| Publication | Date of Publication | Type |
|---|
Provably secure group authentication in the asynchronous communication model | 2024-04-19 | Paper |
Leakage-resilient identity-based cryptography from minimal assumptions Designs, Codes and Cryptography | 2023-11-07 | Paper |
Structure-preserving linearly homomorphic signature with designated combiner for subspace Information Security and Privacy | 2023-07-26 | Paper |
An Efficient and Provably Secure Private Polynomial Evaluation Scheme Information Security Practice and Experience | 2023-06-30 | Paper |
Key exposure resistant group key agreement protocol | 2023-04-13 | Paper |
Measurement-device-independent quantum secure multiparty summation Quantum Information Processing | 2022-11-29 | Paper |
Secure two-party integer comparison protocol without any third party Quantum Information Processing | 2022-11-24 | Paper |
Verifiable quantum key exchange with authentication International Journal of Theoretical Physics | 2021-11-05 | Paper |
Novel generic construction of leakage-resilient PKE scheme with CCA security Designs, Codes and Cryptography | 2021-06-24 | Paper |
Improvement of attribute-based encryption using Blakley secret sharing | 2021-06-08 | Paper |
Quantum secure multi-party private set intersection cardinality International Journal of Theoretical Physics | 2020-09-04 | Paper |
Cryptanalysis and improvement of quantum sealed-bid auction International Journal of Theoretical Physics | 2020-06-19 | Paper |
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security Theoretical Computer Science | 2020-01-29 | Paper |
Provably secure proactive secret sharing without the adjacent assumption | 2020-01-10 | Paper |
Realizing secret sharing with general access structure Information Sciences | 2020-01-06 | Paper |
Strong privacy-preserving two-party scalar product quantum protocol International Journal of Theoretical Physics | 2019-12-19 | Paper |
Cloud-based data-sharing scheme using verifiable and CCA-secure re-encryption from indistinguishability obfuscation | 2019-10-31 | Paper |
Verifiable secret sharing based on hyperplane geometry with its applications to optimal resilient proactive cryptosystems | 2018-09-26 | Paper |
Secure publicly verifiable computation with polynomial commitment in cloud computing | 2018-09-26 | Paper |
ADR-lrABE: new mechanism of direct-revocable attribute-based encryption with continual-leakage tolerances Fundamenta Informaticae | 2018-05-03 | Paper |
Cryptographic reverse firewall via malleable smooth projective hash functions Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Anonymous spatial encryption under affine space delegation functionality with full security Information Sciences | 2017-01-31 | Paper |
Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage Provable Security | 2017-01-06 | Paper |
One-round strong oblivious signature-based envelope Information Security and Privacy | 2016-09-02 | Paper |
Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks Frontiers of Computer Science | 2015-11-20 | Paper |
Identity-based partially blind signature in the standard model for electronic cash Mathematical and Computer Modelling | 2014-10-21 | Paper |
New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation Information Security and Privacy | 2014-07-24 | Paper |
A robust fuzzy extractor without ECCs Information Security and Cryptology | 2013-05-28 | Paper |
LR-UESDE: a continual-leakage resilient encryption with unbounded extensible set delegation Provable Security | 2012-11-06 | Paper |
An ID-based cryptographic mechanisms based on GDLP and IFP Information Processing Letters | 2012-10-23 | Paper |
Group-oriented setting's multisigncryption scheme with threshold designcryption Information Sciences | 2012-07-13 | Paper |
Efficient identity-based signcryption in the standard model Provable Security | 2011-09-16 | Paper |
Anonymous encryption with partial-order subset delegation functionality Provable Security | 2011-09-16 | Paper |
GeoENC: geometric area based keys and policies in functional encryption systems Information Security and Privacy | 2011-07-07 | Paper |