Publication | Date of Publication | Type |
---|
Attribute based encryption for Turing machines from lattices | 2024-12-13 | Paper |
Signature for objects: formalizing how to authenticate physical data and more | 2024-07-17 | Paper |
Compact NIZKs from standard assumptions on bilinear maps | 2024-07-10 | Paper |
Constant input attribute based (and predicate) encryption from evasive and tensor LWE | 2024-02-06 | Paper |
Public key encryption with secure key leasing | 2024-01-16 | Paper |
Broadcast, trace and revoke with optimal parameters from polynomial hardness | 2023-12-12 | Paper |
Bounded functional encryption for Turing machines: adaptive security from general assumptions | 2023-08-14 | Paper |
Multi-input attribute based encryption and predicate encryption | 2023-06-12 | Paper |
Direct computation of branching programs and its applications to more efficient lattice-based cryptography | 2023-04-21 | Paper |
Adaptively secure inner product encryption from LWE | 2023-03-29 | Paper |
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition | 2022-12-22 | Paper |
Adaptively secure constrained pseudorandom functions in the standard model | 2022-11-09 | Paper |
Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 | 2022-09-22 | Paper |
Functional encryption for Turing machines with dynamic bounded collusion from LWE | 2022-05-18 | Paper |
Non-interactive secure multiparty computation for symmetric functions, revisited: more efficient constructions and extensions | 2022-04-22 | Paper |
Round-optimal blind signatures in the plain model from classical and quantum standard assumptions | 2021-12-08 | Paper |
Optimal broadcast encryption from pairings and LWE | 2021-12-01 | Paper |
Compact NIZKs from standard assumptions on bilinear maps | 2021-12-01 | Paper |
CP-ABE for circuits (and More) in the symmetric key setting | 2021-12-01 | Paper |
Optimal broadcast encryption from LWE and pairings in the standard model | 2021-12-01 | Paper |
Compact designated verifier NIZKs from the CDH assumption without pairings | 2021-11-24 | Paper |
Tighter security proofs for GPV-IBE in the quantum random oracle model | 2021-04-07 | Paper |
Attribute based encryption for deterministic finite automata from DLIN | 2020-04-30 | Paper |
Generic hardness of inversion on ring and its relation to self-bilinear map | 2020-04-21 | Paper |
Exploring constructions of compact NIZKs from various assumptions | 2020-03-09 | Paper |
Attribute-based encryption (and more) for nondeterministic finite automata from LWE | 2020-03-09 | Paper |
Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions | 2020-02-06 | Paper |
Group signatures without NIZK: from lattices in the standard model | 2020-02-04 | Paper |
Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR | 2020-01-28 | Paper |
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\) | 2020-01-28 | Paper |
Tighter security proofs for GPV-IBE in the quantum random oracle model | 2019-01-23 | Paper |
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups | 2018-09-26 | Paper |
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems | 2018-07-03 | Paper |
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications | 2018-01-05 | Paper |
Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques | 2017-10-27 | Paper |
Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps | 2017-01-06 | Paper |
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security | 2016-12-19 | Paper |
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli | 2016-10-27 | Paper |
Attribute-Based Encryption for Range Attributes | 2016-10-21 | Paper |
Attribute Based Encryption with Direct Efficiency Tradeoff | 2016-10-04 | Paper |
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters | 2016-07-15 | Paper |
A Framework for Identity-Based Encryption with Almost Tight Security | 2016-06-10 | Paper |
Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs | 2016-06-10 | Paper |
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings | 2016-03-02 | Paper |
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues | 2014-10-14 | Paper |
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications | 2014-08-07 | Paper |
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption | 2014-03-25 | Paper |
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption | 2013-04-19 | Paper |
Space Efficient Signature Schemes from the RSA Assumption | 2012-07-20 | Paper |
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication | 2012-07-20 | Paper |
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More | 2012-06-08 | Paper |
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption | 2011-03-15 | Paper |
Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption | 2010-10-12 | Paper |