Research

I am interested in cryptography (foundations and applications), and broadly theoretical computer science. Specific topics include: how to compute on encrypted data, how to verify computation in outsourced environments, how to protect memory and computation from physical attacks, and various settings of multiparty computation.

Funded Projects

  • CRII: SaTC: Practical Cryptographic Coding Schemes Against Memory Attacks. NSF, PI, 175,000, (2017 – 2020)
  • CAREER: Towards Efficient Cryptography for Next Generation Applications. NSF, PI, 500,000, (2020 – 2025)

Publications

Generally I post the full versions of my papers on Crypto eprint. Also, a list my publications can be found on DBLP.

Published

  • Ring-based identity based encryption – asymptotically shorter MPK and tighter security,
    with Parhat Abla, Han Wang, and Zhedong Wang.
    To appear in TCC 2021
  • New Lattice Two-stage Sampling Technique and its Applications to Functional Encryption – Stronger Security and Smaller Ciphertexts,
    with Qiqi Lai and Zhedong Wang.
    To appear in Eurocrypt 2021
  • New Lattice Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks,
    with Qiqi Lai and Zhedong Wang.
    PKC 2021
  • Rounding in the rings,
    with Zhedong Wang.
    Crypto 2020
  • Almost Tight Security in Lattices with Poly- nomial Moduli – PRF, IBE, All-but-many LTF, and More,
    with Qiqi Lai and Zhedong Wang.
    PKC 2020
  • Efficient Multi-Party Private Set Intersection Against Malicious Adversaries,
    with En Zhang, Qiqi Lai, Ganggang Jin, and Yu Li.
    CCSW 2019 [link]
  • CCA Proxy Re-encryption and Signatures from Lattices,
    with Xiong Fan.
    ACNS 2019 [link]
  • Decentralized ABE and FE for Inner Products, Revisited,
    with Xiong Fan and Zhedong Wang.
    PCK 2019 [eprint]
  • Parameter-Hiding Order Revealing Encryption,
    with David Cash, Adam O’Neill, Mark Zhandry, and Cong Zhang.
    Asiacrypt 2018 [eprint]
  • Non-Malleable Codes for Partial Functions with Manipulation Detection,
    with Aggelos Kiayias and Yiannis Tselekounis.
    Crypto 2018 [eprint]
  • Practical Non-Malleable Codes from l-more Extractable Hash Function,
    with Aggelos Kiayias and Yiannis Tselekounis.
    CCS 2016 [eprint]
  • Deniable Attribute Based Encryption for Branching Programs from LWE,
    with Daniel Apon and Xiong Fan.
    TCC 2016 [eprint]
  • Leakage-Resilient Public-Key Encryption from Obfuscation,
    with Dana Dachman-Soled, S. Dov Gordon, Adam O’Neill, and Hong-Sheng Zhou.
    PKC 2016 [eprint], Journal of Cryptology 2019 [JoC]
  • Constant-Round MPC with Fairness and Guarantee of Output Delivery,
    with S. Dov Gordon, and Elaine Shi.
    Crypto 2015 [eprint]
  • Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components without Leak-free Hardware,
    with Dana Dachman-Soled, and Hong-Sheng Zhou.
    Eurocrypt 2015 [eprint]
  • Locally Decodable and Updatable Non-Malleable Codes and Their Applications,
    with Dana Dachman-Soled, Elaine Shi, and Hong-Sheng Zhou.
    TCC 2015 [eprint] Journal of Cryptology 2020 [JoC]
  • Multi- client Verifiable Computation with Stronger Security Guarantees,
    with S. Dov Gordon, Jonathan Katz, Elaine Shi, and Hong-Sheng Zhou.
    TCC 2015 [eprint]
  • Multi-input Functional Encryption,
    with Shafi Goldwasser, S.Dov Gordon, Vipul Goyal, Abishek Jain, Jonathan Katz, Amit Sahai, Elaine Shi, and Hong-Sheng Zhou.
    Eurocrypt 2014. Merge of [GKLSZ] and [GGJS].
  • Re- encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from Lattices,
    with Nishanth Chandran, Melissa Chase, Ryo Nishimaki and Keita Xagawa.
    PKC 2014. [eprint]
  • Leakage Resilient Fully Homomorphic Encryption,
    with Alexandra Berkoff.
    TCC 2014 [eprint]
  • On the Lattice Smoothing Parameter Problem,
    with Kai-Min Chung, Daniel Dadush, Chris Peikert.
    CCC 2013 [arXiv]
  • Tamper and Leakage Resilience in the Split-State Model,
    with Anna Lysyanskaya.
    Crypto 2012 [eprint]
  • Public-Key Cryptography from New Multivariate Quadratic Assumptions,
    with Yun-Ju Huang, Bo-Yin Yang.
    PKC 2012 [eprint]
  • Memory Delegation,
    with Kai-Min Chung, Yael Tauman Kalai, Ran Raz.
    CRYPTO 2011 [eprint]
  • Efficient Secure Two-Party Exponentiation,
    with Ching-Hua Yu, Sherman S. M. Chow, Kai-Min Chung.
    CT-RSA 2011 [conference]
  • Efficient String-Commitment from Weak Bit-Commitment,
    with Kai-Min Chung, Chi-Jen Lu, Bo-Yin Yang.
    ASIACRYPT 2010 [conference]
  • Algorithmic Tamper-Proof Security under Probing Attacks,
    with Anna Lysyanskaya.
    SCN 2010 [conference]
  • Parallel Repetition Theorems for Interactive Arguments,
    with Kai-Min Chung.
    TCC 2010 (Best Student Paper Award) [ECCC]
  • Secure PRNGs from Specialized Polynomial Maps over Any Fq,
    with Chi-Jen Lu, Bo-Yin Yang.
    PQCrypto 2008 [eprint]