Mohammad Hajiabadi

Calculated based on number of publications stored in Pure and citations from Scopus
20132023

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • 2023

    Algebraic Restriction Codes and Their Applications

    Aggarwal, D., Döttling, N., Dujmovic, J., Hajiabadi, M., Malavolta, G. & Obremski, M., Dec 2023, In: Algorithmica. 85, 12, p. 3602-3648 47 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Credibility in Private Set Membership

    Garg, S., Hajiabadi, M., Jain, A., Jin, Z., Pandey, O. & Shiehian, S., 2023, Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Boldyreva, A. & Kolesnikov, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 159-189 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13941 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Randomness Recoverable Secret Sharing Schemes

    Hajiabadi, M., Khazaei, S. & Vahdani, B., Jul 2023, 4th Conference on Information-Theoretic Cryptography, ITC 2023. Chung, K-M. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 12. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 267).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2022

    Algebraic Restriction Codes and Their Applications

    Aggarwal, D., Döttling, N., Dujmovic, J., Hajiabadi, M., Malavolta, G. & Obremski, M., Jan 1 2022, 13th Innovations in Theoretical Computer Science Conference, ITCS 2022. Braverman, M. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 2. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 215).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • On the Worst-Case Inefficiency of CGKA

    Bienstock, A., Dodis, Y., Garg, S., Grogan, G., Hajiabadi, M. & Rösler, P., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 213-243 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13748 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2021

    Amortizing Rate-1 OT and Applications to PIR and PSI

    Chase, M., Garg, S., Hajiabadi, M., Li, J. & Miao, P., 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. Nissim, K., Waters, B. & Waters, B. (eds.). Springer Science and Business Media Deutschland GmbH, p. 126-156 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13044 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Compact Ring Signatures from Learning with Errors

    Chatterjee, R., Garg, S., Hajiabadi, M., Khurana, D., Liang, X., Malavolta, G., Pandey, O. & Shiehian, S., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 282-312 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12825 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • How to Build a Trapdoor Function from an Encryption Scheme

    Garg, S., Hajiabadi, M., Malavolta, G. & Ostrovsky, R., 2021, Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 3. Tibouchi, M. & Wang, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 220-249 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13092 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Laconic Private Set Intersection and Applications

    Alamati, N., Branco, P., Döttling, N., Garg, S., Hajiabadi, M. & Pu, S., 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. Nissim, K., Waters, B. & Waters, B. (eds.). Springer Science and Business Media Deutschland GmbH, p. 94-125 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13044 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • 2020

    Efficient range-trapdoor functions and applications: Rate-1 OT and more

    Garg, S., Hajiabadi, M. & Ostrovsky, R., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 88-116 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12550 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Master-Key KDM-Secure IBE from Pairings

    Garg, S., Gay, R. & Hajiabadi, M., 2020, Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Kiayias, A., Kohlweiss, M., Wallden, P. & Zikas, V. (eds.). Springer, p. 123-152 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Two-Round Oblivious Transfer from CDH or LPN

    Döttling, N., Garg, S., Hajiabadi, M., Masny, D. & Wichs, D., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 768-797 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12106 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • 2019

    New techniques for efficient trapdoor functions and applications

    Garg, S., Gay, R. & Hajiabadi, M., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer Verlag, p. 33-63 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11478 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Rate-1 Trapdoor Functions from the Diffie-Hellman Problem

    Döttling, N., Garg, S., Hajiabadi, M., Liu, K. & Malavolta, G., 2019, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 585-606 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11923 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Registration-Based Encryption from Standard Assumptions

    Garg, S., Hajiabadi, M., Mahmoody, M., Rahimi, A. & Sekar, S., 2019, Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Lin, D. & Sako, K. (eds.). Springer Verlag, p. 63-93 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11443 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • 2018

    Enhancements are blackbox non-trivial: Impossibility of enhanced trapdoor permutations from standard trapdoor permutations

    Hajiabadi, M., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). Springer Verlag, p. 448-475 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11239 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Limits on the power of garbling techniques for public-key encryption

    Garg, S., Hajiabadi, M., Mahmoody, M. & Mohammed, A., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Shacham, H. & Boldyreva, A. (eds.). Springer Verlag, p. 335-364 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10993 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes

    Döttling, N., Garg, S., Hajiabadi, M. & Masny, D., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-31 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Scopus citations
  • Registration-based encryption: Removing private-key generator from IBE

    Garg, S., Hajiabadi, M., Mahmoody, M. & Rahimi, A., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). Springer Verlag, p. 689-718 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11239 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • Trapdoor functions from the computational diffie-hellman assumption

    Garg, S. & Hajiabadi, M., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 362-391 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10992 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • 2017

    Linear-time zero-knowledge proofs for arithmetic circuit satisfiability

    Bootle, J., Cerulli, A., Ghadafi, E., Groth, J., Hajiabadi, M. & Jakobsen, S. K., 2017, Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Takagi, T. & Peyrin, T. (eds.). Springer Verlag, p. 336-365 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10626 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • Reproducible Circularly Secure Bit Encryption: Applications and Realizations

    Hajiabadi, M. & Kapron, B. M., Oct 1 2017, In: Journal of Cryptology. 30, 4, p. 1187-1237 51 p.

    Research output: Contribution to journalArticlepeer-review

    1 Scopus citations
  • Toward fine-grained blackbox separations between semantic and circular-security notions

    Hajiabadi, M. & Kapron, B. M., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Nielsen, J. B. & Coron, J-S. (eds.). Springer Verlag, p. 561-591 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2016

    On generic constructions of circularly-secure, leakage-resilient public-key encryption schemes

    Hajiabadi, M., Kapron, B. M. & Srinivasan, V., 2016, Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Cheng, C-M., Chung, K-M., Yang, B-Y. & Persiano, G. (eds.). Springer Verlag, p. 129-158 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9615).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • 2015

    Gambling, computational information and encryption security

    Hajiabadi, M. & Kapron, B. M., 2015, Information Theoretic Security - 8th International Conference, ICITS 2015, Proceedings. Wolf, S. & Lehmann, A. (eds.). Springer Verlag, p. 141-158 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9063).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Reproducible circularly-secure bit encryption: Applications and realizations

    Hajiabadi, M. & Kapron, B. M., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). Springer Verlag, p. 224-243 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9215).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Scopus citations
  • 2013

    Computational soundness of coinductive symbolic security under active attacks

    Hajiabadi, M. & Kapron, B. M., 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. p. 539-558 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Scopus citations