Signatures and Adaptive UC-Security.
Aggelos Kiayias
Hong-Sheng Zhou
2007
conf/fc
Hidden Identity-Based Signatures.
Aggelos Kiayias
Hong-Sheng Zhou
Coauthors
Abhishek Jain
(1)
Adam O'Neill
(2)
Aggelos Kiayias
(4)
Aishwarya Thiruvengadam
(1)
Alexander Chepurnoy
(2)
Alexander Russell
(4)
Amit Sahai
(1)
Arkady Yerukhimovich
(2)
Bingsheng Zhang
(8)
Cong Zhang
(2)
Dana Dachman-Soled
(5)
Daniel Wichs
(1)
Dawu Gu
(3)
Dominique Schröder
(2)
Elaine Shi
(4)
Fang Song
(1)
Feng-Hao Liu
(7)
Hoeteck Wee
(1)
Hong-Sheng Zhou
(42)
Jeremiah Blocki
(1)
Jiajun Du
(1)
Jiaqi Li
(1)
Joël Alwen
(1)
Jonathan Katz
(12)
Juan A. Garay
(1)
Kai-Min Chung
(1)
Keyu Ji
(1)
Kui Ren
(7)
Lei Fan
(3)
Lei Zhang
(1)
Moti Yung
(4)
Phuc Thai
(3)
Qiang Tang
(4)
Rafail Ostrovsky
(1)
Ranjit Kumaresan
(1)
S. Dov Gordon
(4)
Serge Fehr
(1)
Seung Geol Choi
(4)
Shafi Goldwasser
(1)
Sherman S. M. Chow
(1)
Shi-Feng Sun
(1)
Shifeng Sun
(2)
Taiyu Wang
(1)
Tuyet Duong
(3)
Vassilis Zikas
(3)
Vipul Goyal
(1)
Weiran Liu
(1)
Xin Wang
(1)
Yajin Zhou
(1)
Yanxue Jia
(3)
Yibiao Lu
(1)
Yongjun Zhao
(1)
Yu Chen
(1)
Yuan Chen
(1)
Yuyu Wang
(1)
Zhelei Zhou
(4)
Zhenghao Lu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to