Multi-input functional encryption S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ... Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014 | 431 | 2014 |
Fair and robust multi-party computation using a global transaction ledger A Kiayias, HS Zhou, V Zikas Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 209 | 2016 |
On the security of the “free-XOR” technique SG Choi, J Katz, R Kumaresan, HS Zhou Theory of Cryptography Conference, 39-53, 2012 | 119 | 2012 |
2-hop blockchain: Combining proof-of-work and proof-of-stake securely T Duong, L Fan, J Katz, P Thai, HS Zhou European Symposium on Research in Computer Security, 697-712, 2020 | 116* | 2020 |
Cliptography: Clipping the power of kleptographic attacks A Russell, Q Tang, M Yung, HS Zhou Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 115 | 2016 |
Twinscoin: A cryptocurrency via proof-of-work and proof-of-stake T Duong, A Chepurnoy, L Fan, HS Zhou Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and …, 2018 | 99 | 2018 |
Generic semantic security against a kleptographic adversary A Russell, Q Tang, M Yung, HS Zhou Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 81* | 2017 |
Cryptography for parallel RAM from indistinguishability obfuscation YC Chen, SSM Chow, KM Chung, RWF Lai, WK Lin, HS Zhou Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016 | 65* | 2016 |
Multi-client verifiable computation with stronger security guarantees SD Gordon, J Katz, FH Liu, E Shi, HS Zhou Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015 | 65 | 2015 |
Somewhat non-committing encryption and efficient adaptively secure oblivious transfer JA Garay, D Wichs, HS Zhou Annual International Cryptology Conference, 505-523, 2009 | 64 | 2009 |
Adaptively secure broadcast, revisited JA Garay, J Katz, R Kumaresan, HS Zhou Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of …, 2011 | 63 | 2011 |
Locally decodable and updatable non-malleable codes and their applications D Dachman-Soled, FH Liu, E Shi, HS Zhou Journal of Cryptology 33 (1), 319-355, 2020 | 60 | 2020 |
Concurrent blind signatures without random oracles A Kiayias, HS Zhou International Conference on Security and Cryptography for Networks, 49-62, 2006 | 57* | 2006 |
Designing proof of human-work puzzles for cryptocurrency and beyond J Blocki, HS Zhou Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016 | 55 | 2016 |
Multi-input functional encryption SD Gordon, J Katz, FH Liu, E Shi, HS Zhou Cryptology ePrint Archive, 2013 | 54 | 2013 |
Efficient, adaptively secure, and composable oblivious transfer with a single, global CRS SG Choi, J Katz, H Wee, HS Zhou Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013 | 50 | 2013 |
Statement voting B Zhang, HS Zhou Financial Cryptography and Data Security 2019, 2019 | 39* | 2019 |
Best-Possible Unpredictable Proof-of-Stake: An Impossibility and a Practical Design P Thai, L Fan, J Katz, HS Zhou https://eprint.iacr.org/2021/660, 2021 | 38* | 2021 |
Incoercible multi-party computation and universally composable receipt-free voting J Alwen, R Ostrovsky, HS Zhou, V Zikas Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 37 | 2015 |
Correcting subverted random oracles A Russell, Q Tang, M Yung, HS Zhou Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 36 | 2018 |