scispace - formally typeset
T

T-H. Hubert Chan

Researcher at University of Hong Kong

Publications -  43
Citations -  1036

T-H. Hubert Chan is an academic researcher from University of Hong Kong. The author has contributed to research in topics: Randomized algorithm & Approximation algorithm. The author has an hindex of 16, co-authored 43 publications receiving 770 citations.

Papers
More filters
Proceedings ArticleDOI

Oblivious Data Structures

TL;DR: In this article, a pointer-based technique and a locality-based algorithm are proposed to make data structures and algorithms oblivious to access patterns that exhibit some degree of predictability, such as map, sets, priority queues, stacks, deques, etc.
Proceedings ArticleDOI

SCORAM: Oblivious RAM for Secure Computation

TL;DR: This work presents SCORAM, a heuristic compact ORAM design optimized for secure computation protocols, which is almost 10x smaller in circuit size and also faster than all other designs tested for realistic settings.
Book ChapterDOI

Optimal lower bound for differentially private multi-party aggregation

TL;DR: It is shown that any n-party protocol computing the sum with sparse communication graph must incur an additive error of $\Omega(\sqrt{n})$ with constant probability, in order to defend against potential coalitions of compromised users.
Proceedings ArticleDOI

Finding Subgraphs with Maximum Total Density and Limited Overlap

TL;DR: This work defines and study a natural generalization of the densest subgraph problem, where the main goal is to find at most $k$ sub graphs with maximum total aggregate density, while satisfying an upper bound on the pairwise Jaccard coefficient between the sets of nodes of the subgraphs.
Posted Content

Communication Complexity of Byzantine Agreement, Revisited

TL;DR: In this paper, the authors show that disallowing after-the-fact removal is necessary for achieving subquadratic-communication Byzantine agreement (BA) protocols with near-optimal resilience and expected constant rounds under standard cryptographic assumptions and a public-key infrastructure.