| Publication | Date of Publication | Type |
|---|
| Attribute-based keyed fully homomorphic encryption | 2025-01-10 | Paper |
| More efficient adaptively secure lattice-based IBE with equality test in the standard model | 2023-08-04 | Paper |
| A generic construction of CCA-secure attribute-based encryption with equality test | 2023-07-21 | Paper |
| A Generic Construction of Integrated Secure-Channel Free PEKS and PKE | 2023-06-30 | Paper |
| Verifiable functional encryption using Intel SGX | 2023-04-13 | Paper |
| Keyed-fully homomorphic encryption without indistinguishability obfuscation | 2022-11-09 | Paper |
| Generic constructions for fully secure revocable attribute-based encryption | 2022-08-25 | Paper |
| Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices | 2022-08-25 | Paper |
| Identity-based encryption with security against the KGC: a formal model and its instantiations | 2021-12-22 | Paper |
| Efficient identity-based encryption with hierarchical key-insulation from HIBE | 2021-10-04 | Paper |
| Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption | 2021-06-24 | Paper |
| Efficient revocable identity-based encryption with short public parameters | 2021-03-18 | Paper |
| Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation | 2020-09-07 | Paper |
| An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users | 2019-11-19 | Paper |
| A privacy-enhanced access log management mechanism in SSO systems from nominative signatures | 2018-11-26 | Paper |
| Group signature with deniability: how to disavow a signature | 2018-10-26 | Paper |
| Adaptive-ID secure revocable hierarchical identity-based encryption | 2018-10-24 | Paper |
| Fully anonymous group signature with verifier-local revocation | 2018-10-17 | Paper |
| Chosen ciphertext secure keyed-homomorphic public-key cryptosystems | 2018-07-03 | Paper |
| Privacy-preserving aggregation of time-series data with public verifiability from simple assumptions | 2017-08-25 | Paper |
| New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters | 2017-04-12 | Paper |
| Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency | 2016-05-02 | Paper |
| Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures | 2016-03-10 | Paper |
| Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts | 2016-03-02 | Paper |
| A Light-Weight Group Signature Scheme with Time-Token Dependent Linking | 2016-02-22 | Paper |
| Revocable hierarchical identity-based encryption via history-free approach | 2016-01-21 | Paper |
| Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions | 2015-10-20 | Paper |
| Anonymous Data Collection System with Mediators | 2015-09-21 | Paper |
| SKENO: Secret key encryption with non-interactive opening | 2015-08-07 | Paper |
| A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List | 2014-07-07 | Paper |
| Revocable hierarchical identity-based encryption | 2014-06-23 | Paper |
| Revocable Identity-Based Encryption Revisited: Security Model and Construction | 2013-04-19 | Paper |
| Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption | 2013-04-19 | Paper |
| Group Signatures with Message-Dependent Opening | 2013-04-04 | Paper |
| Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption | 2013-03-18 | Paper |
| Dynamic attribute-based signcryption without random oracles | 2012-11-16 | Paper |
| A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users | 2012-11-01 | Paper |
| Time-Specific Encryption from Forward-Secure Encryption | 2012-09-25 | Paper |
| On the Security of Dynamic Group Signatures: Preventing Signature Hijacking | 2012-07-20 | Paper |
| Towards Restricting Plaintext Space in Public Key Encryption | 2011-11-10 | Paper |
| Toward Dynamic Attribute-Based Signcryption (Poster) | 2011-07-07 | Paper |
| An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation | 2010-10-12 | Paper |
| A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication | 2010-10-12 | Paper |
| A ciphertext-policy attribute-based encryption scheme with constant ciphertext length | 2010-09-22 | Paper |