Follow
Yuncong Hu
Yuncong Hu
Verified email at berkeley.edu - Homepage
Title
Cited by
Cited by
Year
Marlin: Preprocessing zkSNARKs with universal and updatable SRS
A Chiesa, Y Hu, M Maller, P Mishra, N Vesely, N Ward
Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020
4772020
{JEDI}:{Many-to-Many}{End-to-End} encryption and key delegation for {IoT}
S Kumar, Y Hu, MP Andersen, RA Popa, DE Culler
28th USENIX security symposium (USENIX Security 19), 1519-1536, 2019
1122019
Ghostor: Toward a Secure {Data-Sharing} System from Decentralized Trust
Y Hu, S Kumar, RA Popa
17th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2020
542020
Gemini: Elastic SNARKs for diverse environments
J Bootle, A Chiesa, Y Hu, M Orru
Annual International Conference on the Theory and Applications of …, 2022
522022
Merkle2: A Low-Latency Transparency Log System
Y Hu, K Hooshmand, H Kalidhindi, SJ Yang, RA Popa
2021 IEEE Symposium on Security and Privacy (SP), 285-303, 2021
432021
Non-interactive differentially anonymous router
B Bünz, Y Hu, S Matsuo, E Shi
Cryptology ePrint Archive, 2021
52021
A Verifiable and Privacy-Preserving Federated Learning Training Framework
H Duan, Z Peng, L Xiang, Y Hu, B Li
IEEE Transactions on Dependable and Secure Computing, 2024
22024
Hadamard product argument from lagrange-based univariate polynomials
J Xie, Y Hu, Y Yu
Australasian Conference on Information Security and Privacy, 472-492, 2024
12024
Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS
N Ward, A Chiesa, P Mishra, Y Hu, N Vesely, M Maller
12021
Advanced Transparency System
Y Sun, Y Hu, Y Yu
Cryptology ePrint Archive, 2024
2024
A Succinct Range Proof for Polynomial-based Vector Commitment
R Gao, Z Wan, Y Hu, H Wang
Cryptology ePrint Archive, 2024
2024
Decentralized Ledgers: Design and Applications
Y Hu
University of California, Berkeley, 2022
2022
Broadcast Encryption with Fine-grained Delegation and its Application to IoT
Y Hu
2020
Plontank: An Fpga-Based Zk-Snark Acceleration System for Secure Computing
D Qian, Y Hu
The system can't perform the operation now. Try again later.
Articles 1–14