Sotabase
Home
Researchers
Career
·
Researcher/Professor
,
Penn State University
2022–
·
Assistant Professor
,
University of Waterloo
2020–
Publications
(32)
Registration-Based Encryption: Removing Private-Key Generator from IBE
IACR Cryptology ePrint Archive · 2018
77
cited
Two-Round Oblivious Transfer from CDH or LPN
IACR Cryptology ePrint Archive · 2020
60
cited
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes
International Conference on Theory and Practice of Public Key Cryptography · 2018
58
cited
Registration-Based Encryption from Standard Assumptions
IACR Cryptology ePrint Archive · 2019
46
cited
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
IACR Cryptology ePrint Archive · 2016
39
cited
Trapdoor Functions from the Computational Diffie-Hellman Assumption
IACR Cryptology ePrint Archive · 2018
26
cited
Laconic Private Set Intersection and Applications
IACR Cryptology ePrint Archive · 2021
25
cited
New Techniques for Efficient Trapdoor Functions and Applications
IACR Cryptology ePrint Archive · 2019
21
cited
Amortizing Rate-1 OT and Applications to PIR and PSI
Theory of Cryptography Conference · 2021
17
cited
Compact Ring Signatures from Learning With Errors
IACR Cryptology ePrint Archive · 2021
16
cited
On the Worst-Case Inefficiency of CGKA
IACR Cryptology ePrint Archive · 2022
16
cited
Limits on the Power of Garbling Techniques for Public-Key Encryption
IACR Cryptology ePrint Archive · 2018
15
cited
Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More
IACR Cryptology ePrint Archive · 2019
12
cited
Reproducible Circularly Secure Bit Encryption: Applications and Realizations
Journal of Cryptology · 2015
12
cited
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
International Conference on the Theory and Application of Cryptographic Techniques · 2017
5
cited
Computational Soundness of Coinductive Symbolic Security under Active Attacks
Theory of Cryptography Conference · 2013
4
cited
Master-Key KDM-Secure IBE from Pairings
International Conference on Theory and Practice of Public Key Cryptography · 2020
4
cited
How to Build a Trapdoor Function from an Encryption Scheme
International Conference on the Theory and Application of Cryptology and Information Security · 2021
3
cited
On the Black-Box Complexity of Private-Key Inner-Product Functional Encryption
IACR Cryptology ePrint Archive · 2024
3
cited
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem
IACR Cryptology ePrint Archive · 2019
3
cited
Show all 32 papers →
Sotabase
Mohammad Hajiabadi | Researcher Profile | Sotabase | Sotabase