| Publication | Date of Publication | Type |
|---|
Adaptive security in SNARGs via iO and lossy functions | 2025-01-10 | Paper |
NIZKs with maliciously chosen CRS: subversion advice-ZK and accountable soundness | 2025-01-10 | Paper |
Reducing the CRS size in registered ABE systems | 2024-12-13 | Paper |
Non-interactive anonymous router with quasi-linear router computation | 2024-08-02 | Paper |
How to use (plain) witness encryption: registered ABE, flexible broadcast, and more Advances in Cryptology – CRYPTO 2023 | 2024-02-06 | Paper |
Universal amplification of KDM security: from 1-key circular to multi-key KDM Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Security-preserving distributed samplers: how to generate any CRS in one round without random oracles Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
On non-uniform security for black-box non-interactive CCA commitments Advances in Cryptology – EUROCRYPT 2023 | 2024-01-16 | Paper |
Registered attribute-based encryption Advances in Cryptology – EUROCRYPT 2023 | 2023-12-12 | Paper |
Fully adaptive decentralized multi-authority \textsf{ABE} Advances in Cryptology – EUROCRYPT 2023 | 2023-12-12 | Paper |
Non-interactive publicly-verifiable delegation of committed programs Lecture Notes in Computer Science | 2023-11-16 | Paper |
Adaptive multiparty NIKE Theory of Cryptography | 2023-08-14 | Paper |
Fully succinct batch arguments for \textsf{NP} from indistinguishability obfuscation Theory of Cryptography | 2023-08-14 | Paper |
How to sample a discrete Gaussian (and more) from a random oracle Theory of Cryptography | 2023-08-14 | Paper |
Multi-authority ABE from lattices without random oracles Theory of Cryptography | 2023-08-14 | Paper |
Batch arguments for \textsf{NP} and more from standard bilinear group assumptions Advances in Cryptology – CRYPTO 2022 | 2023-06-28 | Paper |
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups Lecture Notes in Computer Science | 2023-05-26 | Paper |
Bounded Collusion ABE for TMs from IBE Lecture Notes in Computer Science | 2023-05-26 | Paper |
Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH Journal of Cryptology | 2023-04-13 | Paper |
New constructions of hinting PRGs, OWFs with encryption, and more | 2022-11-09 | Paper |
Chosen ciphertext security from injective trapdoor functions | 2022-11-09 | Paper |
Dynamic collusion bounded functional encryption from identity-based encryption | 2022-08-30 | Paper |
Signature schemes with randomized verification | 2022-07-01 | Paper |
Targeted lossy functions and applications | 2022-05-18 | Paper |
New techniques in replica encodings with client setup | 2022-03-23 | Paper |
On the CCA compatibility of public-key infrastructure | 2021-12-21 | Paper |
Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} | 2021-12-08 | Paper |
Black-box non-interactive non-malleable commitments | 2021-12-08 | Paper |
On perfect correctness in (lockable) obfuscation | 2021-12-01 | Paper |
How to use indistinguishability obfuscation: deniable encryption, and more SIAM Journal on Computing | 2021-05-27 | Paper |
Adaptively secure constrained pseudorandom functions | 2021-03-17 | Paper |
New methods and abstractions for RSA-based forward secure signatures | 2021-02-23 | Paper |
Collusion resistant traitor tracing from learning with errors SIAM Journal on Computing | 2020-10-29 | Paper |
Output compression, MPC, and iO for Turing machines | 2020-05-20 | Paper |
New approaches to traitor tracing with embedded identities | 2020-04-30 | Paper |
ABE for DFA from \(k\)-lin | 2020-03-09 | Paper |
Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions | 2020-03-09 | Paper |
Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption | 2020-03-09 | Paper |
Collusion resistant broadcast and trace from positional witness encryption | 2020-01-28 | Paper |
Collusion resistant traitor tracing from learning with errors Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing | 2019-08-22 | Paper |
Upgrading to functional encryption | 2018-12-11 | Paper |
Impossibility of simulation secure functional encryption even with random oracles | 2018-12-11 | Paper |
Traitor-tracing from LWE made simple and attribute-based | 2018-12-06 | Paper |
Synchronized aggregate signatures from the RSA assumption | 2018-07-09 | Paper |
A generic approach to constructing and proving verifiable random functions | 2018-01-19 | Paper |
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles Lecture Notes in Computer Science | 2017-06-13 | Paper |
Universal samplers with fast verification Lecture Notes in Computer Science | 2017-06-13 | Paper |
Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption Lecture Notes in Computer Science | 2017-06-13 | Paper |
Encoding functions with constant online rate, or how to compress garbled circuit keys SIAM Journal on Computing | 2017-01-13 | Paper |
How to Generate and Use Universal Samplers Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Semi-adaptive security and bundling functionalities made generic and easy Theory of Cryptography | 2016-12-22 | Paper |
Circular Security Separations for Arbitrary Length Cycles from LWE Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Targeted malleability: homomorphic encryption for restricted computations Proceedings of the 3rd Innovations in Theoretical Computer Science Conference | 2016-10-07 | Paper |
Deterministic Public-Key Encryption Under Continual Leakage Applied Cryptography and Network Security | 2016-10-04 | Paper |
Constrained Pseudorandom Functions for Unconstrained Inputs Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
New negative results on differing-inputs obfuscation Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
Candidate indistinguishability obfuscation and functional encryption for all circuits SIAM Journal on Computing | 2016-07-04 | Paper |
New realizations of somewhere statistically binding hashing and positional accumulators Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Adaptively secure puncturable pseudorandom functions in the standard model Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Time-lock puzzles from randomized encodings Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science | 2016-04-15 | Paper |
New circular security counterexamples from decision linear and learning with errors Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
A punctured programming approach to adaptively secure functional encryption Lecture Notes in Computer Science | 2015-12-10 | Paper |
Universal signature aggregators Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Efficient statically-secure large-universe multi-authority attribute-based encryption Financial Cryptography and Data Security | 2015-09-29 | Paper |
Indistinguishability obfuscation for Turing machines with unbounded memory Proceedings of the forty-seventh annual ACM symposium on Theory of Computing | 2015-08-21 | Paper |
Separations in circular security for arbitrary length key cycles Theory of Cryptography | 2015-07-06 | Paper |
How to use indistinguishability obfuscation Proceedings of the forty-sixth annual ACM symposium on Theory of computing | 2015-06-26 | Paper |
Computing on authenticated data Journal of Cryptology | 2015-05-12 | Paper |
Relaxed two-to-one recoding schemes Lecture Notes in Computer Science | 2014-10-14 | Paper |
Low overhead broadcast encryption from multilinear maps Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Witness encryption and its applications Proceedings of the forty-eighth annual ACM symposium on Theory of Computing | 2014-08-07 | Paper |
Witness encryption from instance independent assumptions Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Replacing a random oracle: full domain hash from indistinguishability obfuscation Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Rethinking verifiably encrypted signatures: a gap in functionality and potential solutions Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Online/Offline Attribute-Based Encryption Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Constrained pseudorandom functions and their applications Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Attribute-based encryption for circuits from multilinear maps Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Encoding functions with constant online rate or how to compress garbled circuits keys Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Compact proofs of retrievability Journal of Cryptology | 2013-08-01 | Paper |
Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles Journal of Cryptology | 2013-06-27 | Paper |
Predicate encryption supporting disjunctions, polynomial equations, and inner products Journal of Cryptology | 2013-06-27 | Paper |
Attribute-based encryption with fast decryption Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Functional encryption: origins and recent developments Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Dual form signatures: an approach for proving security from static assumptions Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
The \(k\)-BDH assumption family: bilinear map cryptography from progressively weaker assumptions Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Dynamic credentials and ciphertext delegation for attribute-based encryption Lecture Notes in Computer Science | 2012-09-25 | Paper |
Functional encryption for regular languages Lecture Notes in Computer Science | 2012-09-25 | Paper |
New proof methods for attribute-based encryption: achieving full security through selective techniques Lecture Notes in Computer Science | 2012-09-25 | Paper |
Standard security does not imply security against selective-opening Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Identity-based (lossy) trapdoor functions and applications Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Detecting dangerous queries: a new approach for chosen ciphertext security Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Computing on Authenticated Data Theory of Cryptography | 2012-06-15 | Paper |
Lossy Trapdoor Functions and Their Applications SIAM Journal on Computing | 2012-03-15 | Paper |
Bi-deniable public-key encryption Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Decentralizing attribute-based encryption Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Unbounded HIBE and Attribute-Based Encryption Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Functional encryption: definitions and challenges Theory of Cryptography | 2011-05-19 | Paper |
Achieving leakage resilience through dual system encryption Theory of Cryptography | 2011-05-19 | Paper |
Identity-based encryption secure against selective opening attack Theory of Cryptography | 2011-05-19 | Paper |
Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Shrinking the keys of discrete-log-type lossy trapdoor functions Applied Cryptography and Network Security | 2010-07-06 | Paper |
Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Constructing verifiable random functions with large input spaces Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts Theory of Cryptography | 2010-02-24 | Paper |
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
Short and Stateless Signatures from the RSA Assumption Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Realizing Hash-and-Sign Signatures under Standard Assumptions Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Signing a Linear Subspace: Signature Schemes for Network Coding Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
Attribute-based encryption | 2009-03-24 | Paper |
Predicate Privacy in Encryption Systems Theory of Cryptography | 2009-03-03 | Paper |
A Framework for Efficient and Composable Oblivious Transfer Lecture Notes in Computer Science | 2009-02-10 | Paper |
Compact Proofs of Retrievability Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
Lossy trapdoor functions and their applications Proceedings of the fortieth annual ACM symposium on Theory of computing | 2009-01-05 | Paper |
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption Financial Cryptography and Data Security | 2008-09-09 | Paper |
Delegating Capabilities in Predicate Encryption Systems Automata, Languages and Programming | 2008-08-19 | Paper |
Efficient Identity-Based Encryption Without Random Oracles Lecture Notes in Computer Science | 2008-05-06 | Paper |
Fuzzy Identity-Based Encryption Lecture Notes in Computer Science | 2008-05-06 | Paper |
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys Advances in Cryptology – CRYPTO 2005 | 2008-03-17 | Paper |
Compact Group Signatures Without Random Oracles Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Sequential Aggregate Signatures and Multisignatures Without Random Oracles Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) Lecture Notes in Computer Science | 2007-09-04 | Paper |
Full-Domain Subgroup Hiding and Constant-Size Group Signatures Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
Efficient Ring Signatures Without Random Oracles Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
Conjunctive, Subset, and Range Queries on Encrypted Data Theory of Cryptography | 2007-08-30 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |