Publication | Date of Publication | Type |
---|
Obfuscation of pseudo-deterministic quantum circuits | 2024-05-08 | Paper |
Public key encryption with secure key leasing | 2024-01-16 | Paper |
From the hardness of detecting superpositions to cryptography: quantum public key encryption and commitments | 2024-01-16 | Paper |
Classically verifiable NIZK for QMA with preprocessing | 2023-08-21 | Paper |
Bounded functional encryption for Turing machines: adaptive security from general assumptions | 2023-08-14 | Paper |
NIZK from SNARGs | 2023-07-05 | Paper |
Post-quantum simulatable extraction with minimal assumptions: black-box and constant-round | 2023-06-30 | Paper |
Certified everlasting zero-knowledge proof for QMA | 2023-06-12 | Paper |
Quantum commitments and signatures without one-way functions | 2023-06-12 | Paper |
Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication | 2023-05-12 | Paper |
Secure software leasing from standard assumptions | 2023-03-31 | Paper |
Adaptively secure inner product encryption from LWE | 2023-03-29 | Paper |
Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-wayness | 2023-03-21 | Paper |
Adaptively secure constrained pseudorandom functions in the standard model | 2022-11-09 | Paper |
A black-box approach to post-quantum zero-knowledge in constant rounds | 2022-03-31 | Paper |
Classical verification of quantum computations with efficient verifier | 2022-03-23 | Paper |
Round-optimal blind signatures in the plain model from classical and quantum standard assumptions | 2021-12-08 | Paper |
Classical vs quantum random oracles | 2021-12-08 | Paper |
Compact NIZKs from standard assumptions on bilinear maps | 2021-12-01 | Paper |
NIZK from SNARG | 2021-12-01 | Paper |
Compact designated verifier NIZKs from the CDH assumption without pairings | 2021-11-24 | Paper |
Tighter security proofs for GPV-IBE in the quantum random oracle model | 2021-04-07 | Paper |
Quantum random oracle model with auxiliary input | 2020-05-20 | Paper |
Generic hardness of inversion on ring and its relation to self-bilinear map | 2020-04-21 | Paper |
Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously | 2020-03-09 | Paper |
Exploring constructions of compact NIZKs from various assumptions | 2020-03-09 | Paper |
(Tightly) QCCA-secure key-encapsulation mechanism in the quantum random oracle model | 2020-02-25 | Paper |
Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions | 2020-02-06 | Paper |
Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio | 2020-01-28 | Paper |
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\) | 2020-01-28 | Paper |
On the analytical solution for the Pütter-Bertalanffy growth equation | 2019-05-14 | Paper |
Tighter security proofs for GPV-IBE in the quantum random oracle model | 2019-01-23 | Paper |
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups | 2018-09-26 | Paper |
Tightly-secure key-encapsulation mechanism in the quantum random oracle model | 2018-07-17 | Paper |
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications | 2018-01-05 | Paper |
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli | 2016-10-27 | Paper |
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information | 2016-09-02 | Paper |
A Short Fail-Stop Signature Scheme from Factoring | 2015-09-29 | Paper |
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues | 2014-10-14 | Paper |
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications | 2014-08-07 | Paper |