| Publication | Date of Publication | Type |
|---|
| Tighter adaptive IBEs and VRFs: revisiting Waters' artificial abort | 2025-07-25 | Paper |
| Attribute based encryption for Turing machines from lattices | 2024-12-13 | Paper |
| Signature for objects: formalizing how to authenticate physical data and more | 2024-07-17 | Paper |
Compact NIZKs from standard assumptions on bilinear maps Journal of Cryptology | 2024-07-10 | Paper |
Constant input attribute based (and predicate) encryption from evasive and tensor LWE Advances in Cryptology – CRYPTO 2023 | 2024-02-06 | Paper |
Public key encryption with secure key leasing Advances in Cryptology – EUROCRYPT 2023 | 2024-01-16 | Paper |
Broadcast, trace and revoke with optimal parameters from polynomial hardness Advances in Cryptology – EUROCRYPT 2023 | 2023-12-12 | Paper |
Bounded functional encryption for Turing machines: adaptive security from general assumptions Theory of Cryptography | 2023-08-14 | Paper |
Multi-input attribute based encryption and predicate encryption Advances in Cryptology – CRYPTO 2022 | 2023-06-12 | Paper |
Direct computation of branching programs and its applications to more efficient lattice-based cryptography Designs, Codes and Cryptography | 2023-04-21 | Paper |
| Adaptively secure inner product encryption from LWE | 2023-03-29 | Paper |
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition 1511.68043 | 2022-12-22 | Paper |
| Adaptively secure constrained pseudorandom functions in the standard model | 2022-11-09 | Paper |
Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 Designs, Codes and Cryptography | 2022-09-22 | Paper |
| Functional encryption for Turing machines with dynamic bounded collusion from LWE | 2022-05-18 | Paper |
| Non-interactive secure multiparty computation for symmetric functions, revisited: more efficient constructions and extensions | 2022-04-22 | Paper |
| Round-optimal blind signatures in the plain model from classical and quantum standard assumptions | 2021-12-08 | Paper |
| CP-ABE for circuits (and More) in the symmetric key setting | 2021-12-01 | Paper |
| Optimal broadcast encryption from pairings and LWE | 2021-12-01 | Paper |
| Compact NIZKs from standard assumptions on bilinear maps | 2021-12-01 | Paper |
| Optimal broadcast encryption from LWE and pairings in the standard model | 2021-12-01 | Paper |
Compact designated verifier NIZKs from the CDH assumption without pairings Journal of Cryptology | 2021-11-24 | Paper |
Tighter security proofs for GPV-IBE in the quantum random oracle model Journal of Cryptology | 2021-04-07 | Paper |
| Attribute based encryption for deterministic finite automata from DLIN | 2020-04-30 | Paper |
Generic hardness of inversion on ring and its relation to self-bilinear map Theoretical Computer Science | 2020-04-21 | Paper |
| Attribute-based encryption (and more) for nondeterministic finite automata from LWE | 2020-03-09 | Paper |
| Exploring constructions of compact NIZKs from various assumptions | 2020-03-09 | Paper |
| Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions | 2020-02-06 | Paper |
| Group signatures without NIZK: from lattices in the standard model | 2020-02-04 | Paper |
| Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR | 2020-01-28 | Paper |
| Adaptively single-key secure constrained PRFs for \(\text{NC}^1\) | 2020-01-28 | Paper |
Tighter security proofs for GPV-IBE in the quantum random oracle model Lecture Notes in Computer Science | 2019-01-23 | Paper |
| Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups | 2018-09-26 | Paper |
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems Designs, Codes and Cryptography | 2018-07-03 | Paper |
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications Algorithmica | 2018-01-05 | Paper |
| Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques | 2017-10-27 | Paper |
Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security Information and Communications Security | 2016-12-19 | Paper |
Adversary-dependent lossy trapdoor function from hardness of factoring semi-smooth RSA subgroup moduli Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Attribute-based encryption for range attributes Lecture Notes in Computer Science | 2016-10-21 | Paper |
Attribute Based Encryption with Direct Efficiency Tradeoff Applied Cryptography and Network Security | 2016-10-04 | Paper |
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
A Framework for Identity-Based Encryption with Almost Tight Security Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings Lecture Notes in Computer Science | 2016-03-02 | Paper |
Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues Lecture Notes in Computer Science | 2014-10-14 | Paper |
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
A framework and compact constructions for non-monotonic attribute-based encryption Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Chosen ciphertext secure keyed-homomorphic public-key encryption Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Space efficient signature schemes from the RSA assumption Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Two-dimensional representation of cover free families and its applications: short signatures and more Lecture Notes in Computer Science | 2012-06-08 | Paper |
Generic constructions for chosen-ciphertext secure attribute based encryption Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Toward an easy-to-understand structure for achieving chosen ciphertext security from the decisional Diffie-Hellman assumption Provable Security | 2010-10-12 | Paper |