| Publication | Date of Publication | Type |
|---|
| Exponential quantum one-wayness and EFI pairs | 2025-01-10 | Paper |
| Quantum advantage from one-way functions | 2024-12-13 | Paper |
| Quantum complexity for discrete logarithms and related problems | 2024-12-13 | Paper |
| Unconditionally secure commitments with quantum auxiliary inputs | 2024-12-13 | Paper |
| Quantum public-key encryption with tamper-resilient public keys from one-way functions | 2024-12-13 | Paper |
| Certified everlasting secure collusion-resistant functional encryption, and more | 2024-11-13 | Paper |
Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-wayness Journal of Cryptology | 2024-10-11 | Paper |
| Proofs of quantumness from trapdoor permutations | 2024-09-25 | Paper |
| Publicly verifiable deletion from minimal assumptions | 2024-08-15 | Paper |
Compact NIZKs from standard assumptions on bilinear maps Journal of Cryptology | 2024-07-10 | Paper |
Dynamical aspects of excitonic Floquet states generated by a phase-locked mid-infrared pulse in a one-dimensional Mott insulator New Journal of Physics | 2024-06-21 | Paper |
| Obfuscation of pseudo-deterministic quantum circuits | 2024-05-08 | Paper |
Public key encryption with secure key leasing Advances in Cryptology – EUROCRYPT 2023 | 2024-01-16 | Paper |
From the hardness of detecting superpositions to cryptography: quantum public key encryption and commitments Advances in Cryptology – EUROCRYPT 2023 | 2024-01-16 | Paper |
Classically verifiable NIZK for QMA with preprocessing Advances in Cryptology – ASIACRYPT 2022 | 2023-08-21 | Paper |
Bounded functional encryption for Turing machines: adaptive security from general assumptions Theory of Cryptography | 2023-08-14 | Paper |
NIZK from SNARGs Journal of Cryptology | 2023-07-05 | Paper |
Post-quantum simulatable extraction with minimal assumptions: black-box and constant-round Advances in Cryptology – CRYPTO 2022 | 2023-06-30 | Paper |
Quantum commitments and signatures without one-way functions Advances in Cryptology – CRYPTO 2022 | 2023-06-12 | Paper |
Certified everlasting zero-knowledge proof for QMA Advances in Cryptology – CRYPTO 2022 | 2023-06-12 | Paper |
Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication Lecture Notes in Computer Science | 2023-05-12 | Paper |
Secure software leasing from standard assumptions (available as arXiv preprint) | 2023-03-31 | Paper |
| Adaptively secure inner product encryption from LWE | 2023-03-29 | Paper |
| Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-wayness | 2023-03-21 | Paper |
| Adaptively secure constrained pseudorandom functions in the standard model | 2022-11-09 | Paper |
A black-box approach to post-quantum zero-knowledge in constant rounds (available as arXiv preprint) | 2022-03-31 | Paper |
Classical verification of quantum computations with efficient verifier (available as arXiv preprint) | 2022-03-23 | Paper |
| Round-optimal blind signatures in the plain model from classical and quantum standard assumptions | 2021-12-08 | Paper |
| Classical vs quantum random oracles | 2021-12-08 | Paper |
| Compact NIZKs from standard assumptions on bilinear maps | 2021-12-01 | Paper |
| NIZK from SNARG | 2021-12-01 | Paper |
Compact designated verifier NIZKs from the CDH assumption without pairings Journal of Cryptology | 2021-11-24 | Paper |
Tighter security proofs for GPV-IBE in the quantum random oracle model Journal of Cryptology | 2021-04-07 | Paper |
| Quantum random oracle model with auxiliary input | 2020-05-20 | Paper |
Generic hardness of inversion on ring and its relation to self-bilinear map Theoretical Computer Science | 2020-04-21 | Paper |
| Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously | 2020-03-09 | Paper |
| Exploring constructions of compact NIZKs from various assumptions | 2020-03-09 | Paper |
| (Tightly) QCCA-secure key-encapsulation mechanism in the quantum random oracle model | 2020-02-25 | Paper |
| Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions | 2020-02-06 | Paper |
| Adaptively single-key secure constrained PRFs for \(\text{NC}^1\) | 2020-01-28 | Paper |
| Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio | 2020-01-28 | Paper |
On the analytical solution for the Pütter-Bertalanffy growth equation Journal of Theoretical Biology | 2019-05-14 | Paper |
Tighter security proofs for GPV-IBE in the quantum random oracle model Lecture Notes in Computer Science | 2019-01-23 | Paper |
| Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups | 2018-09-26 | Paper |
| Tightly-secure key-encapsulation mechanism in the quantum random oracle model | 2018-07-17 | Paper |
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications Algorithmica | 2018-01-05 | Paper |
Adversary-dependent lossy trapdoor function from hardness of factoring semi-smooth RSA subgroup moduli Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Generalized hardness assumption for self-bilinear map with auxiliary information Information Security and Privacy | 2016-09-02 | Paper |
A short fail-stop signature scheme from factoring Provable Security | 2015-09-29 | Paper |
Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues Lecture Notes in Computer Science | 2014-10-14 | Paper |
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |