| Publication | Date of Publication | Type |
|---|
Anonymous tokens with stronger metadata bit hiding from algebraic MACs Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
| Amortizing rate-1 OT and applications to PIR and PSI | 2023-04-13 | Paper |
| Private set intersection in the internet setting from lightweight oblivious PRF | 2022-12-07 | Paper |
Homomorphic Encryption Standard Protecting Privacy through Homomorphic Encryption | 2022-11-02 | Paper |
| Reusable non-interactive secure computation | 2020-03-09 | Paper |
Simplifying design and analysis of complex predicate encryption schemes Lecture Notes in Computer Science | 2017-06-13 | Paper |
Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Efficient zero-knowledge proof of algebraic and non-algebraic statements with applications to privacy preserving credentials Advances in Cryptology – CRYPTO 2016 | 2016-11-09 | Paper |
Constant-size structure-preserving signatures: generic constructions and simple assumptions Journal of Cryptology | 2016-10-13 | Paper |
A study of pair encodings: predicate encryption in prime order groups Theory of Cryptography | 2016-04-08 | Paper |
Executable proofs, input-size hiding secure computation and a new ideal world Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Anonymous transferable e-cash Lecture Notes in Computer Science | 2015-08-27 | Paper |
Déjà Q: using dual systems to revisit \(q\)-type assumptions Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Mercurial commitments with applications to zero-knowledge sets Journal of Cryptology | 2013-06-27 | Paper |
Verifiable elections that scale for free Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Constant-size structure-preserving signatures: generic constructions and simple assumptions Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Succinct malleable NIZKs and an application to compact shuffles Theory of Cryptography | 2013-03-18 | Paper |
A new hash-and-sign approach and structure-preserving signatures from DLIN Lecture Notes in Computer Science | 2012-09-25 | Paper |
Secure database commitments and universal arguments of quasi knowledge Lecture Notes in Computer Science | 2012-09-25 | Paper |
Malleable proof systems and applications Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Functional Re-encryption and Collusion-Resistant Obfuscation Theory of Cryptography | 2012-06-15 | Paper |
Structured encryption and controlled disclosure Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Randomizable Proofs and Delegatable Anonymous Credentials Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
Compact E-Cash and Simulatable VRFs Revisited Pairing-Based Cryptography – Pairing 2009 | 2009-08-18 | Paper |
Simulatable VRFs with Applications to Multi-theorem NIZK Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
Mercurial Commitments with Applications to Zero-Knowledge Sets Lecture Notes in Computer Science | 2008-05-06 | Paper |
P-signatures and Noninteractive Anonymous Credentials Theory of Cryptography | 2008-03-05 | Paper |
On Signatures of Knowledge Lecture Notes in Computer Science | 2007-09-04 | Paper |
Multi-authority Attribute Based Encryption Theory of Cryptography | 2007-08-30 | Paper |