default search action
Hongda Li 0001
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, State Key Lab of Information Security, Beijing, China
- affiliation: University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
- affiliation: Chinese Academy of Sciences, Data Assurance and Communication Security Research Center, Beijing, China
Other persons with the same name
- Hongda Li — disambiguation page
- Hongda Li 0002 — Clemson University, School of Computing, Clemson, SC, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c27]Xianning Meng, Hongda Li, Yao Zan:
Sharding PoW-based Blockchains with Simple Cross-Shard Transaction Processing. CSCWD 2024: 922-927 - 2023
- [c26]Yao Zan, Hongda Li, Haixia Xu:
Adaptively Secure Constrained Verifiable Random Function. SciSec 2023: 367-385 - [i10]Hongda Li, Peifang Ni, Yao Zan:
Public-Key Encryption from Average Hard NP Language. IACR Cryptol. ePrint Arch. 2023: 1260 (2023) - 2022
- [c25]Yao Zan, Hongda Li, Xianning Meng, Haixia Xu:
Generic Construction of (Hierarchical) Functional Pseudorandom Functions. CCRIS 2022: 171-175 - [c24]Xianning Meng, Peifang Ni, Hongda Li, Haixia Xu:
A Conflict-Free Redactable Blockchain. PerCom Workshops 2022: 285-290 - 2020
- [j12]Peifang Ni, Hongda Li, Dongxue Pan:
Analysis of bitcoin backbone protocol in the non-flat model. Sci. China Inf. Sci. 63(3) (2020) - [i9]Hongda Li, Peifang Ni, Dongxue Pan:
Some Low Round Zero Knowledge Protocols. IACR Cryptol. ePrint Arch. 2020: 347 (2020)
2010 – 2019
- 2019
- [c23]Dongxue Pan, Bei Liang, Hongda Li, Peifang Ni:
Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability: Constructions and Applications. ACISP 2019: 609-619 - [c22]Dongxue Pan, Bei Liang, Hongda Li, Peifang Ni:
Public-Coin Differing-Inputs Obfuscator for Hiding-Input Point Function with Multi-bit Output and Its Applications. INDOCRYPT 2019: 297-317 - [c21]Dongxue Pan, Bei Liang, Hongda Li, Peifang Ni:
Hierarchical Functional Signcryption: Notion and Construction. ProvSec 2019: 167-185 - [i8]Hongda Li, Dongxue Pan, Peifang Ni:
Efficient Zero-Knowledge for NP from Secure Two-Party Computation. IACR Cryptol. ePrint Arch. 2019: 91 (2019) - [i7]Peifang Ni, Hongda Li, Xianning Meng, Dongxue Pan:
UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting. IACR Cryptol. ePrint Arch. 2019: 456 (2019) - 2018
- [c20]Peifang Ni, Hongda Li, Dongxue Pan:
Micropaying to a Distributed Payee with Instant Confirmation. ICICS 2018: 793-804 - [i6]Dongxue Pan, Hongda Li, Peifang Ni:
Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation. IACR Cryptol. ePrint Arch. 2018: 1055 (2018) - 2017
- [j11]Fei Tang, Rui Zhang, Hongda Li:
Attribute-based non-interactive key exchange. Sci. China Inf. Sci. 60(1): 19101:1-19101:3 (2017) - [i5]Hongda Li, Dongxue Pan, Peifang Ni:
Augmented Black-Box Simulation and Zero Knowledge Argument for NP. IACR Cryptol. ePrint Arch. 2017: 1243 (2017) - 2015
- [j10]Fei Tang, Hongda Li, Jinyong Chang:
Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(2): 762-766 (2015) - [j9]Fei Tang, Hongda Li, Jinyong Chang:
Multi-Use Unidirectional Proxy Re-Signatures of Constant Size without Random Oracles. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(3): 898-905 (2015) - [j8]Fei Tang, Hongda Li, Qihua Niu, Bei Liang:
Secure Mobile Agent from Leakage-Resilient Proxy Signatures. Mob. Inf. Syst. 2015: 901418:1-901418:12 (2015) - [c19]Tingting Zhang, Hongda Li, Guifang Huang:
Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption. ACISP 2015: 251-269 - [c18]Bei Liang, Hongda Li, Jinyong Chang:
Verifiable Random Functions from (Leveled) Multilinear Maps. CANS 2015: 129-143 - [c17]Qihua Niu, Hongda Li, Guifang Huang, Bei Liang, Fei Tang:
One-Round Witness Indistinguishability from Indistinguishability Obfuscation. ISPEC 2015: 559-574 - [c16]Bei Liang, Hongda Li, Jinyong Chang:
The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures. ISC 2015: 21-41 - [c15]Tingting Zhang, Hongda Li:
Fully Leakage-Resilient Non-malleable Identification Schemes in the Bounded-Retrieval Model. IWSEC 2015: 153-172 - [c14]Bei Liang, Hongda Li, Jinyong Chang:
Constrained Verifiable Random Functions from Indistinguishability Obfuscation. ProvSec 2015: 43-60 - [c13]Guifang Huang, Hongda Li:
On Zero Knowledge Argument with PQT Soundness. WISA 2015: 326-335 - 2014
- [j7]HongDa Li, Dengguo Feng:
Constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP. Sci. China Inf. Sci. 57(1): 1-14 (2014) - [c12]Fei Tang, Hongda Li:
Ring Signatures of Constant Size Without Random Oracles. Inscrypt 2014: 93-108 - [c11]Bei Liang, Rui Zhang, Hongda Li:
Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions. Inscrypt 2014: 193-206 - [c10]Li Wang, Hongda Li, Fei Tang:
Functional Signatures from Indistinguishability Obfuscation. INTRUST 2014: 213-227 - [c9]Fei Tang, Hongda Li, Qihua Niu, Bei Liang:
Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model. ISPEC 2014: 418-432 - [c8]Fei Tang, Hongda Li, Bei Liang:
Attribute-Based Signatures for Circuits from Multilinear Maps. ISC 2014: 54-71 - [c7]Fei Tang, Hongda Li:
Joint Signature and Encryption in the Presence of Continual Leakage. WISA 2014: 269-280 - [i4]Hongda Li, Qihua Niu, Guifang Huang:
Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP. IACR Cryptol. ePrint Arch. 2014: 634 (2014) - 2013
- [c6]Fei Tang, Changlu Lin, Hongda Li:
ID-Based Signcryption with Restrictive Unsigncryption. INCoS 2013: 485-489 - [c5]Fei Tang, Hongda Li, Qihua Niu, Bei Liang:
Leakage-Resilient Proxy Signatures. INCoS 2013: 495-502 - [c4]Hongda Li, Qihua Niu, Bei Liang:
Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP. NSS 2013: 365-380 - [i3]Fei Tang, Hongda Li, Qihua Niu, Bei Liang:
Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model. IACR Cryptol. ePrint Arch. 2013: 785 (2013) - 2012
- [j6]Hongda Li, Dengguo Feng, Bao Li, Haixia Xue:
Round-optimal zero-knowledge proofs of knowledge for NP. Sci. China Inf. Sci. 55(11): 2473-2484 (2012) - [j5]Haixia Xu, Hongda Li, Bao Li:
Universally composable zero-knowledge sets. Int. J. Grid Util. Comput. 3(1): 25-31 (2012) - [c3]Yang Liu, Hongda Li, Qihua Niu:
A Leakage-Resilient Zero Knowledge Proof for Lattice Problem. CSS 2012: 265-278 - [c2]Hongda Li, Yang Liu, Qihua Niu:
A Note on Constant-Round Concurrent Zero-Knowledge Arguments of Knowledge for NP. IDCS 2012: 202-216 - 2010
- [j4]HongDa Li, Haixia Xu, Bao Li, Dengguo Feng:
On constant-round zero-knowledge proofs of knowledge for NP-relations. Sci. China Inf. Sci. 53(4): 788-799 (2010)
2000 – 2009
- 2008
- [j3]HongDa Li, Bao Li:
Existence of 3-round zero-knowledge proof systems for NP. Sci. China Ser. F Inf. Sci. 51(3): 273-282 (2008) - [i2]HongDa Li, Dengguo Feng, Bao Li, Haixia Xue:
Round-Optimal Zero-Knowledge Proofs of Knowledge for NP. IACR Cryptol. ePrint Arch. 2008: 524 (2008) - 2005
- [c1]Hongda Li, Bao Li:
An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP. CISC 2005: 210-220 - [i1]Bao Li, Hongda Li, Guangwu Xu, Haixia Xu:
Efficient reduction of 1 out of n oblivious transfers in random oracle model. IACR Cryptol. ePrint Arch. 2005: 279 (2005) - 2004
- [j2]Hong-Da Li, Dongyao Ji, Dengguo Feng, Bao Li:
Oblivious Polynomial Evaluation. J. Comput. Sci. Technol. 19(4): 550-554 (2004) - [j1]Hong-Da Li, Xiong Yang, Dengguo Feng, Bao Li:
Distributed Oblivious Function Evaluation and Its Applications. J. Comput. Sci. Technol. 19(6): 942-947 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint