Chin Ho Lee
Northeastern University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Chin Ho Lee.
international cryptology conference | 2013
Andrej Bogdanov; Chin Ho Lee
We show that public-key bit encryption schemes which support weak (i.e., compact) homomorphic evaluation of any sufficiently “sensitive” collection of functions cannot be proved message indistinguishable beyond AM ∩ coAM via general (adaptive) reductions, and beyond statistical zero-knowledge via reductions of constant query complexity. Examples of sensitive collections include parities, majorities, and the class consisting of all AND and OR functions.
theory of cryptography conference | 2016
Andrej Bogdanov; Chin Ho Lee
We show that homomorphic evaluation of any non-trivial functionality of sufficiently many inputs with respect to any CPA secure homomorphic encryption scheme cannot be implemented by circuits of polynomial size and constant depth, i.e., in the class
ACM Transactions on Computation Theory | 2018
Chin Ho Lee; Emanuele Viola
international workshop and international workshop on approximation, randomization, and combinatorial optimization. algorithms and techniques | 2016
Ravi B. Boppana; Johan Håstad; Chin Ho Lee; Emanuele Viola
\mathrm {AC}^0
IACR Cryptology ePrint Archive | 2011
Andrej Bogdanov; Chin Ho Lee
Electronic Colloquium on Computational Complexity | 2015
Chin Ho Lee; Emanuele Viola
. In contrast, we observe that there exist ordinary public-key encryption schemes of quasipolynomial security in
Electronic Colloquium on Computational Complexity | 2017
Elad Haramaty; Chin Ho Lee; Emanuele Viola
Electronic Colloquium on Computational Complexity | 2012
Andrej Bogdanov; Chin Ho Lee
\mathrm {AC}^0
Electronic Colloquium on Computational Complexity | 2017
Chin Ho Lee; Emanuele Viola
Electronic Colloquium on Computational Complexity | 2017
Chin Ho Lee; Emanuele Viola
assuming noisy parities are exponentially hard to learn. We view this as evidence that homomorphic evaluation is inherently more complex than basic operations in encryption schemes.