Russell W. F. Lai

Russell W. F. Lai

    20162023

    Research activity per year

    If you made any changes in Pure these will be visible here soon.
    Filter
    Conference contribution

    Search results

    • 2023

      Efficient Laconic Cryptography from Learning with Errors

      Döttling, N., Kolonelos, D., Lai, R. W. F., Lin, C., Malavolta, G. & Rahimi, A., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings. Hazay, C. & Stam, M. (eds.). Springer, p. 417-446 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14006 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      Open Access
    • Quantum Rewinding for Many-Round Protocols

      Lai, R. W. F., Malavolta, G. & Spooner, N., 2023, Theory of Cryptography : 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer, p. 80–109 (Lecture Notes in Computer Science; vol. 13747).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    • 2022

      Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable

      Albrecht, M. R., Cini, V., Lai, R. W. F., Malavolta, G. & Thyagarajan, S. A., 13 Oct 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). Springer, p. 102-132 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13508 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    • Multichannel Optimal Tree-Decodable Codes are Not Always Optimal Prefix Codes

      Yin, H. H. F., Wong, H. W. H., Tahernia, M. & Lai, R. W. F., 2022, 2022 IEEE International Symposium on Information Theory, ISIT 2022. IEEE, p. 1-6 6 p. (IEEE International Symposium on Information Theory - Proceedings; vol. 2022-June).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      Open Access
      1 Citation (Scopus)
    • On the Applications and Parallelization of Multichannel Source Coding

      Yin, H. H. F., Woo, I. K. Y. & Lai, R. W. F., 4 Nov 2022, Proceedings of 2022 IEEE Region 10 International Conference, TENCON 2022. IEEE, p. 1-6 6 p. 9977596. (TENCON IEEE Region Ten Conference).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      Open Access
      File
      11 Downloads (Pure)
    • 2021

      A Geometric Approach to Homomorphic Secret Sharing

      Ishai, Y., Lai, R. W. F. & Malavolta, G., 2021, Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings. Garay, J. A. (ed.). Springer, p. 92-119 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12711 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      2 Citations (Scopus)
    • On Multi-Channel Huffman Codes for Asymmetric-Alphabet Channels

      Yin, H. H. F., Wang, X., Ng, K. H., Lai, R. W. F., Ng, L. K. L. & Ma, J. P. K., 12 Jul 2021, 2021 IEEE International Symposium on Information Theory, ISIT 2021 - Proceedings. IEEE, p. 2024-2029 6 p.

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      Open Access
      4 Citations (Scopus)
    • Polynomial-Time Construction of Two-Channel Prefix-Free Codes with Given Codeword Lengths

      Yin, H. H. F., Ng, K. H., Shing, Y. T., Lai, R. W. F. & Wang, X., 2021, 2021 IEEE Information Theory Workshop, ITW 2021 - Proceedings. IEEE

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      2 Citations (Scopus)
    • Subtractive Sets over Cyclotomic Rings : Limits of Schnorr-Like Arguments over Lattices

      Albrecht, M. R. & Lai, R. W. F., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer, p. 519-548 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12826 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      4 Citations (Scopus)
    • 2020

      Multi-client Oblivious RAM with Poly-logarithmic Communication

      Chow, S. S. M., Fech, K., Lai, R. W. F. & Malavolta, G., 2020, Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Moriai, S. & Wang, H. (eds.). Springer, p. 160-190 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12492 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      2 Citations (Scopus)
    • On computational shortcuts for information-theoretic PIR

      Hong, M. M., Ishai, Y., Kolobov, V. I. & Lai, R. W. F., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). Springer, p. 504-534 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12550 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      2 Citations (Scopus)
    • Threshold Password-Hardened Encryption Services

      Brost, J., Egger, C., Lai, R. W. F., Schmid, F., Schröder, D. & Zoppelt, M., 30 Oct 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 409-424 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      6 Citations (Scopus)
    • 2019

      Decision Procedure for the Existence of Two-Channel Prefix-Free Codes

      Yin, H. H. F., Ng, K. H., Shing, Y. T., Lai, R. W. F. & Wang, X., Jul 2019, 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. IEEE, p. 1522-1526 5 p. 8849758. (IEEE International Symposium on Information Theory - Proceedings; vol. 2019-July).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      Open Access
      5 Citations (Scopus)
    • Efficient Invisible and Unlinkable Sanitizable Signatures

      Bultel, X., Lafourcade, P., Lai, R. W. F., Malavolta, G., Schröder, D. & Thyagarajan, S. A. K., 2019, Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Sako, K. & Lin, D. (eds.). Springer, p. 159-189 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11442 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      9 Citations (Scopus)
    • Incremental proofs of sequential work

      Döttling, N., Lai, R. W. F. & Malavolta, G., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer, p. 292-323 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      7 Citations (Scopus)
    • Omniring: Scaling private payments without trusted setup: Formal foundations and a construction of ring confidential transactions with log-size proofs

      Lai, R. W. F., Schröder, D., Ronge, V., Aravinda, S., Thyagarajan, K., Ruffing, T. & Wang, J., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 31-48 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      25 Citations (Scopus)
    • Subvector Commitments with Application to Succinct Arguments

      Lai, R. W. F. & Malavolta, G., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer, p. 530-560 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11692 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      34 Citations (Scopus)
    • Succinct arguments for bilinear group arithmetic: Practical structure-preserving cryptography

      Lai, R. W. F., Malavolta, G. & Ronge, V., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 2057-2074 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      17 Citations (Scopus)
    • 2018

      Homomorphic secret sharing for low degree polynomials

      Lai, R. W. F., Malavolta, G. & Schröder, D., 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer, p. 279-309 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11274 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      11 Citations (Scopus)
    • Multi-key Homomorphic Signatures Unforgeable Under Insider Corruption

      Lai, R. W. F., Tai, R. K. H., Wong, H. W. H. & Chow, S. S. M., 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer, p. 465-492 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11273 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      14 Citations (Scopus)
    • Simple password-hardened encryption services

      Lai, R. W. F., Egger, C., Reinert, M., Chow, S. S. M., Maffei, M. & Schröder, D., 2018, Proceedings of the 27th USENIX Security Symposium. USENIX - THE ADVANCED COMPUTING SYSTEMS ASSOCIATION, p. 1405-1421 17 p.

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      22 Citations (Scopus)
    • 2017

      Another look at anonymous communication security and modular constructions

      Lai, R. W. F., Cheung, H. K. F., Chow, S. S. M. & So, A. M. C., 2017, Paradigms in Cryptology – Mycrypt 2016: Malicious and Exploratory Cryptology - 2nd International Conference, Mycrypt 2016, Revised Selected Papers. Phan, R. C-W. & Yung, M. (eds.). Springer, p. 56-82 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10311 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    • Forward-secure searchable encryption on labeled bipartite graphs

      Lai, R. W. F. & Chow, S. S. M., 2017, Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Proceedings. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Springer, p. 478-497 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      22 Citations (Scopus)
    • Phoenix: Rebirth of a cryptographic password-hardening service

      Lai, R. W. F., Egger, C., Schröder, D. & Chow, S. S. M., 2017, Proceedings of the 26th USENIX Security Symposium. USENIX - THE ADVANCED COMPUTING SYSTEMS ASSOCIATION, p. 899-916 18 p.

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      30 Citations (Scopus)
    • 2016

      Cryptography for Parallel RAM from Indistinguishability Obfuscation

      Chen, Y. C., Chow, S. S. M., Chung, K. M., Lai, R. W. F., Lin, W. K. & Zhou, H. S., 14 Jan 2016, ITCS 2016 - Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science. ACM, p. 179-190 12 p.

      Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

      25 Citations (Scopus)
    Your message has successfully been sent.
    Your message was not sent due to an error.