Russell W. F. Lai

Russell W. F. Lai

    20162025

    Research activity per year

    Search results

    • 2025

      RoK, Paper, SISsors Toolkit for Lattice-Based Succinct Arguments

      Klooß, M., Lai, R. W. F., Nguyen, N. K. & Osadnik, M., 2025, Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Chung, K.-M. & Sasaki, Y. (eds.). Springer, p. 203-235 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15488 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    • Traitor Tracing Without Trusted Authority from Registered Functional Encryption

      Branco, P., Lai, R. W. F., Maitra, M., Malavolta, G., Rahimi, A. & Woo, I. K. Y., 2025, Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Chung, K.-M. & Sasaki, Y. (eds.). Springer, p. 33-66 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15486 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
    • 2024

      Dataset, Noise Analysis, and Automated Parameter Estimation for Natural Steganography

      Woo, I. K. Y., Yiu, S., Yin, H. H. F. & Lai, R. W. F., 24 Jun 2024, IH MMSec 2024 - Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security. ACM, p. 13-18 6 p.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      File
      28 Downloads (Pure)
    • Simple Watermarking Pseudorandom Functions from Extractable Pseudorandom Generators

      Alpirez Bock, E., Brzuska, C. & Lai, R. W. F., 2024, In: IACR Communications in Cryptology. 1, 2, 27 p.

      Research output: Contribution to journalArticleScientificpeer-review

      Open Access
      File
      29 Downloads (Pure)
    • 2023

      Chainable Functional Commitments for Unbounded-Depth Circuits

      Balbás, D., Catalano, D., Fiore, D. & Lai, R. W. F., 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). Springer, p. 363-393 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14371 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      5 Citations (Scopus)
    • Efficient Laconic Cryptography from Learning with Errors

      Döttling, N., Kolonelos, D., Lai, R. W. F., Lin, C., Malavolta, G. & Rahimi, A., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings. Hazay, C. & Stam, M. (eds.). Springer, p. 417-446 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14006 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      12 Citations (Scopus)
    • Lattice-Based Succinct Arguments from Vanishing Polynomials

      Cini, V., Lai, R. W. F. & Malavolta, G., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings, Part II. Handschuh, H. & Lysyanskaya, A. (eds.). Springer, p. 72-105 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14082 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      14 Citations (Scopus)
    • Lattice-Based Timed Cryptography

      Lai, R. W. F. & Malavolta, G., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). Springer, p. 782-804 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14085 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      File
      6 Citations (Scopus)
      15 Downloads (Pure)
    • On Provable White-Box Security in the Strong Incompressibility Model

      Bock, E. A., Brzuska, C. & Lai, R. W. F., 31 Aug 2023, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2023, 4, p. 167-187 21 p.

      Research output: Contribution to journalArticleScientificpeer-review

      Open Access
      File
      1 Citation (Scopus)
      48 Downloads (Pure)
    • On Sustainable Ring-Based Anonymous Systems

      Chow, S. S. M., Egger, C., Lai, R. W. F., Ronge, V. & Woo, I. K. Y., 28 Aug 2023, Proceedings - 2023 IEEE 36th Computer Security Foundations Symposium, CSF 2023. IEEE, p. 568-583 16 p. (Proceedings - IEEE Computer Security Foundations Symposium; vol. 2023-July).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      4 Citations (Scopus)
    • Quantum Rewinding for Many-Round Protocols

      Lai, R. W. F., Malavolta, G. & Spooner, N., 2023, Theory of Cryptography : 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer, p. 80–109 (Lecture Notes in Computer Science; vol. 13747).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      3 Citations (Scopus)
    • 2022

      Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable

      Albrecht, M. R., Cini, V., Lai, R. W. F., Malavolta, G. & Thyagarajan, S. A., 13 Oct 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). Springer, p. 102-132 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13508 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      26 Citations (Scopus)
    • Multichannel Optimal Tree-Decodable Codes are Not Always Optimal Prefix Codes

      Yin, H. H. F., Wong, H. W. H., Tahernia, M. & Lai, R. W. F., 2022, 2022 IEEE International Symposium on Information Theory, ISIT 2022. IEEE, p. 1-6 6 p. (IEEE International Symposium on Information Theory - Proceedings; vol. 2022-June).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      2 Citations (Scopus)
    • On Defeating Graph Analysis of Anonymous Transactions

      Egger, C., Lai, R. W. F., Ronge, V., Woo, I. K. Y. & Yin, H. H. F., 2022, In: Proceedings of Privacy Enhancing Technologies. 2022, 3, p. 538–557

      Research output: Contribution to journalArticleScientificpeer-review

      Open Access
    • On the Applications and Parallelization of Multichannel Source Coding

      Yin, H. H. F., Woo, I. K. Y. & Lai, R. W. F., 4 Nov 2022, Proceedings of 2022 IEEE Region 10 International Conference, TENCON 2022. IEEE, p. 1-6 6 p. 9977596. (TENCON IEEE Region Ten Conference).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      File
      1 Citation (Scopus)
      77 Downloads (Pure)
    • 2021

      A Geometric Approach to Homomorphic Secret Sharing

      Ishai, Y., Lai, R. W. F. & Malavolta, G., 2021, Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings. Garay, J. A. (ed.). Springer, p. 92-119 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12711 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      6 Citations (Scopus)
    • Foundations of Ring Sampling

      Ronge, V., Egger, C., Lai, R. W. F., Schröder, D. & Yin, H. H. F., 2021, In: Proceedings of Privacy Enhancing Technologies. 2021, 3, p. 265–288

      Research output: Contribution to journalArticleScientificpeer-review

      Open Access
    • On Multi-Channel Huffman Codes for Asymmetric-Alphabet Channels

      Yin, H. H. F., Wang, X., Ng, K. H., Lai, R. W. F., Ng, L. K. L. & Ma, J. P. K., 12 Jul 2021, 2021 IEEE International Symposium on Information Theory, ISIT 2021 - Proceedings. IEEE, p. 2024-2029 6 p.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      6 Citations (Scopus)
    • Polynomial-Time Construction of Two-Channel Prefix-Free Codes with Given Codeword Lengths

      Yin, H. H. F., Ng, K. H., Shing, Y. T., Lai, R. W. F. & Wang, X., 2021, 2021 IEEE Information Theory Workshop, ITW 2021 - Proceedings. IEEE

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      2 Citations (Scopus)
    • Subtractive Sets over Cyclotomic Rings : Limits of Schnorr-Like Arguments over Lattices

      Albrecht, M. R. & Lai, R. W. F., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer, p. 519-548 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12826 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      13 Citations (Scopus)
    • 2020

      Multi-client Oblivious RAM with Poly-logarithmic Communication

      Chow, S. S. M., Fech, K., Lai, R. W. F. & Malavolta, G., 2020, Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Moriai, S. & Wang, H. (eds.). Springer, p. 160-190 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12492 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      3 Citations (Scopus)
    • On computational shortcuts for information-theoretic PIR

      Hong, M. M., Ishai, Y., Kolobov, V. I. & Lai, R. W. F., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). Springer, p. 504-534 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12550 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      3 Citations (Scopus)
    • Threshold Password-Hardened Encryption Services

      Brost, J., Egger, C., Lai, R. W. F., Schmid, F., Schröder, D. & Zoppelt, M., 30 Oct 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 409-424 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      13 Citations (Scopus)
    • 2019

      Another Look at Anonymous Communication

      Lai, R. W. F., Cheung, K. F., Chow, S. S. M. & Man-Cho So, A., 1 Sept 2019, In: IEEE Transactions on Dependable and Secure Computing. 16, 5, p. 731-742 12 p.

      Research output: Contribution to journalArticleScientificpeer-review

      11 Citations (Scopus)
    • Decision Procedure for the Existence of Two-Channel Prefix-Free Codes

      Yin, H. H. F., Ng, K. H., Shing, Y. T., Lai, R. W. F. & Wang, X., Jul 2019, 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. IEEE, p. 1522-1526 5 p. 8849758. (IEEE International Symposium on Information Theory - Proceedings; vol. 2019-July).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      Open Access
      6 Citations (Scopus)
    • Efficient Invisible and Unlinkable Sanitizable Signatures

      Bultel, X., Lafourcade, P., Lai, R. W. F., Malavolta, G., Schröder, D. & Thyagarajan, S. A. K., 2019, Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Sako, K. & Lin, D. (eds.). Springer, p. 159-189 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11442 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      12 Citations (Scopus)
    • Incremental proofs of sequential work

      Döttling, N., Lai, R. W. F. & Malavolta, G., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer, p. 292-323 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      13 Citations (Scopus)
    • Omniring: Scaling private payments without trusted setup: Formal foundations and a construction of ring confidential transactions with log-size proofs

      Lai, R. W. F., Schröder, D., Ronge, V., Aravinda, S., Thyagarajan, K., Ruffing, T. & Wang, J., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 31-48 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      38 Citations (Scopus)
    • Subvector Commitments with Application to Succinct Arguments

      Lai, R. W. F. & Malavolta, G., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer, p. 530-560 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11692 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      60 Citations (Scopus)
    • Succinct arguments for bilinear group arithmetic: Practical structure-preserving cryptography

      Lai, R. W. F., Malavolta, G. & Ronge, V., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 2057-2074 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      30 Citations (Scopus)
    • 2018

      Homomorphic secret sharing for low degree polynomials

      Lai, R. W. F., Malavolta, G. & Schröder, D., 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer, p. 279-309 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11274 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      16 Citations (Scopus)
    • Multi-key Homomorphic Signatures Unforgeable Under Insider Corruption

      Lai, R. W. F., Tai, R. K. H., Wong, H. W. H. & Chow, S. S. M., 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer, p. 465-492 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11273 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      20 Citations (Scopus)
    • Simple password-hardened encryption services

      Lai, R. W. F., Egger, C., Reinert, M., Chow, S. S. M., Maffei, M. & Schröder, D., 2018, Proceedings of the 27th USENIX Security Symposium. USENIX -The Advanced Computing Systems Association, p. 1405-1421 17 p.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      33 Citations (Scopus)
    • 2017

      Another look at anonymous communication security and modular constructions

      Lai, R. W. F., Cheung, H. K. F., Chow, S. S. M. & So, A. M. C., 2017, Paradigms in Cryptology – Mycrypt 2016: Malicious and Exploratory Cryptology - 2nd International Conference, Mycrypt 2016, Revised Selected Papers. Phan, R.C.-W. & Yung, M. (eds.). Springer, p. 56-82 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10311 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    • Forward-secure searchable encryption on labeled bipartite graphs

      Lai, R. W. F. & Chow, S. S. M., 2017, Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Proceedings. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Springer, p. 478-497 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      28 Citations (Scopus)
    • Phoenix: Rebirth of a cryptographic password-hardening service

      Lai, R. W. F., Egger, C., Schröder, D. & Chow, S. S. M., 2017, Proceedings of the 26th USENIX Security Symposium. USENIX -The Advanced Computing Systems Association, p. 899-916 18 p.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      41 Citations (Scopus)
    • 2016

      Cryptography for Parallel RAM from Indistinguishability Obfuscation

      Chen, Y. C., Chow, S. S. M., Chung, K. M., Lai, R. W. F., Lin, W. K. & Zhou, H. S., 14 Jan 2016, ITCS 2016 - Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science. ACM, p. 179-190 12 p.

      Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

      27 Citations (Scopus)
    Your message has successfully been sent.
    Your message was not sent due to an error.