| Publication | Date of Publication | Type |
|---|
| A simple and efficient framework of proof systems for NP | 2024-06-26 | Paper |
| Sigma protocols from verifiable secret sharing and their applications | 2024-06-26 | Paper |
Fast two-party signature for upgrading ECDSA to two-party scenario easily Theoretical Computer Science | 2024-01-16 | Paper |
Fine-grained secure attribute-based encryption Journal of Cryptology | 2023-08-22 | Paper |
Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds) Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Fine-grained secure attribute-based encryption | 2022-05-18 | Paper |
Non-malleable functions and their applications Journal of Cryptology | 2022-04-04 | Paper |
Public-key authenticated encryption with keyword search revisited: security model and constructions Information Sciences | 2021-03-31 | Paper |
KDM security for identity-based encryption: constructions and separations Information Sciences | 2020-12-10 | Paper |
| Regularly lossy functions and applications | 2020-01-21 | Paper |
| Two-message key exchange with strong security from ideal lattices | 2020-01-21 | Paper |
| Leakage-resilient cryptography from puncturable primitives and obfuscation | 2019-01-23 | Paper |
Regular lossy functions and their applications in leakage-resilient cryptography Theoretical Computer Science | 2018-06-18 | Paper |
| On the security of classic protocols for unique witness relations | 2018-05-29 | Paper |
| From attack on Feige-Shamir to construction of oblivious transfer | 2018-04-20 | Paper |
How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks Information Security and Cryptology | 2017-05-05 | Paper |
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes Advances in Cryptology – CRYPTO 2016 | 2016-11-09 | Paper |
Non-malleable functions and their applications Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Generic constructions of integrated PKE and PEKS Designs, Codes and Cryptography | 2016-02-19 | Paper |
Black-box separations of hash-and-sign signatures in the non-programmable random oracle model Provable Security | 2016-01-27 | Paper |
Black-box separations for one-more (static) CDH and its generalization Lecture Notes in Computer Science | 2015-01-06 | Paper |
Publicly evaluable pseudorandom functions and their applications Lecture Notes in Computer Science | 2014-10-14 | Paper |
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange scheme. Revisited Information Security and Privacy | 2014-07-24 | Paper |
All-but-one dual projective hashing and its applications Applied Cryptography and Network Security | 2014-07-07 | Paper |
PRE: stronger security notions and efficient construction with non-interactive opening Theoretical Computer Science | 2014-06-23 | Paper |
Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme Science China. Mathematics | 2014-03-05 | Paper |
Anonymous Identity-Based Hash Proof System and Its Applications Provable Security | 2012-11-06 | Paper |
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
Identity-based extractable hash proofs and their applications Applied Cryptography and Network Security | 2012-09-10 | Paper |
A novel commutative blinding identity based encryption scheme Foundations and Practice of Security | 2012-06-08 | Paper |
The twin bilinear Diffie-Hellman inversion problem and applications Information Security and Cryptology - ICISC 2010 | 2011-10-27 | Paper |