| Publication | Date of Publication | Type |
|---|
| Attribute based encryption for Turing machines from lattices | 2024-12-13 | Paper |
| Signature for objects: formalizing how to authenticate physical data and more | 2024-07-17 | Paper |
| Compact NIZKs from standard assumptions on bilinear maps | 2024-07-10 | Paper |
| Constant input attribute based (and predicate) encryption from evasive and tensor LWE | 2024-02-06 | Paper |
| Public key encryption with secure key leasing | 2024-01-16 | Paper |
| Broadcast, trace and revoke with optimal parameters from polynomial hardness | 2023-12-12 | Paper |
| Bounded functional encryption for Turing machines: adaptive security from general assumptions | 2023-08-14 | Paper |
| Multi-input attribute based encryption and predicate encryption | 2023-06-12 | Paper |
| Direct computation of branching programs and its applications to more efficient lattice-based cryptography | 2023-04-21 | Paper |
| Adaptively secure inner product encryption from LWE | 2023-03-29 | Paper |
| Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition | 2022-12-22 | Paper |
| Adaptively secure constrained pseudorandom functions in the standard model | 2022-11-09 | Paper |
| Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 | 2022-09-22 | Paper |
| Functional encryption for Turing machines with dynamic bounded collusion from LWE | 2022-05-18 | Paper |
| Non-interactive secure multiparty computation for symmetric functions, revisited: more efficient constructions and extensions | 2022-04-22 | Paper |
| Round-optimal blind signatures in the plain model from classical and quantum standard assumptions | 2021-12-08 | Paper |
| CP-ABE for circuits (and More) in the symmetric key setting | 2021-12-01 | Paper |
| Optimal broadcast encryption from pairings and LWE | 2021-12-01 | Paper |
| Compact NIZKs from standard assumptions on bilinear maps | 2021-12-01 | Paper |
| Optimal broadcast encryption from LWE and pairings in the standard model | 2021-12-01 | Paper |
| Compact designated verifier NIZKs from the CDH assumption without pairings | 2021-11-24 | Paper |
| Tighter security proofs for GPV-IBE in the quantum random oracle model | 2021-04-07 | Paper |
| Attribute based encryption for deterministic finite automata from DLIN | 2020-04-30 | Paper |
| Generic hardness of inversion on ring and its relation to self-bilinear map | 2020-04-21 | Paper |
| Attribute-based encryption (and more) for nondeterministic finite automata from LWE | 2020-03-09 | Paper |
| Exploring constructions of compact NIZKs from various assumptions | 2020-03-09 | Paper |
| Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions | 2020-02-06 | Paper |
| Group signatures without NIZK: from lattices in the standard model | 2020-02-04 | Paper |
| Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR | 2020-01-28 | Paper |
| Adaptively single-key secure constrained PRFs for \(\text{NC}^1\) | 2020-01-28 | Paper |
| Tighter security proofs for GPV-IBE in the quantum random oracle model | 2019-01-23 | Paper |
| Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups | 2018-09-26 | Paper |
| Chosen ciphertext secure keyed-homomorphic public-key cryptosystems | 2018-07-03 | Paper |
| Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications | 2018-01-05 | Paper |
| Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques | 2017-10-27 | Paper |
| Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps | 2017-01-06 | Paper |
| New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security | 2016-12-19 | Paper |
| Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli | 2016-10-27 | Paper |
| Attribute-Based Encryption for Range Attributes | 2016-10-21 | Paper |
| Attribute Based Encryption with Direct Efficiency Tradeoff | 2016-10-04 | Paper |
| Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters | 2016-07-15 | Paper |
| A Framework for Identity-Based Encryption with Almost Tight Security | 2016-06-10 | Paper |
| Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs | 2016-06-10 | Paper |
| Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings | 2016-03-02 | Paper |
| Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues | 2014-10-14 | Paper |
| Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications | 2014-08-07 | Paper |
| A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption | 2014-03-25 | Paper |
| Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption | 2013-04-19 | Paper |
| Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication | 2012-07-20 | Paper |
| Space efficient signature schemes from the RSA assumption | 2012-07-20 | Paper |
| Two-dimensional representation of cover free families and its applications: short signatures and more | 2012-06-08 | Paper |
| Generic constructions for chosen-ciphertext secure attribute based encryption | 2011-03-15 | Paper |
| Toward an easy-to-understand structure for achieving chosen ciphertext security from the decisional Diffie-Hellman assumption | 2010-10-12 | Paper |