BibTeX records: Huijia Lin

download as .bib file

@article{DBLP:journals/cacm/JainLS24,
  author       = {Aayush Jain and
                  Huijia Lin and
                  Amit Sahai},
  title        = {Indistinguishability Obfuscation from Well-Founded Assumptions},
  journal      = {Commun. {ACM}},
  volume       = {67},
  number       = {3},
  pages        = {97--105},
  year         = {2024},
  url          = {https://doi.org/10.1145/3611095},
  doi          = {10.1145/3611095},
  timestamp    = {Sat, 23 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/JainLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LiLPT23,
  author       = {Hanjun Li and
                  Huijia Lin and
                  Antigoni Polychroniadou and
                  Stefano Tessaro},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {{LERNA:} Secure Single-Server Aggregation via Key-Homomorphic Masking},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14438},
  pages        = {302--334},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8721-4\_10},
  doi          = {10.1007/978-981-99-8721-4\_10},
  timestamp    = {Sun, 07 Jan 2024 14:24:23 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LiLPT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colt/DworkLLT23,
  author       = {Cynthia Dwork and
                  Daniel Lee and
                  Huijia Lin and
                  Pranay Tankala},
  editor       = {Gergely Neu and
                  Lorenzo Rosasco},
  title        = {From Pseudorandomness to Multi-Group Fairness and Back},
  booktitle    = {The Thirty Sixth Annual Conference on Learning Theory, {COLT} 2023,
                  12-15 July 2023, Bangalore, India},
  series       = {Proceedings of Machine Learning Research},
  volume       = {195},
  pages        = {3566--3614},
  publisher    = {{PMLR}},
  year         = {2023},
  url          = {https://proceedings.mlr.press/v195/dwork23a.html},
  timestamp    = {Wed, 06 Sep 2023 17:49:05 +0200},
  biburl       = {https://dblp.org/rec/conf/colt/DworkLLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JainLLW23,
  author       = {Aayush Jain and
                  Huijia Lin and
                  Ji Luo and
                  Daniel Wichs},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {The Pseudorandom Oracle Model and Ideal Obfuscation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {233--262},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_8},
  doi          = {10.1007/978-3-031-38551-3\_8},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JainLLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DaoIJL23,
  author       = {Quang Dao and
                  Yuval Ishai and
                  Aayush Jain and
                  Huijia Lin},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Multi-party Homomorphic Secret Sharing and Sublinear {MPC} from Sparse
                  {LPN}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {315--348},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_11},
  doi          = {10.1007/978-3-031-38545-2\_11},
  timestamp    = {Mon, 14 Aug 2023 16:16:25 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DaoIJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BallLLL23,
  author       = {Marshall Ball and
                  Hanjun Li and
                  Huijia Lin and
                  Tianren Liu},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {New Ways to Garble Arithmetic Circuits},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14005},
  pages        = {3--34},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30617-4\_1},
  doi          = {10.1007/978-3-031-30617-4\_1},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BallLLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JainLLS23,
  author       = {Aayush Jain and
                  Huijia Lin and
                  Paul Lou and
                  Amit Sahai},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption
                  for Post-quantum i{\unicode{54442}}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14004},
  pages        = {205--235},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30545-0\_8},
  doi          = {10.1007/978-3-031-30545-0\_8},
  timestamp    = {Thu, 20 Apr 2023 11:35:01 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JainLLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JainLL23,
  author       = {Aayush Jain and
                  Huijia Lin and
                  Ji Luo},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {On the Optimal Succinctness and Efficiency of Functional Encryption
                  and Attribute-Based Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14006},
  pages        = {479--510},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30620-4\_16},
  doi          = {10.1007/978-3-031-30620-4\_16},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JainLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/HsiehLL23,
  author       = {Yao{-}Ching Hsieh and
                  Huijia Lin and
                  Ji Luo},
  title        = {Attribute-Based Encryption for Circuits of Unbounded Depth from Lattices},
  booktitle    = {64th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2023, Santa Cruz, CA, USA, November 6-9, 2023},
  pages        = {415--434},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/FOCS57990.2023.00031},
  doi          = {10.1109/FOCS57990.2023.00031},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/HsiehLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-08837,
  author       = {Cynthia Dwork and
                  Daniel Lee and
                  Huijia Lin and
                  Pranay Tankala},
  title        = {New Insights into Multi-Calibration},
  journal      = {CoRR},
  volume       = {abs/2301.08837},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.08837},
  doi          = {10.48550/ARXIV.2301.08837},
  eprinttype    = {arXiv},
  eprint       = {2301.08837},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-08837.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallLLL23,
  author       = {Marshall Ball and
                  Hanjun Li and
                  Huijia Lin and
                  Tianren Liu},
  title        = {New Ways to Garble Arithmetic Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {501},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/501},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallLLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaoIJL23,
  author       = {Quang Dao and
                  Yuval Ishai and
                  Aayush Jain and
                  Huijia Lin},
  title        = {Multi-Party Homomorphic Secret Sharing and Sublinear {MPC} from Sparse
                  {LPN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1593},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1593},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DaoIJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HsiehLL23,
  author       = {Yao{-}Ching Hsieh and
                  Huijia Lin and
                  Ji Luo},
  title        = {Attribute-Based Encryption for Circuits of Unbounded Depth from Lattices:
                  Garbled Circuits of Optimal Size, Laconic Functional Evaluation, and
                  More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1716},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1716},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HsiehLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLPT23,
  author       = {Hanjun Li and
                  Huijia Lin and
                  Antigoni Polychroniadou and
                  Stefano Tessaro},
  title        = {{LERNA:} Secure Single-Server Aggregation via Key-Homomorphic Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1936},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1936},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLPT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LinL22,
  author       = {Huijia Lin and
                  Tianren Liu},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Two-Round {MPC} Without Round Collapsing Revisited - Towards Efficient
                  Malicious Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {353--382},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_13},
  doi          = {10.1007/978-3-031-15802-5\_13},
  timestamp    = {Wed, 19 Oct 2022 17:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LinL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BitanskyLS22,
  author       = {Nir Bitansky and
                  Huijia Lin and
                  Omri Shmueli},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Non-malleable Commitments Against Quantum Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13277},
  pages        = {519--550},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07082-2\_19},
  doi          = {10.1007/978-3-031-07082-2\_19},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BitanskyLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JainLS22,
  author       = {Aayush Jain and
                  Huijia Lin and
                  Amit Sahai},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Indistinguishability Obfuscation from {LPN} over {\textdollar}{\textbackslash}mathbb
                  \{F\}{\_}p{\textdollar}, DLIN, and PRGs in NC\({}^{\mbox{0}}\)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13275},
  pages        = {670--699},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06944-4\_23},
  doi          = {10.1007/978-3-031-06944-4\_23},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JainLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LiLL22,
  author       = {Hanjun Li and
                  Huijia Lin and
                  Ji Luo},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {{ABE} for Circuits with Constant-Size Secret Keys and Adaptive Security},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13747},
  pages        = {680--710},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22318-1\_24},
  doi          = {10.1007/978-3-031-22318-1\_24},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/LiLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MaiyyaISAALTZ22,
  author       = {Sujaya Maiyya and
                  Seif Ibrahim and
                  Caitlin Scarberry and
                  Divyakant Agrawal and
                  Amr El Abbadi and
                  Huijia Lin and
                  Stefano Tessaro and
                  Victor Zakhary},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {QuORAM: {A} Quorum-Replicated Fault Tolerant {ORAM} Datastore},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3665--3682},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/maiyya},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/MaiyyaISAALTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLL22,
  author       = {Hanjun Li and
                  Huijia Lin and
                  Ji Luo},
  title        = {{ABE} for Circuits with Constant-Size Secret Keys and Adaptive Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {659},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/659},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaiyyaISAALTZ22,
  author       = {Sujaya Maiyya and
                  Seif Ibrahim and
                  Caitlin Scarberry and
                  Divyakant Agrawal and
                  Amr El Abbadi and
                  Huijia Lin and
                  Stefano Tessaro and
                  Victor Zakhary},
  title        = {QuORAM: {A} Quorum-Replicated Fault Tolerant {ORAM} Datastore},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {691},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/691},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaiyyaISAALTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinL22,
  author       = {Huijia Lin and
                  Tianren Liu},
  title        = {Two-Round {MPC} without Round Collapsing Revisited - Towards Efficient
                  Malicious Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {944},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/944},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JainL0W22,
  author       = {Aayush Jain and
                  Huijia Lin and
                  Ji Luo and
                  Daniel Wichs},
  title        = {The Pseudorandom Oracle Model and Ideal Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1204},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1204},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JainL0W22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JainLL22,
  author       = {Aayush Jain and
                  Huijia Lin and
                  Ji Luo},
  title        = {On the Optimal Succinctness and Efficiency of Functional Encryption
                  and Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1317},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1317},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JainLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JainLLS22,
  author       = {Aayush Jain and
                  Huijia Lin and
                  Paul Lou and
                  Amit Sahai},
  title        = {Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption
                  for Post-Quantum i{\unicode{54442}}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1637},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1637},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JainLLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HopkinsJL21,
  author       = {Samuel B. Hopkins and
                  Aayush Jain and
                  Huijia Lin},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Counterexamples to New Circular Security Assumptions Underlying iO},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {673--700},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_23},
  doi          = {10.1007/978-3-030-84245-1\_23},
  timestamp    = {Mon, 16 Aug 2021 09:08:14 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HopkinsJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GayJLS21,
  author       = {Romain Gay and
                  Aayush Jain and
                  Huijia Lin and
                  Amit Sahai},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Indistinguishability Obfuscation from Simple-to-State Hard Problems:
                  New Assumptions, New Techniques, and Simplification},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12698},
  pages        = {97--126},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77883-5\_4},
  doi          = {10.1007/978-3-030-77883-5\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GayJLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GriloL0V21,
  author       = {Alex B. Grilo and
                  Huijia Lin and
                  Fang Song and
                  Vinod Vaikuntanathan},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Oblivious Transfer Is in MiniQCrypt},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12697},
  pages        = {531--561},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77886-6\_18},
  doi          = {10.1007/978-3-030-77886-6\_18},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GriloL0V21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Benhamouda0KL21,
  author       = {Fabrice Benhamouda and
                  Aayush Jain and
                  Ilan Komargodski and
                  Huijia Lin},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Multiparty Reusable Non-interactive Secure Computation from {LWE}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12697},
  pages        = {724--753},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77886-6\_25},
  doi          = {10.1007/978-3-030-77886-6\_25},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Benhamouda0KL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/Lin21,
  author       = {Huijia (Rachel) Lin},
  editor       = {Mikolaj Bojanczyk and
                  Chandra Chekuri},
  title        = {Indistinguishability Obfuscation from Well-Founded Assumptions (Invited
                  Talk)},
  booktitle    = {41st {IARCS} Annual Conference on Foundations of Software Technology
                  and Theoretical Computer Science, {FSTTCS} 2021, December 15-17, 2021,
                  Virtual Conference},
  series       = {LIPIcs},
  volume       = {213},
  pages        = {4:1--4:1},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2021},
  url          = {https://doi.org/10.4230/LIPIcs.FSTTCS.2021.4},
  doi          = {10.4230/LIPICS.FSTTCS.2021.4},
  timestamp    = {Tue, 30 Nov 2021 13:59:34 +0100},
  biburl       = {https://dblp.org/rec/conf/fsttcs/Lin21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/JainLS21,
  author       = {Aayush Jain and
                  Huijia Lin and
                  Amit Sahai},
  editor       = {Samir Khuller and
                  Virginia Vassilevska Williams},
  title        = {Indistinguishability obfuscation from well-founded assumptions},
  booktitle    = {{STOC} '21: 53rd Annual {ACM} {SIGACT} Symposium on Theory of Computing,
                  Virtual Event, Italy, June 21-25, 2021},
  pages        = {60--73},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3406325.3451093},
  doi          = {10.1145/3406325.3451093},
  timestamp    = {Tue, 22 Jun 2021 19:47:11 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/JainLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaJKL21,
  author       = {Fabrice Benhamouda and
                  Aayush Jain and
                  Ilan Komargodski and
                  Huijia Lin},
  title        = {Multiparty Reusable Non-Interactive Secure Computation from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {378},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/378},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaJKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HopkinsJL21,
  author       = {Samuel B. Hopkins and
                  Aayush Jain and
                  Huijia Lin},
  title        = {Counterexamples to New Circular Security Assumptions Underlying iO},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {889},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/889},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HopkinsJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyLS21,
  author       = {Nir Bitansky and
                  Huijia Lin and
                  Omri Shmueli},
  title        = {Non-malleable Commitments against Quantum Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {920},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/920},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JainLS21,
  author       = {Aayush Jain and
                  Huijia Lin and
                  Amit Sahai},
  title        = {Indistinguishability Obfuscation from {LPN} over F{\_}p, DLIN, and
                  PRGs in NC{\^{}}0},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1334},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1334},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JainLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/LinPS20,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Pratik Soni},
  title        = {Two-Round and Non-Interactive Concurrent Non-Malleable Commitments
                  from Time-Lock Puzzles},
  journal      = {{SIAM} J. Comput.},
  volume       = {49},
  number       = {4},
  year         = {2020},
  url          = {https://doi.org/10.1137/17M1163177},
  doi          = {10.1137/17M1163177},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/LinPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Lin020,
  author       = {Huijia Lin and
                  Ji Luo},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Succinct and Adaptively Secure {ABE} for {ABP} from k-Lin},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12493},
  pages        = {437--466},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64840-4\_15},
  doi          = {10.1007/978-3-030-64840-4\_15},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Lin020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LinL20,
  author       = {Huijia Lin and
                  Ji Luo},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Compact Adaptively Secure {ABE} from k-Lin: Beyond NC\({}^{\mbox{1}}\)
                  and Towards {NL}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12107},
  pages        = {247--277},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45727-3\_9},
  doi          = {10.1007/978-3-030-45727-3\_9},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LinL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BenhamoudaL20,
  author       = {Fabrice Benhamouda and
                  Huijia Lin},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Mr {NISC:} Multiparty Reusable Non-Interactive Secure Computation},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12551},
  pages        = {349--378},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64378-2\_13},
  doi          = {10.1007/978-3-030-64378-2\_13},
  timestamp    = {Tue, 15 Dec 2020 12:01:12 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BenhamoudaL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LinLW20,
  author       = {Huijia Lin and
                  Tianren Liu and
                  Hoeteck Wee},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Information-Theoretic 2-Round {MPC} Without Round Collapsing: Adaptive
                  Security, and More},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12551},
  pages        = {502--531},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64378-2\_18},
  doi          = {10.1007/978-3-030-64378-2\_18},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/LinLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-09317,
  author       = {Aayush Jain and
                  Huijia Lin and
                  Amit Sahai},
  title        = {Indistinguishability Obfuscation from Well-Founded Assumptions},
  journal      = {CoRR},
  volume       = {abs/2008.09317},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.09317},
  eprinttype    = {arXiv},
  eprint       = {2008.09317},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-09317.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-14980,
  author       = {Alex B. Grilo and
                  Huijia Lin and
                  Fang Song and
                  Vinod Vaikuntanathan},
  title        = {Oblivious Transfer is in MiniQCrypt},
  journal      = {CoRR},
  volume       = {abs/2011.14980},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.14980},
  eprinttype    = {arXiv},
  eprint       = {2011.14980},
  timestamp    = {Mon, 07 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-14980.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/JainLS20,
  author       = {Aayush Jain and
                  Huijia Lin and
                  Amit Sahai},
  title        = {Indistinguishability Obfuscation from Well-Founded Assumptions},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR20-126}},
  year         = {2020},
  url          = {https://eccc.weizmann.ac.il/report/2020/126},
  eprinttype    = {ECCC},
  eprint       = {TR20-126},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/JainLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaL20,
  author       = {Fabrice Benhamouda and
                  Huijia Lin},
  title        = {Multiparty Reusable Non-Interactive Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinL20,
  author       = {Huijia Lin and
                  Ji Luo},
  title        = {Compact Adaptively Secure {ABE} from k-Lin: Beyond {NC1} and towards
                  {NL}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {318},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/318},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GayJLS20,
  author       = {Romain Gay and
                  Aayush Jain and
                  Huijia Lin and
                  Amit Sahai},
  title        = {Indistinguishability Obfuscation from Simple-to-State Hard Problems:
                  New Assumptions, New Techniques, and Simplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {764},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/764},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GayJLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JainLS20,
  author       = {Aayush Jain and
                  Huijia Lin and
                  Amit Sahai},
  title        = {Indistinguishability Obfuscation from Well-Founded Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1003},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1003},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JainLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinL20b,
  author       = {Huijia Lin and
                  Ji Luo},
  title        = {Succinct and Adaptively Secure {ABE} for Arithmetic Branching Programs
                  from k-Lin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1139},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1139},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinL20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinLW20,
  author       = {Huijia Lin and
                  Tianren Liu and
                  Hoeteck Wee},
  title        = {Information-Theoretic 2-Round {MPC} without Round Collapsing: Adaptive
                  Security, and More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1431},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1431},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LinLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GriloLSV20,
  author       = {Alex B. Grilo and
                  Huijia Lin and
                  Fang Song and
                  Vinod Vaikuntanathan},
  title        = {Oblivious Transfer is in MiniQCrypt},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1500},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1500},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GriloLSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AnanthJL0S19,
  author       = {Prabhanjan Ananth and
                  Aayush Jain and
                  Huijia Lin and
                  Christian Matt and
                  Amit Sahai},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms
                  via Low Degree Weak Pseudorandomness and Security Amplification},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {284--332},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_10},
  doi          = {10.1007/978-3-030-26954-8\_10},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AnanthJL0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JainL0S19,
  author       = {Aayush Jain and
                  Huijia Lin and
                  Christian Matt and
                  Amit Sahai},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {How to Leverage Hardness of Constant-Degree Expanding Polynomials
                  over {\textbackslash}mathbb {R} {R} to build i{\unicode{54442}} i
                  {O}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11476},
  pages        = {251--281},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17653-2\_9},
  doi          = {10.1007/978-3-030-17653-2\_9},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JainL0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BallDKLM19,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Huijia Lin and
                  Tal Malkin},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Non-Malleable Codes Against Bounded Polynomial Time Tampering},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11476},
  pages        = {501--530},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17653-2\_17},
  doi          = {10.1007/978-3-030-17653-2\_17},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BallDKLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthJL0S19,
  author       = {Prabhanjan Ananth and
                  Aayush Jain and
                  Huijia Lin and
                  Christian Matt and
                  Amit Sahai},
  title        = {Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms
                  via Low Degree Weak Pseudorandomness and Security Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {643},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/643},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthJL0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JainLMS19,
  author       = {Aayush Jain and
                  Huijia Lin and
                  Christian Matt and
                  Amit Sahai},
  title        = {How to leverage hardness of constant degree expanding polynomials
                  over {R} to build iO},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1030},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JainLMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JainLS19,
  author       = {Aayush Jain and
                  Huijia Lin and
                  Amit Sahai},
  title        = {Simplifying Constructions and Assumptions for i{\unicode{54442}}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1252},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1252},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JainLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/BitanskyCGHJLPT18,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Sanjam Garg and
                  Justin Holmgren and
                  Abhishek Jain and
                  Huijia Lin and
                  Rafael Pass and
                  Sidharth Telang and
                  Vinod Vaikuntanathan},
  title        = {Indistinguishability Obfuscation for {RAM} Programs and Succinct Randomized
                  Encodings},
  journal      = {{SIAM} J. Comput.},
  volume       = {47},
  number       = {3},
  pages        = {1123--1210},
  year         = {2018},
  url          = {https://doi.org/10.1137/15M1050963},
  doi          = {10.1137/15M1050963},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/BitanskyCGHJLPT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/ZakharySALT18,
  author       = {Victor Zakhary and
                  Cetin Sahin and
                  Amr El Abbadi and
                  Huijia Lin and
                  Stefano Tessaro},
  editor       = {Michael H. B{\"{o}}hlen and
                  Reinhard Pichler and
                  Norman May and
                  Erhard Rahm and
                  Shan{-}Hung Wu and
                  Katja Hose},
  title        = {Pharos: Privacy Hazards of Replicating {ORAM} Stores},
  booktitle    = {Proceedings of the 21st International Conference on Extending Database
                  Technology, {EDBT} 2018, Vienna, Austria, March 26-29, 2018},
  pages        = {702--705},
  publisher    = {OpenProceedings.org},
  year         = {2018},
  url          = {https://doi.org/10.5441/002/edbt.2018.89},
  doi          = {10.5441/002/EDBT.2018.89},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edbt/ZakharySALT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BenhamoudaL18,
  author       = {Fabrice Benhamouda and
                  Huijia Lin},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {k-Round Multiparty Computation from k-Round Oblivious Transfer via
                  Garbled Interactive Circuits},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10821},
  pages        = {500--532},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78375-8\_17},
  doi          = {10.1007/978-3-319-78375-8\_17},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BenhamoudaL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BoyleGILT18,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Huijia Lin and
                  Stefano Tessaro},
  editor       = {Anna R. Karlin},
  title        = {Foundations of Homomorphic Secret Sharing},
  booktitle    = {9th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2018, January 11-14, 2018, Cambridge, MA, {USA}},
  series       = {LIPIcs},
  volume       = {94},
  pages        = {21:1--21:21},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2018},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2018.21},
  doi          = {10.4230/LIPICS.ITCS.2018.21},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/BoyleGILT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BenhamoudaLPV18,
  author       = {Fabrice Benhamouda and
                  Huijia Lin and
                  Antigoni Polychroniadou and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {175--205},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_7},
  doi          = {10.1007/978-3-030-03807-6\_7},
  timestamp    = {Sat, 09 Apr 2022 12:44:08 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BenhamoudaLPV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BitanskyL18,
  author       = {Nir Bitansky and
                  Huijia Lin},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {One-Message Zero Knowledge and Non-malleable Commitments},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {209--234},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_8},
  doi          = {10.1007/978-3-030-03807-6\_8},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BitanskyL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyL18,
  author       = {Nir Bitansky and
                  Huijia Lin},
  title        = {One-Message Zero Knowledge and Non-Malleable Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {613},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/613},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinM18,
  author       = {Huijia Lin and
                  Christian Matt},
  title        = {Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability
                  Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {646},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/646},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDKLM18,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Huijia Lin and
                  Tal Malkin},
  title        = {Non-Malleable Codes Against Bounded Polynomial Time Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1015},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1015},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDKLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BitanskyCCGLRT17,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Alessandro Chiesa and
                  Shafi Goldwasser and
                  Huijia Lin and
                  Aviad Rubinstein and
                  Eran Tromer},
  title        = {The Hunting of the {SNARK}},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {4},
  pages        = {989--1066},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-016-9241-9},
  doi          = {10.1007/S00145-016-9241-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BitanskyCCGLRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Lin17,
  author       = {Huijia Lin},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Indistinguishability Obfuscation from {SXDH} on 5-Linear Maps and
                  Locality-5 PRGs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {599--629},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_20},
  doi          = {10.1007/978-3-319-63688-7\_20},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Lin17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LinT17,
  author       = {Huijia Lin and
                  Stefano Tessaro},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Indistinguishability Obfuscation from Trilinear Maps and Block-Wise
                  Local PRGs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {630--660},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_21},
  doi          = {10.1007/978-3-319-63688-7\_21},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LinT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BitanskyLP17,
  author       = {Nir Bitansky and
                  Huijia Lin and
                  Omer Paneth},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {On Removing Graded Encodings from Functional Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10211},
  pages        = {3--29},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56614-6\_1},
  doi          = {10.1007/978-3-319-56614-6\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BitanskyLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/LinPS17,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Pratik Soni},
  editor       = {Chris Umans},
  title        = {Two-Round and Non-Interactive Concurrent Non-Malleable Commitments
                  from Time-Lock Puzzles},
  booktitle    = {58th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2017, Berkeley, CA, USA, October 15-17, 2017},
  pages        = {576--587},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/FOCS.2017.59},
  doi          = {10.1109/FOCS.2017.59},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/focs/LinPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/SahinMZALT17,
  author       = {Cetin Sahin and
                  Aaron Magat and
                  Victor Zakhary and
                  Amr El Abbadi and
                  Huijia (Rachel) Lin and
                  Stefano Tessaro},
  title        = {Understanding the Security Challenges of Oblivious Cloud Storage with
                  Asynchronous Accesses},
  booktitle    = {33rd {IEEE} International Conference on Data Engineering, {ICDE} 2017,
                  San Diego, CA, USA, April 19-22, 2017},
  pages        = {1377--1378},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDE.2017.185},
  doi          = {10.1109/ICDE.2017.185},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/SahinMZALT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KiyoshimaLV17,
  author       = {Susumu Kiyoshima and
                  Huijia Lin and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {A Unified Approach to Constructing Black-Box {UC} Protocols in Trusted
                  Setup Models},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {776--809},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_26},
  doi          = {10.1007/978-3-319-70500-2\_26},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KiyoshimaLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinT17,
  author       = {Huijia Lin and
                  Stefano Tessaro},
  title        = {Indistinguishability Obfuscation from Bilinear Maps and Block-Wise
                  Local PRGs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinPS17,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Pratik Soni},
  title        = {Two-Round Concurrent Non-Malleable Commitment from Time-Lock Puzzles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {273},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/273},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiyoshimaLV17,
  author       = {Susumu Kiyoshima and
                  Huijia Lin and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {A Unified Approach to Constructing Black-box {UC} Protocols in Trusted
                  Setup Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {944},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/944},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiyoshimaLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaL17,
  author       = {Fabrice Benhamouda and
                  Huijia Lin},
  title        = {k-Round {MPC} from k-Round {OT} via Garbled Interactive Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1125},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGILT17,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Huijia Lin and
                  Stefano Tessaro},
  title        = {Foundations of Homomorphic Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1248},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGILT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/CanettiLP16,
  author       = {Ran Canetti and
                  Huijia Lin and
                  Rafael Pass},
  title        = {Adaptive Hardness and Composable Security in the Plain Model from
                  Standard Assumptions},
  journal      = {{SIAM} J. Comput.},
  volume       = {45},
  number       = {5},
  pages        = {1793--1834},
  year         = {2016},
  url          = {https://doi.org/10.1137/110847196},
  doi          = {10.1137/110847196},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/CanettiLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Lin16,
  author       = {Huijia Lin},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Indistinguishability Obfuscation from Constant-Degree Graded Encoding
                  Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {28--57},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_2},
  doi          = {10.1007/978-3-662-49890-3\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Lin16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/LinV16,
  author       = {Huijia Lin and
                  Vinod Vaikuntanathan},
  editor       = {Irit Dinur},
  title        = {Indistinguishability Obfuscation from DDH-Like Assumptions on Constant-Degree
                  Graded Encodings},
  booktitle    = {{IEEE} 57th Annual Symposium on Foundations of Computer Science, {FOCS}
                  2016, 9-11 October 2016, Hyatt Regency, New Brunswick, New Jersey,
                  {USA}},
  pages        = {11--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/FOCS.2016.11},
  doi          = {10.1109/FOCS.2016.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/LinV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LinPST16,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Karn Seth and
                  Sidharth Telang},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Indistinguishability Obfuscation with Non-trivial Efficiency},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {447--462},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_17},
  doi          = {10.1007/978-3-662-49387-8\_17},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LinPST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SahinZALT16,
  author       = {Cetin Sahin and
                  Victor Zakhary and
                  Amr El Abbadi and
                  Huijia Lin and
                  Stefano Tessaro},
  title        = {TaoStore: Overcoming Asynchronicity in Oblivious Data Storage},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {198--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.20},
  doi          = {10.1109/SP.2016.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SahinZALT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AnanthCCLL16,
  author       = {Prabhanjan Ananth and
                  Yu{-}Chi Chen and
                  Kai{-}Min Chung and
                  Huijia Lin and
                  Wei{-}Kai Lin},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Delegating {RAM} Computations with Adaptive Soundness and Privacy},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {3--30},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_1},
  doi          = {10.1007/978-3-662-53644-5\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AnanthCCLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LinPST16,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Karn Seth and
                  Sidharth Telang},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Output-Compressing Randomized Encodings and Applications},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9562},
  pages        = {96--124},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49096-9\_5},
  doi          = {10.1007/978-3-662-49096-9\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LinPST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChenLT16,
  author       = {Binyi Chen and
                  Huijia Lin and
                  Stefano Tessaro},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Oblivious Parallel {RAM:} Improved Efficiency and Generic Constructions},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9563},
  pages        = {205--234},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49099-0\_8},
  doi          = {10.1007/978-3-662-49099-0\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ChenLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinPST16,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Karn Seth and
                  Sidharth Telang},
  title        = {Indistinguishability Obfuscation with Non-trivial Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinPST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lin16,
  author       = {Huijia Lin},
  title        = {Indistinguishability Obfuscation from Constant-Degree Graded Encoding
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/257},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lin16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinV16,
  author       = {Huijia Lin and
                  Vinod Vaikuntanathan},
  title        = {Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree
                  Graded Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {795},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/795},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyLP16,
  author       = {Nir Bitansky and
                  Huijia Lin and
                  Omer Paneth},
  title        = {On Removing Graded Encodings from Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {962},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/962},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lin16a,
  author       = {Huijia Lin},
  title        = {Indistinguishability Obfuscation from {DDH} on 5-linear Maps and Locality-5
                  PRGs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1096},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lin16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/LinP15,
  author       = {Huijia Lin and
                  Rafael Pass},
  title        = {Constant-Round Nonmalleable Commitments from Any One-Way Function},
  journal      = {J. {ACM}},
  volume       = {62},
  number       = {1},
  pages        = {5:1--5:30},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699446},
  doi          = {10.1145/2699446},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jacm/LinP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChungLP15,
  author       = {Kai{-}Min Chung and
                  Huijia Lin and
                  Rafael Pass},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Constant-Round Concurrent Zero-Knowledge from Indistinguishability
                  Obfuscation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {287--307},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_14},
  doi          = {10.1007/978-3-662-47989-6\_14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChungLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/DinurGL15,
  author       = {Irit Dinur and
                  Shafi Goldwasser and
                  Huijia Lin},
  editor       = {Tim Roughgarden},
  title        = {The Computational Benefit of Correlated Instances},
  booktitle    = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer
                  Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015},
  pages        = {219--228},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2688073.2688082},
  doi          = {10.1145/2688073.2688082},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/DinurGL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BitanskyGLPT15,
  author       = {Nir Bitansky and
                  Sanjam Garg and
                  Huijia Lin and
                  Rafael Pass and
                  Sidharth Telang},
  editor       = {Rocco A. Servedio and
                  Ronitt Rubinfeld},
  title        = {Succinct Randomized Encodings and their Applications},
  booktitle    = {Proceedings of the Forty-Seventh Annual {ACM} on Symposium on Theory
                  of Computing, {STOC} 2015, Portland, OR, USA, June 14-17, 2015},
  pages        = {439--448},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746539.2746574},
  doi          = {10.1145/2746539.2746574},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/BitanskyGLPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoyalLPPS15,
  author       = {Vipul Goyal and
                  Huijia Lin and
                  Omkant Pandey and
                  Rafael Pass and
                  Amit Sahai},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Round-Efficient Concurrently Composable Secure Computation via a Robust
                  Extraction Lemma},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {260--289},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_12},
  doi          = {10.1007/978-3-662-46494-6\_12},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoyalLPPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiLTV15,
  author       = {Ran Canetti and
                  Huijia Lin and
                  Stefano Tessaro and
                  Vinod Vaikuntanathan},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Obfuscation of Probabilistic Circuits and Applications},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9015},
  pages        = {468--497},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46497-7\_19},
  doi          = {10.1007/978-3-662-46497-7\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CanettiLTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyGLPT15,
  author       = {Nir Bitansky and
                  Sanjam Garg and
                  Huijia Lin and
                  Rafael Pass and
                  Sidharth Telang},
  title        = {Succinct Randomized Encodings and their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/356},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyGLPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinPST15,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Karn Seth and
                  Sidharth Telang},
  title        = {Output-Compressing Randomized Encodings and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {720},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/720},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinPST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLT15,
  author       = {Binyi Chen and
                  Huijia Lin and
                  Stefano Tessaro},
  title        = {Oblivious Parallel {RAM:} Improved Efficiency and Generic Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1053},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthCCLL15,
  author       = {Prabhanjan Ananth and
                  Yu{-}Chi Chen and
                  Kai{-}Min Chung and
                  Huijia Lin and
                  Wei{-}Kai Lin},
  title        = {Delegating {RAM} Computations with Adaptive Soundness and Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1082},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthCCLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BitanskyDL14,
  author       = {Nir Bitansky and
                  Dana Dachman{-}Soled and
                  Huijia Lin},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Leakage-Tolerant Computation with Input-Independent Preprocessing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {146--163},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_9},
  doi          = {10.1007/978-3-662-44381-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BitanskyDL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/DinurGL14,
  author       = {Irit Dinur and
                  Shafi Goldwasser and
                  Huijia Lin},
  title        = {The Computational Benefit of Correlated Instances},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR14-083}},
  year         = {2014},
  url          = {https://eccc.weizmann.ac.il/report/2014/083},
  eprinttype    = {ECCC},
  eprint       = {TR14-083},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/DinurGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyCCGLRT14,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Alessandro Chiesa and
                  Shafi Goldwasser and
                  Huijia Lin and
                  Aviad Rubinstein and
                  Eran Tromer},
  title        = {The Hunting of the {SNARK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {580},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/580},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyCCGLRT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinP14,
  author       = {Huijia Lin and
                  Rafael Pass},
  title        = {Succinct Garbling Schemes and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {766},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/766},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiLTV14,
  author       = {Ran Canetti and
                  Huijia Lin and
                  Stefano Tessaro and
                  Vinod Vaikuntanathan},
  title        = {Obfuscation of Probabilistic Circuits and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {882},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/882},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiLTV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungLP14,
  author       = {Kai{-}Min Chung and
                  Huijia Lin and
                  Rafael Pass},
  title        = {Constant-Round Concurrent Zero-knowledge from Indistinguishability
                  Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {991},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/991},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LinT13,
  author       = {Huijia Lin and
                  Stefano Tessaro},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Amplification of Chosen-Ciphertext Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {503--519},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_30},
  doi          = {10.1007/978-3-642-38348-9\_30},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LinT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/ChungLP13,
  author       = {Kai{-}Min Chung and
                  Huijia Lin and
                  Rafael Pass},
  title        = {Constant-Round Concurrent Zero Knowledge from P-Certificates},
  booktitle    = {54th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2013, 26-29 October, 2013, Berkeley, CA, {USA}},
  pages        = {50--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/FOCS.2013.14},
  doi          = {10.1109/FOCS.2013.14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/focs/ChungLP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/CanettiLP13,
  author       = {Ran Canetti and
                  Huijia Lin and
                  Rafael Pass},
  title        = {From Unprovability to Environmentally Friendly Protocols},
  booktitle    = {54th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2013, 26-29 October, 2013, Berkeley, CA, {USA}},
  pages        = {70--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/FOCS.2013.16},
  doi          = {10.1109/FOCS.2013.16},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/focs/CanettiLP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/ChungLMP13,
  author       = {Kai{-}Min Chung and
                  Huijia Lin and
                  Mohammad Mahmoody and
                  Rafael Pass},
  editor       = {Robert D. Kleinberg},
  title        = {On the power of nonuniformity in proofs of security},
  booktitle    = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley,
                  CA, USA, January 9-12, 2013},
  pages        = {389--400},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2422436.2422480},
  doi          = {10.1145/2422436.2422480},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/ChungLMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiLP13,
  author       = {Ran Canetti and
                  Huijia Lin and
                  Omer Paneth},
  editor       = {Amit Sahai},
  title        = {Public-Coin Concurrent Zero-Knowledge in the Global Hash Model},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {80--99},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_5},
  doi          = {10.1007/978-3-642-36594-2\_5},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CanettiLP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Lin12,
  author       = {Huijia Lin},
  title        = {Concurrent Security},
  school       = {Cornell University, {USA}},
  year         = {2012},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Lin12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PassLV12,
  author       = {Rafael Pass and
                  Huijia Lin and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {A Unified Framework for {UC} from Only {OT}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {699--717},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_42},
  doi          = {10.1007/978-3-642-34961-4\_42},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PassLV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LinP12,
  author       = {Huijia Lin and
                  Rafael Pass},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Black-Box Constructions of Composable Protocols without Set-Up},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {461--478},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_27},
  doi          = {10.1007/978-3-642-32009-5\_27},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LinP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungLP12,
  author       = {Kai{-}Min Chung and
                  Huijia Lin and
                  Rafael Pass},
  title        = {Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {563},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/563},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungLP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/LinP11,
  author       = {Huijia Lin and
                  Rafael Pass},
  editor       = {Lance Fortnow and
                  Salil P. Vadhan},
  title        = {Constant-round non-malleable commitments from any one-way function},
  booktitle    = {Proceedings of the 43rd {ACM} Symposium on Theory of Computing, {STOC}
                  2011, San Jose, CA, USA, 6-8 June 2011},
  pages        = {705--714},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1993636.1993730},
  doi          = {10.1145/1993636.1993730},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/LinP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HaleviL11,
  author       = {Shai Halevi and
                  Huijia Lin},
  editor       = {Yuval Ishai},
  title        = {After-the-Fact Leakage in Public-Key Encryption},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {107--124},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_8},
  doi          = {10.1007/978-3-642-19571-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HaleviL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LinP11,
  author       = {Huijia Lin and
                  Rafael Pass},
  editor       = {Yuval Ishai},
  title        = {Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {274--292},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_17},
  doi          = {10.1007/978-3-642-19571-6\_17},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LinP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviL11,
  author       = {Shai Halevi and
                  Huijia Lin},
  title        = {After-the-Fact Leakage in Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserLR11,
  author       = {Shafi Goldwasser and
                  Huijia Lin and
                  Aviad Rubinstein},
  title        = {Delegation of Computation without Rejection Problem from Designated
                  Verifier CS-Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserLR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LinPTV10,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Wei{-}Lung Dustin Tseng and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Tal Rabin},
  title        = {Concurrent Non-Malleable Zero Knowledge Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {429--446},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_23},
  doi          = {10.1007/978-3-642-14623-7\_23},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LinPTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/CanettiLP10,
  author       = {Ran Canetti and
                  Huijia Lin and
                  Rafael Pass},
  title        = {Adaptive Hardness and Composable Security in the Plain Model from
                  Standard Assumptions},
  booktitle    = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2010, October 23-26, 2010, Las Vegas, Nevada, {USA}},
  pages        = {541--550},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/FOCS.2010.86},
  doi          = {10.1109/FOCS.2010.86},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/focs/CanettiLP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinP10,
  author       = {Huijia Lin and
                  Rafael Pass},
  title        = {Constant-round Non-Malleable Commitments from Any One-Way Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/483},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/LinPV09,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Michael Mitzenmacher},
  title        = {A unified framework for concurrent security: universal composability
                  from stand-alone non-malleability},
  booktitle    = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
                  {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
  pages        = {179--188},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1536414.1536441},
  doi          = {10.1145/1536414.1536441},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/LinPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/LinP09,
  author       = {Huijia Lin and
                  Rafael Pass},
  editor       = {Michael Mitzenmacher},
  title        = {Non-malleability amplification},
  booktitle    = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
                  {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
  pages        = {189--198},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1536414.1536442},
  doi          = {10.1145/1536414.1536442},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/LinP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipsn/LinLMGG08,
  author       = {Huijia Lin and
                  Maohua Lu and
                  Nikola Milosavljevic and
                  Jie Gao and
                  Leonidas J. Guibas},
  title        = {Composable Information Gradients in Wireless Sensor Networks},
  booktitle    = {Proceedings of the 7th International Conference on Information Processing
                  in Sensor Networks, {IPSN} 2008, St. Louis, Missouri, USA, April 22-24,
                  2008},
  pages        = {121--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IPSN.2008.21},
  doi          = {10.1109/IPSN.2008.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipsn/LinLMGG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LinPV08,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Ran Canetti},
  title        = {Concurrent Non-malleable Commitments from Any One-Way Function},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {571--588},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_31},
  doi          = {10.1007/978-3-540-78524-8\_31},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LinPV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BrumleySCJL07,
  author       = {David Brumley and
                  Dawn Xiaodong Song and
                  Tzi{-}cker Chiueh and
                  Rob Johnson and
                  Huijia Lin},
  title        = {{RICH:} Automatically Protecting Against Integer-Based Vulnerabilities},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March
                  2007},
  publisher    = {The Internet Society},
  year         = {2007},
  url          = {https://www.ndss-symposium.org/ndss2007/rich-automatically-protecting-against-integer-based-vulnerabilities/},
  timestamp    = {Mon, 01 Feb 2021 08:42:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BrumleySCJL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics