| Publication | Date of Publication | Type |
|---|
Updatable public-key encryption, revisited | 2024-11-13 | Paper |
On proving equivalence class signatures secure from non-interactive assumptions | 2024-11-12 | Paper |
Concurrently secure blind Schnorr signatures | 2024-11-12 | Paper |
SNACKs: leveraging proofs of sequential work for blockchain light clients Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Non-interactive Mimblewimble transactions, revisited Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Approximate distance-comparison-preserving symmetric encryption Lecture Notes in Computer Science | 2023-07-25 | Paper |
The One-More Discrete Logarithm Assumption in the Generic Group Model Lecture Notes in Computer Science | 2023-05-26 | Paper |
Efficient signatures on randomizable ciphertexts | 2022-12-16 | Paper |
Double-authentication-preventing signatures in the standard model | 2022-12-16 | Paper |
A classification of computational assumptions in the algebraic group model | 2022-11-09 | Paper |
Simpler constructions of asymmetric primitives from obfuscation | 2022-07-06 | Paper |
Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model | 2022-03-23 | Paper |
Transferable e-cash: a cleaner model and the first practical instantiation | 2021-12-21 | Paper |
Adaptively secure proxy re-encryption | 2020-01-28 | Paper |
Structure-preserving signatures on equivalence classes and constant-size anonymous credentials Journal of Cryptology | 2019-06-20 | Paper |
The algebraic group model and its applications | 2018-09-26 | Paper |
Non-interactive zaps of knowledge | 2018-08-10 | Paper |
Weakly secure equivalence-class signatures from standard assumptions | 2018-05-29 | Paper |
Subversion-zero-knowledge SNARKs | 2018-05-16 | Paper |
Access Control Encryption for Equality, Comparison, and More Lecture Notes in Computer Science | 2017-06-13 | Paper |
NIZKs with an untrusted CRS: security in the face of parameter subversion Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions Lecture Notes in Computer Science | 2016-10-21 | Paper |
Offline witness encryption Applied Cryptography and Network Security | 2016-10-04 | Paper |
Constrained PRFs for unbounded inputs with short keys Applied Cryptography and Network Security | 2016-10-04 | Paper |
Structure-preserving signatures and commitments to group elements Journal of Cryptology | 2016-06-01 | Paper |
Constrained PRFs for unbounded inputs Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
Standard Security Does Imply Security Against Selective Opening for Markov Distributions Theory of Cryptography | 2016-03-23 | Paper |
Practical Round-Optimal Blind Signatures in the Standard Model Lecture Notes in Computer Science | 2015-12-10 | Paper |
A quasipolynomial reduction for generalized selective decryption on trees Lecture Notes in Computer Science | 2015-12-10 | Paper |
Anonymous transferable e-cash Lecture Notes in Computer Science | 2015-08-27 | Paper |
Key-homomorphic constrained pseudorandom functions Theory of Cryptography | 2015-07-06 | Paper |
Adaptive Security of Constrained PRFs Lecture Notes in Computer Science | 2015-01-06 | Paper |
Constrained verifiable random functions Lecture Notes in Computer Science | 2014-10-14 | Paper |
Policy-Based Signatures Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Enhanced chosen-ciphertext security and applications Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Efficient signatures of knowledge and DAA in the standard model Applied Cryptography and Network Security | 2014-01-24 | Paper |
Plaintext-checkable encryption Lecture Notes in Computer Science | 2012-06-08 | Paper |
Achieving optimal anonymity in transferable e-cash with a judge Lecture Notes in Computer Science | 2011-06-29 | Paper |
Commuting signatures and verifiable encryption Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Signatures on randomizable ciphertexts Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Structure-preserving signatures and commitments to group elements Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Batch Groth-Sahai Applied Cryptography and Network Security | 2010-07-06 | Paper |
Public-key encryption with non-interactive opening: new constructions and stronger definitions Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Fair blind signatures without random oracles Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Strong cryptography from weak secrets. Building efficient PKE and IBE from distributed passwords Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Efficient rational secret sharing in standard communication networks Theory of Cryptography | 2010-02-24 | Paper |
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures Pairing-Based Cryptography – Pairing 2009 | 2009-08-18 | Paper |
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures Formal to Practical Security | 2009-06-09 | Paper |
Anonymous Proxy Signatures Lecture Notes in Computer Science | 2008-11-20 | Paper |