Publication | Date of Publication | Type |
---|
Multi-client oblivious RAM with poly-logarithmic communication | 2023-03-21 | Paper |
Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE | 2022-11-09 | Paper |
Non-malleable functions and their applications | 2022-04-04 | Paper |
Access control encryption from group encryption | 2022-03-21 | Paper |
Real Hidden Identity-Based Signatures | 2021-03-17 | Paper |
Fast-to-finalize Nakamoto-like consensus | 2020-05-27 | Paper |
Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog | 2020-01-28 | Paper |
Structure-preserving certificateless encryption and its application | 2020-01-28 | Paper |
Multi-key homomorphic signatures unforgeable under insider corruption | 2019-01-23 | Paper |
Another look at anonymous communication. Security and modular constructions | 2017-10-23 | Paper |
Privacy-Preserving Public Auditing for Secure Cloud Storage | 2017-07-12 | Paper |
Secure Cloud Storage Meets with Secure Network Coding | 2017-05-16 | Paper |
Towards Proofs of Ownership Beyond Bounded Leakage | 2017-01-06 | Paper |
Combiners for Chosen-Ciphertext Security | 2016-09-02 | Paper |
Cryptography for Parallel RAM from Indistinguishability Obfuscation | 2016-04-15 | Paper |
Non-Malleable Functions and Their Applications | 2016-04-13 | Paper |
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model | 2016-01-27 | Paper |
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement | 2015-12-02 | Paper |
Security of Direct Anonymous Authentication Using TPM 2.0 Signature | 2015-11-25 | Paper |
Trapdoors for Ideal Lattices with Applications | 2015-11-25 | Paper |
Practical (fully) distributed signatures provably secure in the standard model | 2015-07-24 | Paper |
Post-challenge leakage in public-key encryption | 2015-02-24 | Paper |
Escrowed Linkability of Ring Signatures and Its Applications | 2014-08-21 | Paper |
All-but-One Dual Projective Hashing and Its Applications | 2014-07-07 | Paper |
Practical Dual-Receiver Encryption | 2014-03-28 | Paper |
Practical Distributed Signatures in the Standard Model | 2014-03-28 | Paper |
PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation | 2013-10-23 | Paper |
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage | 2013-10-23 | Paper |
Zero-knowledge argument for simultaneous discrete logarithms | 2012-11-21 | Paper |
Identity-Based Encryption Resilient to Continual Auxiliary Leakage | 2012-06-29 | Paper |
Dynamic Secure Cloud Storage with Provenance | 2012-06-08 | Paper |
Efficient Secure Two-Party Exponentiation | 2011-02-11 | Paper |
Non-interactive Confirmer Signatures | 2011-02-11 | Paper |
Zero-Knowledge Argument for Simultaneous Discrete Logarithms | 2010-07-20 | Paper |
Efficient Unidirectional Proxy Re-Encryption | 2010-05-04 | Paper |
Real Traceable Signatures | 2009-12-09 | Paper |
Conditional Proxy Broadcast Re-Encryption | 2009-06-25 | Paper |
Identity Based Ring Signature: Why, How and What Next | 2009-04-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q3615884 | 2009-03-24 | Paper |
Removing Escrow from Identity-Based Encryption | 2009-03-24 | Paper |
Security Mediated Certificateless Signatures | 2009-03-10 | Paper |
Timed-Release Encryption Revisited | 2009-01-27 | Paper |
General Certificateless Encryption and Timed-Release Encryption | 2008-11-20 | Paper |
Proxy Re-signatures in the Standard Model | 2008-11-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q3518418 | 2008-08-07 | Paper |
Batch Pairing Delegation | 2008-07-25 | Paper |
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension | 2008-06-24 | Paper |
Token-Controlled Public Key Encryption in the Standard Model | 2008-06-24 | Paper |
Identity Based Threshold Ring Signature | 2008-03-17 | Paper |
Short E-Cash | 2008-03-17 | Paper |
Efficient Identity Based Ring Signature | 2007-09-24 | Paper |
Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
Information Security and Cryptology | 2006-11-14 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
Information Security and Privacy | 2006-06-22 | Paper |
Information Security and Privacy | 2006-06-22 | Paper |
Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
Forward-secure multisignature and blind signature schemes | 2005-11-04 | Paper |
Information and Communications Security | 2005-08-19 | Paper |