[go: up one dir, main page]

Follow
George Lu
George Lu
Verified email at cs.utexas.edu
Title
Cited by
Cited by
Year
Registered attribute-based encryption
S Hohenberger, G Lu, B Waters, DJ Wu
Annual International Conference on the Theory and Applications of …, 2023
1142023
Reducing the CRS size in registered ABE systems
R Garg, G Lu, B Waters, DJ Wu
Annual International Cryptology Conference, 143-177, 2024
322024
Dynamic collusion bounded functional encryption from identity-based encryption
R Garg, R Goyal, G Lu, B Waters
Annual International Conference on the Theory and Applications of …, 2022
242022
Dynamic collusion functional encryption and multi-authority attribute-based encryption
R Garg, R Goyal, G Lu
Iacr international conference on public-key cryptography, 69-104, 2024
162024
Realizing flexible broadcast encryption: how to broadcast to a public-key directory
R Garg, G Lu, B Waters, DJ Wu
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
142023
Black-box non-interactive non-malleable commitments
R Garg, D Khurana, G Lu, B Waters
Annual International Conference on the Theory and Applications of …, 2021
122021
New techniques in replica encodings with client setup
R Garg, G Lu, B Waters
Theory of Cryptography Conference, 550-583, 2020
112020
Multi-authority registered attribute-based encryption
G Lu, B Waters, DJ Wu
Annual International Conference on the Theory and Applications of …, 2025
102025
How to Sample a Discrete Gaussian (and more) from a Random Oracle
G Lu, B Waters
Theory of Cryptography Conference, 653-682, 2022
72022
Limits on the Power of Prime-Order Groups: Separating Q-Type from Static Assumptions
G Lu, M Zhandry
Annual International Cryptology Conference, 46-74, 2024
52024
Performance evaluation of iterative methods for solving robust convex quadratic problems
C Kroer, N Ho-Nguyen, G Lu, F Kılınç-Karzan
10th NIPS Workshop on Optimization for Machine Learning, Dec 8, 2017
32017
Succinct Garbled Circuits with Low-Depth Garbling Algorithms
H Li, H Lin, G Lu
Cryptology ePrint Archive, 2025
22025
Succinct Computational Secret Sharing for Monotone Circuits
G Lu, S Nassar, B Waters
International Conference on the Theory and Application of Cryptology and …, 2025
12025
On Non-uniform Security for Black-Box Non-interactive CCA Commitments
R Garg, D Khurana, G Lu, B Waters
Annual International Conference on the Theory and Applications of …, 2023
12023
A Hidden-Bits Approach to Statistical ZAPs from LWE
E Bradley, G Lu, S Nassar, B Waters, DJ Wu
Theory of Cryptography Conference, 71-104, 2025
2025
How to make any computational secret sharing scheme adaptively secure
G Lu, B Waters
Annual International Cryptology Conference, 328-355, 2025
2025
Binary Codes for Computationally Bounded Errors Under Standard Crypto Assumptions
G Lu, J Silbak, D Wichs
Cryptology ePrint Archive, 2025
2025
A Simple and Generic Approach to Dynamic Collusion Model
R Garg, R Goyal, G Lu
Cryptology ePrint Archive, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–18