Research by Topics (DBLP)
Blockchain Techniques and
Consensus
Cryptography against Advanced
Attacks (Klepto, Leakage/Tampering, Coercion Attacks)
- Secure Computation against Kleptographic Attacks
Tuyet Duong, Alexander Russell, Qiang Tang, Hong-Sheng Zhou
Manuscript
- How to Make Hidden Triggers to Misfire
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
Manuscript
- Physical Aware Composability
Kai-Min Chung, Huijia Lin, Feng-Hao Liu, Rafael Pass,
Hong-Sheng Zhou
Manuscript
Secure Computation and
Universal Composability
Obfuscation, Functional
Encryption and More
- Multi-Input Functional Encryption
Shafi Goldwasser, Dov Gordon, Vipul Goyal, Abhishek Jain,
Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, Hong-Sheng
Zhou
EUROCRYPT 2014 -- Advances of Cryptology
Merge of [GKLSZ]
and [GGJS]
Quantum Resilient Cryptography
More Cryptography
- Hidden
Identity-Based Signatures
Aggelos Kiayias, Hong-Sheng Zhou
FC 2007 -- Financial Cryptography and Data Security
Journal version in IET Information Security, 3(3), pages
119-127, September 2009