| Publication | Date of Publication | Type |
|---|
| Attribute-based keyed fully homomorphic encryption | 2025-01-10 | Paper |
More efficient adaptively secure lattice-based IBE with equality test in the standard model Lecture Notes in Computer Science | 2023-08-04 | Paper |
A generic construction of CCA-secure attribute-based encryption with equality test Provable and Practical Security | 2023-07-21 | Paper |
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE Information Security Practice and Experience | 2023-06-30 | Paper |
| Verifiable functional encryption using Intel SGX | 2023-04-13 | Paper |
| Keyed-fully homomorphic encryption without indistinguishability obfuscation | 2022-11-09 | Paper |
| Generic constructions for fully secure revocable attribute-based encryption | 2022-08-25 | Paper |
| Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices | 2022-08-25 | Paper |
Identity-based encryption with security against the KGC: a formal model and its instantiations Theoretical Computer Science | 2021-12-22 | Paper |
Efficient identity-based encryption with hierarchical key-insulation from HIBE Designs, Codes and Cryptography | 2021-10-04 | Paper |
Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption Designs, Codes and Cryptography | 2021-06-24 | Paper |
Efficient revocable identity-based encryption with short public parameters Theoretical Computer Science | 2021-03-18 | Paper |
Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation Journal of Computer and System Sciences | 2020-09-07 | Paper |
An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users Journal of Applied Mathematics | 2019-11-19 | Paper |
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures International Journal of Applied Cryptography | 2018-11-26 | Paper |
| Group signature with deniability: how to disavow a signature | 2018-10-26 | Paper |
| Adaptive-ID secure revocable hierarchical identity-based encryption | 2018-10-24 | Paper |
| Fully anonymous group signature with verifier-local revocation | 2018-10-17 | Paper |
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems Designs, Codes and Cryptography | 2018-07-03 | Paper |
| Privacy-preserving aggregation of time-series data with public verifiability from simple assumptions | 2017-08-25 | Paper |
New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency Theoretical Computer Science | 2016-05-02 | Paper |
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures Applied Cryptography and Network Security | 2016-03-10 | Paper |
Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts Lecture Notes in Computer Science | 2016-03-02 | Paper |
A light-weight group signature scheme with time-token dependent linking Lecture Notes in Computer Science | 2016-02-22 | Paper |
Revocable hierarchical identity-based encryption via history-free approach Theoretical Computer Science | 2016-01-21 | Paper |
Dynamic threshold public-key encryption with decryption consistency from static assumptions Information Security and Privacy | 2015-10-20 | Paper |
Anonymous Data Collection System with Mediators Cryptography and Information Security in the Balkans | 2015-09-21 | Paper |
SKENO: Secret key encryption with non-interactive opening Journal of Mathematical Cryptology | 2015-08-07 | Paper |
A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list Applied Cryptography and Network Security | 2014-07-07 | Paper |
Revocable hierarchical identity-based encryption Theoretical Computer Science | 2014-06-23 | Paper |
Revocable identity-based encryption revisited: security model and construction Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Chosen ciphertext secure keyed-homomorphic public-key encryption Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Group signatures with message-dependent opening Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
Efficient delegation of key generation and revocation functionalities in identity-based encryption Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Dynamic attribute-based signcryption without random oracles International Journal of Applied Cryptography | 2012-11-16 | Paper |
A revocable group signature scheme with the property of hiding the number of revoked users Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
Time-specific encryption from forward-secure encryption Lecture Notes in Computer Science | 2012-09-25 | Paper |
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Towards restricting plaintext space in public key encryption Advances in Information and Computer Security | 2011-11-10 | Paper |
Toward dynamic attribute-based signcryption (poster) Information Security and Privacy | 2011-07-07 | Paper |
An anonymous designated verifier signature scheme with revocation: how to protect a company's reputation Provable Security | 2010-10-12 | Paper |
A timed-release proxy re-encryption scheme and its application to fairly-opened multicast communication Provable Security | 2010-10-12 | Paper |
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length International Journal of Applied Cryptography | 2010-09-22 | Paper |