Hai Hoang Nguyen
About.
I am a postdoctoral researcher in the Department of Computer Science at ETH Zurich, hosted by Professor Ueli Maurer. Before that, I was a postdoc at Purdue University hosted by Aniket Kate. I did my PhD in Computer Science at Purdue University under the guidance of Professor Hemanta K. Maji. I am interested in Theoretical Computer Science, Cryptography, Algorithms, and Algorithmic Game Theory.
Drafts.
Unconditional Security using (Random) Anonymous Bulletin Board [pdf]
with Aniket Kate Hemanta K. Maji Albert Yu
Leakage-resilience of Shamir’s Secret-sharing: Derandomization Challenges
with Hemanta K. Maji, Anat Paskin-Cherniavsky, Xiuyu Ye
Disincentivize Collusion in Verifiable Secret Sharing
Conference Papers.
Constructing Leakage-resilient Shamir’s Secret Sharing: Over Composite Order Fields (EUROCRYPT 2024)
with Hemanta K. Maji, Anat Paskin-Cherniavsky, Xiuyu Ye )
Randomized Functions with High Round Complexity (TCC 2023) [pdf]
with Saugata Basu Hamidreza Amini Khorasgani, Hemanta K. MajiLearning Non-parametric Choice Models with Discrete Fourier Analysis (WINE 2023) [pdf]
with Thanh Nguyen, Haoyu Song
Feasibility, Efficiency, and Robustness of Secure Computation (PhD Thesis) [pdf]
Geometry of Secure Two-party Computation (FOCS 2022) [pdf]
with Saugata Basu Hamidreza Amini Khorasgani, Hemanta K. Maji
Secure Non-interactive Simulation: Feasibility & Rate (EUROCRYPT 2022) [pdf]
with Hamidreza Amini Khorasgani, Hemanta K. MajiSecure Non-interactive Simulation from Arbitrary Joint Distributions (TCC 2022) [pdf]
with Hamidreza Amini Khorasgani, Hemanta K. MajiLeakage-resilient Linear Secret-sharing against arbitrary Bounded-size Leakage Family (TCC 2022) [pdf]
with Hemanta K. Maji , Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang, Xiuyu Ye , Albert YuImproved Bound on the Local Leakage-resilience of Shamir's Secret Sharing (ISIT 2022) [pdf]
with Hemanta K. Maji, Anat Paskin-Cherniavsky, Mingyuan Wang,Tight Estimate of the Local Leakage Resilience of the Additive Secret-sharing Scheme & its Consequences (ITC 2022) [pdf]
with Hemanta K. Maji , Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang, Xiuyu Ye , Albert YuLeakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages (EUROCRYPT 2021) [pdf]
with Hemanta K. Maji, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan WangAllocation with Weak Priorities and General Constraints (EC 2021) [pdf]
with Young-San Lin , Thanh NguyenLower Bounds for Leakage-Resilient Secret Sharing Schemes against Probing Attacks (ISIT 2021) [pdf]
with Donald Q. Adams, Hemanta K. Maji, Minh L. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan WangP4-free Partition and Cover Numbers and Application (ITC 2021) [pdf]
with Alexander R. Block, Simina Branzei, Hemanta K. Maji , Himanshi Mehta, Tamalika MukherjeeStability in Matching Markets with Complex Constraints (EC 2019) [pdf]
with Thanh Nguyen, Alexander TeytelboymSecure Computation with Constant Communication Overhead using Multiplication Embeddings (INDOCRYPT 2018) [pdf]
with Alexander R. Block, Hemanta K. MajiSecure Computation using Leaky Correlations (Asymptotically Optimal Constructions) (TCC 2018) [pdf]
with Alexander R. Block, Divya Gupta, Hemanta K. MajiSecure Computation based on Leaky Correlations: High Resilience Setting (CRYPTO 2017) [pdf]
with Alexander R. Block, Hemanta K. Maji
Journal Papers.
Allocation with Weak Priorities and General Constraints (Operation Research 2022) [pdf]
with Young-San Lin , Thanh NguyenStability in Matching Markets with Complex Constraints (Management Science 2020) [pdf]
with Thanh Nguyen, Alexander Teytelboym