Mohammad Hajiabadi

    Calculated based on number of publications stored in Pure and citations from Scopus
    20132024

    Research activity per year

    Search results

    • 2024

      Laconic Branching Programs from the Diffie-Hellman Assumption

      Garg, S., Hajiabadi, M., Miao, P. & Murphy, A., 2024, Public-Key Cryptography – PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Tang, Q. & Teague, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 323-355 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14603 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
      1 Scopus citations
    • Lower-Bounds on Public-Key Operations in PIR

      Dujmovic, J. & Hajiabadi, M., 2024, Advances in Cryptology – EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2024, Proceedings. Joye, M. & Leander, G. (eds.). Springer Science and Business Media Deutschland GmbH, p. 65-87 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14656 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2023

      Algebraic Restriction Codes and Their Applications

      Aggarwal, D., Döttling, N., Dujmovic, J., Hajiabadi, M., Malavolta, G. & Obremski, M., Dec 2023, In: Algorithmica. 85, 12, p. 3602-3648 47 p.

      Research output: Contribution to journalArticlepeer-review

      Open Access
    • Credibility in Private Set Membership

      Garg, S., Hajiabadi, M., Jain, A., Jin, Z., Pandey, O. & Shiehian, S., 2023, Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Boldyreva, A. & Kolesnikov, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 159-189 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13941 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Lower Bounds on Assumptions Behind Registration-Based Encryption

      Hajiabadi, M., Mahmoody, M., Qi, W. & Sarfaraz, S., 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 306-334 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14370 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • Randomness Recoverable Secret Sharing Schemes

      Hajiabadi, M., Khazaei, S. & Vahdani, B., Jul 2023, 4th Conference on Information-Theoretic Cryptography, ITC 2023. Chung, K.-M. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 12. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 267).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2022

      Algebraic Restriction Codes and Their Applications

      Aggarwal, D., Döttling, N., Dujmovic, J., Hajiabadi, M., Malavolta, G. & Obremski, M., Jan 1 2022, 13th Innovations in Theoretical Computer Science Conference, ITCS 2022. Braverman, M. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 2. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 215).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • On the Worst-Case Inefficiency of CGKA

      Bienstock, A., Dodis, Y., Garg, S., Grogan, G., Hajiabadi, M. & Rösler, P., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 213-243 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13748 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • 2021

      Amortizing Rate-1 OT and Applications to PIR and PSI

      Chase, M., Garg, S., Hajiabadi, M., Li, J. & Miao, P., 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. Nissim, K., Waters, B. & Waters, B. (eds.). Springer Science and Business Media Deutschland GmbH, p. 126-156 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13044 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      6 Scopus citations
    • Compact Ring Signatures from Learning with Errors

      Chatterjee, R., Garg, S., Hajiabadi, M., Khurana, D., Liang, X., Malavolta, G., Pandey, O. & Shiehian, S., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 282-312 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12825 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      2 Scopus citations
    • How to Build a Trapdoor Function from an Encryption Scheme

      Garg, S., Hajiabadi, M., Malavolta, G. & Ostrovsky, R., 2021, Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 3. Tibouchi, M. & Wang, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 220-249 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13092 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      4 Scopus citations
    • Laconic Private Set Intersection and Applications

      Alamati, N., Branco, P., Döttling, N., Garg, S., Hajiabadi, M. & Pu, S., 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. Nissim, K., Waters, B. & Waters, B. (eds.). Springer Science and Business Media Deutschland GmbH, p. 94-125 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13044 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      9 Scopus citations
    • 2020

      Efficient range-trapdoor functions and applications: Rate-1 OT and more

      Garg, S., Hajiabadi, M. & Ostrovsky, R., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 88-116 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12550 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      7 Scopus citations
    • Master-Key KDM-Secure IBE from Pairings

      Garg, S., Gay, R. & Hajiabadi, M., 2020, Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Kiayias, A., Kohlweiss, M., Wallden, P. & Zikas, V. (eds.). Springer, p. 123-152 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12110 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      5 Scopus citations
    • Two-Round Oblivious Transfer from CDH or LPN

      Döttling, N., Garg, S., Hajiabadi, M., Masny, D. & Wichs, D., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 768-797 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12106 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      29 Scopus citations
    • 2019

      New techniques for efficient trapdoor functions and applications

      Garg, S., Gay, R. & Hajiabadi, M., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer Verlag, p. 33-63 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11478 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      12 Scopus citations
    • Rate-1 Trapdoor Functions from the Diffie-Hellman Problem

      Döttling, N., Garg, S., Hajiabadi, M., Liu, K. & Malavolta, G., 2019, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 585-606 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11923 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      1 Scopus citations
    • Registration-Based Encryption from Standard Assumptions

      Garg, S., Hajiabadi, M., Mahmoody, M., Rahimi, A. & Sekar, S., 2019, Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Lin, D. & Sako, K. (eds.). Springer Verlag, p. 63-93 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11443 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      23 Scopus citations
    • 2018

      Enhancements are blackbox non-trivial: Impossibility of enhanced trapdoor permutations from standard trapdoor permutations

      Hajiabadi, M., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). Springer Verlag, p. 448-475 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11239 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Limits on the power of garbling techniques for public-key encryption

      Garg, S., Hajiabadi, M., Mahmoody, M. & Mohammed, A., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Shacham, H. & Boldyreva, A. (eds.). Springer Verlag, p. 335-364 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10993 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      9 Scopus citations
    • New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes

      Döttling, N., Garg, S., Hajiabadi, M. & Masny, D., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-31 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      30 Scopus citations
    • Registration-based encryption: Removing private-key generator from IBE

      Garg, S., Hajiabadi, M., Mahmoody, M. & Rahimi, A., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). Springer Verlag, p. 689-718 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11239 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      29 Scopus citations
    • Trapdoor functions from the computational diffie-hellman assumption

      Garg, S. & Hajiabadi, M., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 362-391 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10992 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      20 Scopus citations
    • 2017

      Linear-time zero-knowledge proofs for arithmetic circuit satisfiability

      Bootle, J., Cerulli, A., Ghadafi, E., Groth, J., Hajiabadi, M. & Jakobsen, S. K., 2017, Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Takagi, T. & Peyrin, T. (eds.). Springer Verlag, p. 336-365 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10626 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      36 Scopus citations
    • Reproducible Circularly Secure Bit Encryption: Applications and Realizations

      Hajiabadi, M. & Kapron, B. M., Oct 1 2017, In: Journal of Cryptology. 30, 4, p. 1187-1237 51 p.

      Research output: Contribution to journalArticlepeer-review

      Open Access
      1 Scopus citations
    • Toward fine-grained blackbox separations between semantic and circular-security notions

      Hajiabadi, M. & Kapron, B. M., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Nielsen, J. B. & Coron, J.-S. (eds.). Springer Verlag, p. 561-591 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      2 Scopus citations
    • 2016

      On generic constructions of circularly-secure, leakage-resilient public-key encryption schemes

      Hajiabadi, M., Kapron, B. M. & Srinivasan, V., 2016, Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Cheng, C.-M., Chung, K.-M., Yang, B.-Y. & Persiano, G. (eds.). Springer Verlag, p. 129-158 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9615).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      5 Scopus citations
    • 2015

      Gambling, computational information and encryption security

      Hajiabadi, M. & Kapron, B. M., 2015, Information Theoretic Security - 8th International Conference, ICITS 2015, Proceedings. Wolf, S. & Lehmann, A. (eds.). Springer Verlag, p. 141-158 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9063).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Reproducible circularly-secure bit encryption: Applications and realizations

      Hajiabadi, M. & Kapron, B. M., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). Springer Verlag, p. 224-243 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9215).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
      7 Scopus citations
    • 2013

      Computational soundness of coinductive symbolic security under active attacks

      Hajiabadi, M. & Kapron, B. M., 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. p. 539-558 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
      2 Scopus citations