[go: up one dir, main page]

Follow
Mohammad Hajiabadi
Mohammad Hajiabadi
Assistant Professor, David R. Cheriton School of Computer Science, University of Waterloo
Verified email at uwaterloo.ca - Homepage
Title
Cited by
Cited by
Year
Registration-based encryption: removing private-key generator from IBE
S Garg, M Hajiabadi, M Mahmoody, A Rahimi
Theory of Cryptography Conference, 689-718, 2018
1322018
Linear-time zero-knowledge proofs for arithmetic circuit satisfiability
J Bootle, A Cerulli, E Ghadafi, J Groth, M Hajiabadi, SK Jakobsen
International Conference on the Theory and Application of Cryptology and …, 2017
1212017
Two-round oblivious transfer from CDH or LPN
N Döttling, S Garg, M Hajiabadi, D Masny, D Wichs
Annual International Conference on the Theory and Applications of …, 2020
832020
Registration-based encryption from standard assumptions
S Garg, M Hajiabadi, M Mahmoody, A Rahimi, S Sekar
IACR international workshop on public key cryptography, 63-93, 2019
832019
New constructions of identity-based and key-dependent message secure encryption schemes
N Döttling, S Garg, M Hajiabadi, D Masny
IACR International Workshop on Public Key Cryptography, 3-31, 2018
722018
Laconic private set intersection and applications
N Alamati, P Branco, N Döttling, S Garg, M Hajiabadi, S Pu
Theory of Cryptography Conference, 94-125, 2021
362021
Efficient range-trapdoor functions and applications: Rate-1 OT and more
S Garg, M Hajiabadi, R Ostrovsky
Theory of Cryptography Conference, 88-116, 2020
302020
Trapdoor functions from the computational Diffie-Hellman assumption
S Garg, M Hajiabadi
Annual international cryptology conference, 362-391, 2018
292018
Compact ring signatures from learning with errors
R Chatterjee, S Garg, M Hajiabadi, D Khurana, X Liang, G Malavolta, ...
Annual International Cryptology Conference, 282-312, 2021
262021
Amortizing rate-1 OT and applications to PIR and PSI
M Chase, S Garg, M Hajiabadi, J Li, P Miao
Theory of Cryptography Conference, 126-156, 2021
252021
New techniques for efficient trapdoor functions and applications
S Garg, R Gay, M Hajiabadi
Annual International Conference on the Theory and Applications of …, 2019
252019
Limits on the power of garbling techniques for public-key encryption
S Garg, M Hajiabadi, M Mahmoody, A Mohammed
Annual International Cryptology Conference, 335-364, 2018
252018
On the worst-case inefficiency of CGKA
A Bienstock, Y Dodis, S Garg, G Grogan, M Hajiabadi, P Rösler
Theory of Cryptography Conference, 213-243, 2022
202022
Reproducible Circularly Secure Bit Encryption: Applications and Realizations
M Hajiabadi, BM Kapron
Journal of Cryptology 30 (4), 1187-1237, 2017
122017
Toward fine-grained blackbox separations between semantic and circular-security notions
M Hajiabadi, BM Kapron
Annual International Conference on the Theory and Applications of …, 2017
102017
Master-key KDM-secure IBE from pairings
S Garg, R Gay, M Hajiabadi
IACR International Conference on Public-Key Cryptography, 123-152, 2020
92020
Algebraic restriction codes and their applications
D Aggarwal, N Döttling, J Dujmovic, M Hajiabadi, G Malavolta, ...
Algorithmica 85 (12), 3602-3648, 2023
82023
On generic constructions of circularly-secure, leakage-resilient public-key encryption schemes
M Hajiabadi, BM Kapron, V Srinivasan
Public-Key Cryptography--PKC 2016, 129-158, 2016
82016
Lower bounds on assumptions behind registration-based encryption
M Hajiabadi, M Mahmoody, W Qi, S Sarfaraz
Theory of Cryptography Conference, 306-334, 2023
72023
On the black-box complexity of private-key inner-product functional encryption
M Hajiabadi, R Langrehr, A O’Neill, M Wang
Theory of Cryptography Conference, 318-343, 2024
62024
The system can't perform the operation now. Try again later.
Articles 1–20