Mingyuan Wang

Orcid: 0009-0000-9057-1007

Affiliations:
  • University of California Berkeley, CA, USA
  • Purdue University, West Lafayette, IN, USA (Ph.D.)


According to our database1, Mingyuan Wang authored at least 30 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Threshold Encryption with Silent Setup.
IACR Cryptol. ePrint Arch., 2024

Practical Mempool Privacy via One-time Setup Batched Threshold Encryption.
IACR Cryptol. ePrint Arch., 2024

Scalable Multiparty Computation from Non-linear Secret Sharing.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Reusable Secure Computation in the Plain Model.
IACR Cryptol. ePrint Arch., 2023

hinTS: Threshold Signatures with Silent Setup.
IACR Cryptol. ePrint Arch., 2023

How to Prove Statements Obliviously?
IACR Cryptol. ePrint Arch., 2023

Experimenting with Zero-Knowledge Proofs of Training.
IACR Cryptol. ePrint Arch., 2023

Publicly Detectable Watermarking for Language Models.
IACR Cryptol. ePrint Arch., 2023

Threshold Signatures in the Multiverse.
IACR Cryptol. ePrint Arch., 2023

2022
Cryptography with Weights: MPC, Encryption and Signatures.
IACR Cryptol. ePrint Arch., 2022

IBE with Incompressible Master Secret and Small Identity Secrets.
IACR Cryptol. ePrint Arch., 2022

Overparameterized (robust) models from computational constraints.
CoRR, 2022

Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Overparameterization from Computational Constraints.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Improved Bound on the Local Leakage-resilience of Shamir's Secret Sharing.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its Consequences.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

2021
Computational Hardness of Optimal FairComputation: Beyond Minicrypt.
IACR Cryptol. ePrint Arch., 2021

Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages.
IACR Cryptol. ePrint Arch., 2021

Optimally-secure Coin-tossing against a Byzantine Adversary.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Efficient Distributed Coin-tossing Protocols.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Computational Hardness of Optimal Fair Computation: Beyond Minicrypt.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing.
IACR Cryptol. ePrint Arch., 2020

On Leakage-Resilient Secret Sharing.
IACR Cryptol. ePrint Arch., 2020

Design & Analysis of Optimal Coin-tossing: New Techniques.
IACR Cryptol. ePrint Arch., 2020

Coin Tossing with Lazy Defense: Hardness of Computation Results.
IACR Cryptol. ePrint Arch., 2020

2019
Explicit Rate-1 Non-malleable Codes for Local Tampering.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Non-malleable Codes Against Lookahead Tampering.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

2017
Constant-rate Non-malleable Codes in the Split-state Model.
IACR Cryptol. ePrint Arch., 2017


  Loading...