| Publication | Date of Publication | Type |
|---|
| Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting | 2023-03-21 | Paper |
Quantum secure multi-party summation based on entanglement swapping Quantum Information Processing | 2023-02-22 | Paper |
| Collusion resistant watermarkable PRFs from standard assumptions | 2022-11-09 | Paper |
Updatable hash proof system and its applications Computer Security -- ESORICS 2015 | 2022-08-19 | Paper |
Quantum protocols for private set intersection cardinality and union cardinality based on entanglement swapping International Journal of Theoretical Physics | 2021-11-05 | Paper |
Practical Range Proof for Cryptocurrency Monero with Provable Security Information and Communications Security | 2020-07-20 | Paper |
| Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications | 2020-05-20 | Paper |
| Collusion resistant watermarking schemes for cryptographic functionalities | 2020-05-20 | Paper |
Efficient and secure outsourced approximate pattern matching protocol Soft Computing | 2018-10-22 | Paper |
| Unforgeable watermarking schemes with public extraction | 2018-10-17 | Paper |
| Lattice-based universal accumulator with nonmembership arguments | 2018-09-26 | Paper |
| Cut-and-choose bilateral oblivious transfer | 2017-10-20 | Paper |
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks Soft Computing | 2017-09-08 | Paper |
| Multi-user binary tree based ORAM scheme | 2017-01-06 | Paper |
Leakage-resilient functional encryption via pair encodings Information Security and Privacy | 2016-08-31 | Paper |
Energy-efficient elliptic curve cryptography for MSP430-based wireless sensor nodes Information Security and Privacy | 2016-08-31 | Paper |
Higher-order masking in practice: a vector implementation of masked AES for ARM NEON Lecture Notes in Computer Science | 2016-03-02 | Paper |
Certified public key encryption without pairing calculation using standard model Transactions of Beijing Institute of Technology | 2012-06-01 | Paper |
Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security Lecture Notes in Computer Science | 2011-12-02 | Paper |
Multiparty computation for modulo reduction without bit-decomposition and a generalization to bit-decomposition Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Attribute-based re-encryption scheme in the standard model Wuhan University Journal of Natural Sciences | 2010-02-12 | Paper |
Research of optimizing frame size and group division in Aloha-based algorithms Journal of Computer Applications | 2009-11-09 | Paper |
Identity based broadcast encryption without pairings Journal of Computer Applications | 2009-10-26 | Paper |
An efficient threshold RSA digital signature scheme Applied Mathematics and Computation | 2005-08-05 | Paper |