| Publication | Date of Publication | Type |
|---|
Reinsurance contracts under Stackelberg game and market equilibrium RAIRO. Operations Research | 2025-01-08 | Paper |
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts Information Sciences | 2024-04-11 | Paper |
A tightly secure ID-based signature scheme under DL assumption in AGM | 2024-01-11 | Paper |
Efficient Traceable Oblivious Transfer and Its Applications Information Security Practice and Experience | 2023-06-30 | Paper |
DSH: Deniable Secret Handshake Framework Information Security Practice and Experience | 2023-06-30 | Paper |
Multimodal private signatures Advances in Cryptology – CRYPTO 2022 | 2023-06-28 | Paper |
Public key encryption with fuzzy matching | 2023-04-13 | Paper |
Broadcast Authenticated Encryption with Keyword Search | 2023-04-13 | Paper |
Concise Mercurial Subvector Commitments: Definitions and Constructions | 2023-04-13 | Paper |
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key 1511.9413 | 2022-12-22 | Paper |
Group-Based Source-Destination Verifiable Encryption with Blacklist Checking Information Security Practice and Experience | 2022-12-09 | Paper |
Attribute based broadcast encryption with short ciphertext and decryption key | 2022-08-19 | Paper |
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved | 2022-05-18 | Paper |
Privacy-enhanced remote data integrity checking with updatable timestamp Information Sciences | 2021-04-19 | Paper |
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation Information Sciences | 2020-10-07 | Paper |
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters Information Sciences | 2020-09-22 | Paper |
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes Information Sciences | 2020-07-20 | Paper |
The Wiener attack on RSA revisited: a quest for the exact bound | 2020-05-27 | Paper |
Location based encryption | 2020-05-27 | Paper |
Towards enhanced security for certificateless public-key authenticated encryption with keyword search | 2020-01-10 | Paper |
Strongly leakage resilient authenticated key exchange, revisited Designs, Codes and Cryptography | 2019-11-07 | Paper |
Outsourced ciphertext-policy attribute-based encryption with equality test | 2019-10-31 | Paper |
Cooperative secret sharing using QR codes and symmetric keys Symmetry | 2019-10-30 | Paper |
A privacy preserving source verifiable encryption scheme | 2018-12-07 | Paper |
A new public remote integrity checking scheme with user and data privacy International Journal of Applied Cryptography | 2018-11-26 | Paper |
Efficient attribute-based encryption with blackbox traceability | 2018-11-07 | Paper |
Deniable ring authentication based on projective hash functions | 2018-11-07 | Paper |
One-Round Attribute-Based Key Exchange in the Multi-Party Setting International Journal of Foundations of Computer Science | 2018-02-23 | Paper |
Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample | 2017-11-15 | Paper |
Strong authenticated key exchange with auxiliary inputs Designs, Codes and Cryptography | 2017-09-15 | Paper |
A note on the strong authenticated key exchange with auxiliary inputs Designs, Codes and Cryptography | 2017-09-15 | Paper |
Mergeable and revocable identity-based encryption | 2017-08-25 | Paper |
Privacy-preserving \(k\)-time authenticated secret handshakes | 2017-08-25 | Paper |
Hierarchical functional encryption for linear transformations | 2017-08-25 | Paper |
A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange International Journal of Computer Mathematics | 2017-07-28 | Paper |
Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Achieving IND-CCA Security for Functional Encryption for Inner Products Information Security and Cryptology | 2017-05-05 | Paper |
Cryptographic reverse firewall via malleable smooth projective hash functions Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Iterated random oracle: a universal approach for finding loss in security reduction Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
One-round attribute-based key exchange in the multi-party setting Provable Security | 2017-01-06 | Paper |
Edit distance based encryption and its application Information Security and Privacy | 2016-09-02 | Paper |
One-round strong oblivious signature-based envelope Information Security and Privacy | 2016-09-02 | Paper |
Proxy signature with revocation Information Security and Privacy | 2016-09-02 | Paper |
Linear encryption with keyword search Information Security and Privacy | 2016-09-02 | Paper |
Exploiting the error correction mechanism in QR codes for secret sharing Information Security and Privacy | 2016-08-31 | Paper |
Threshold broadcast encryption with keyword search Information Security and Cryptology | 2016-07-25 | Paper |
Strongly leakage-resilient authenticated key exchange Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
An efficient privacy-preserving e-coupon system Information Security and Cryptology | 2015-11-25 | Paper |
A new general framework for secure public key encryption with keyword search Information Security and Privacy | 2015-10-20 | Paper |
A new public remote integrity checking scheme with user privacy Information Security and Privacy | 2015-10-20 | Paper |
Efficient Hidden Vector Encryption with Constant-Size Ciphertext Computer Security - ESORICS 2014 | 2015-07-24 | Paper |
Ambiguous optimistic fair exchange: definition and constructions Theoretical Computer Science | 2014-12-02 | Paper |
Identity based identification from algebraic coding theory Theoretical Computer Science | 2014-01-13 | Paper |
\(k\)-time proxy signature: formal definition and efficient construction Provable Security | 2013-10-23 | Paper |
Certificateless cryptography with KGC trust level 3 Theoretical Computer Science | 2011-10-10 | Paper |
Certificateless public key encryption: a new generic construction and two pairing-free schemes Theoretical Computer Science | 2011-02-21 | Paper |
Dynamic group key exchange revisited Cryptology and Network Security | 2010-12-07 | Paper |
Probabilistic public key encryption with equality test Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Efficient Non-interactive Range Proof Lecture Notes in Computer Science | 2009-07-23 | Paper |
A More Natural Way to Construct Identity-Based Identification Schemes Applied Cryptography and Network Security | 2009-03-10 | Paper |
Ambiguous Optimistic Fair Exchange Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
Two-factor mutual authentication based on smart cards and passwords Journal of Computer and System Sciences | 2008-11-19 | Paper |
A new framework for the design and analysis of identity-based identification schemes Theoretical Computer Science | 2008-11-18 | Paper |
Traceable and Retrievable Identity-Based Encryption Applied Cryptography and Network Security | 2008-06-13 | Paper |
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
Efficient Anonymous Roaming and Its Security Analysis Applied Cryptography and Network Security | 2007-09-24 | Paper |
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices Theoretical Computer Science | 2007-06-13 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |