| Publication | Date of Publication | Type |
|---|
| Attribute-based keyed fully homomorphic encryption | 2025-01-10 | Paper |
| More efficient adaptively secure lattice-based IBE with equality test in the standard model | 2023-08-04 | Paper |
| A generic construction of CCA-secure attribute-based encryption with equality test | 2023-07-21 | Paper |
| A Generic Construction of Integrated Secure-Channel Free PEKS and PKE | 2023-06-30 | Paper |
| Verifiable functional encryption using Intel SGX | 2023-04-13 | Paper |
| Keyed-fully homomorphic encryption without indistinguishability obfuscation | 2022-11-09 | Paper |
| Generic constructions for fully secure revocable attribute-based encryption | 2022-08-25 | Paper |
| Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices | 2022-08-25 | Paper |
| Identity-based encryption with security against the KGC: a formal model and its instantiations | 2021-12-22 | Paper |
| Efficient identity-based encryption with hierarchical key-insulation from HIBE | 2021-10-04 | Paper |
| Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption | 2021-06-24 | Paper |
| Efficient revocable identity-based encryption with short public parameters | 2021-03-18 | Paper |
| Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation | 2020-09-07 | Paper |
| An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users | 2019-11-19 | Paper |
| A privacy-enhanced access log management mechanism in SSO systems from nominative signatures | 2018-11-26 | Paper |
| Group signature with deniability: how to disavow a signature | 2018-10-26 | Paper |
| Adaptive-ID secure revocable hierarchical identity-based encryption | 2018-10-24 | Paper |
| Fully anonymous group signature with verifier-local revocation | 2018-10-17 | Paper |
| Chosen ciphertext secure keyed-homomorphic public-key cryptosystems | 2018-07-03 | Paper |
| Privacy-preserving aggregation of time-series data with public verifiability from simple assumptions | 2017-08-25 | Paper |
| New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters | 2017-04-12 | Paper |
| Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency | 2016-05-02 | Paper |
| Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures | 2016-03-10 | Paper |
| Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts | 2016-03-02 | Paper |
| A light-weight group signature scheme with time-token dependent linking | 2016-02-22 | Paper |
| Revocable hierarchical identity-based encryption via history-free approach | 2016-01-21 | Paper |
| Dynamic threshold public-key encryption with decryption consistency from static assumptions | 2015-10-20 | Paper |
| Anonymous Data Collection System with Mediators | 2015-09-21 | Paper |
| SKENO: Secret key encryption with non-interactive opening | 2015-08-07 | Paper |
| A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list | 2014-07-07 | Paper |
| Revocable hierarchical identity-based encryption | 2014-06-23 | Paper |
| Revocable identity-based encryption revisited: security model and construction | 2013-04-19 | Paper |
| Chosen ciphertext secure keyed-homomorphic public-key encryption | 2013-04-19 | Paper |
| Group signatures with message-dependent opening | 2013-04-04 | Paper |
| Efficient delegation of key generation and revocation functionalities in identity-based encryption | 2013-03-18 | Paper |
| Dynamic attribute-based signcryption without random oracles | 2012-11-16 | Paper |
| A revocable group signature scheme with the property of hiding the number of revoked users | 2012-11-01 | Paper |
| Time-specific encryption from forward-secure encryption | 2012-09-25 | Paper |
| On the Security of Dynamic Group Signatures: Preventing Signature Hijacking | 2012-07-20 | Paper |
| Towards restricting plaintext space in public key encryption | 2011-11-10 | Paper |
| Toward dynamic attribute-based signcryption (poster) | 2011-07-07 | Paper |
| An anonymous designated verifier signature scheme with revocation: how to protect a company's reputation | 2010-10-12 | Paper |
| A timed-release proxy re-encryption scheme and its application to fairly-opened multicast communication | 2010-10-12 | Paper |
| A ciphertext-policy attribute-based encryption scheme with constant ciphertext length | 2010-09-22 | Paper |