Publication | Date of Publication | Type |
---|
Robust decentralized multi-client functional encryption: motivation, definition, and inner-product constructions | 2024-09-13 | Paper |
Compact accountable ring signatures in the plain model | 2024-07-17 | Paper |
Compact ring signatures with post-quantum security in standard model | 2024-07-17 | Paper |
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts | 2024-04-11 | Paper |
A tightly secure ID-based signature scheme under DL assumption in AGM | 2024-01-11 | Paper |
Efficient unique ring signatures from lattices | 2023-07-28 | Paper |
Multimodal private signatures | 2023-06-28 | Paper |
Optimal tightness for chain-based unique signatures | 2022-08-30 | Paper |
Lattice-based IBE with equality test supporting flexible authorization in the standard model | 2022-07-06 | Paper |
Generic construction for tightly-secure signatures from discrete log | 2021-09-27 | Paper |
Certificateless aggregate signature scheme secure against fully chosen-key attacks | 2021-03-31 | Paper |
Accountable identity-based encryption with distributed private key generators | 2021-03-16 | Paper |
Generalized public-key cryptography with tight security | 2021-02-05 | Paper |
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters | 2020-09-22 | Paper |
Privacy-enhanced attribute-based private information retrieval | 2020-09-08 | Paper |
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes | 2020-07-20 | Paper |
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts | 2020-01-29 | Paper |
Strongly leakage resilient authenticated key exchange, revisited | 2019-11-07 | Paper |
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems | 2019-03-26 | Paper |
Introduction to Security Reduction | 2018-07-18 | Paper |
Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost | 2018-02-06 | Paper |
Functional encryption for computational hiding in prime order groups via pair encodings | 2018-01-26 | Paper |
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample | 2017-11-15 | Paper |
Strong authenticated key exchange with auxiliary inputs | 2017-09-15 | Paper |
A note on the strong authenticated key exchange with auxiliary inputs | 2017-09-15 | Paper |
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions | 2017-02-01 | Paper |
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction | 2017-01-06 | Paper |
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update | 2017-01-06 | Paper |
Oblivious Keyword Search with Authorization | 2017-01-06 | Paper |
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups | 2016-10-21 | Paper |
One-Round Strong Oblivious Signature-Based Envelope | 2016-09-02 | Paper |
Public Key Encryption with Authorized Keyword Search | 2016-09-02 | Paper |
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing | 2016-09-02 | Paper |
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance | 2016-08-31 | Paper |
Generalized closest substring encryption | 2016-06-27 | Paper |
Strongly Leakage-Resilient Authenticated Key Exchange | 2016-04-08 | Paper |
Efficient dynamic threshold identity-based encryption with constant-size ciphertext | 2015-12-08 | Paper |
A New General Framework for Secure Public Key Encryption with Keyword Search | 2015-10-20 | Paper |
Improved Identity-Based Online/Offline Encryption | 2015-10-20 | Paper |
Efficient and secure stored-value cards with leakage resilience | 2013-08-19 | Paper |
Membership Encryption and Its Applications | 2013-06-28 | Paper |
A Pre-computable Signature Scheme with Efficient Verification for RFID | 2012-06-29 | Paper |
Online/Offline Verification of Short Signatures | 2011-07-29 | Paper |
Efficient Online/Offline Signatures with Computational Leakage Resilience in Online Phase | 2011-07-29 | Paper |
How to Prove Security of a Signature with a Tighter Security Reduction | 2009-12-11 | Paper |
Multi-identity management for identity-based cryptography | 2009-04-28 | Paper |
Identity-Based Online/Offline Encryption | 2009-02-12 | Paper |
Multi-Identity Single-Key Decryption without Random Oracles | 2009-02-10 | Paper |
Optimal Online/Offline Signature: How to Sign a Message without Online Computation | 2009-01-27 | Paper |
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles | 2008-04-15 | Paper |
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key | 2007-11-29 | Paper |