| Publication | Date of Publication | Type |
|---|
| Adaptively secure identity-based encryption from middle-product learning with errors | 2024-01-11 | Paper |
| Ideal dynamic threshold multi-secret data sharing in smart environments for sustainable cities | 2023-09-08 | Paper |
| Public-key watermarking schemes for pseudorandom functions | 2023-06-28 | Paper |
| Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting | 2023-03-21 | Paper |
| Collusion resistant watermarkable PRFs from standard assumptions | 2022-11-09 | Paper |
| DualRing: generic construction of ring signatures with efficient instantiations | 2022-03-31 | Paper |
| Anonymous post-quantum cryptocash | 2021-03-17 | Paper |
| RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security | 2021-02-08 | Paper |
| Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation | 2020-11-06 | Paper |
| Efficient attribute-based encryption with attribute revocation for assured data deletion | 2020-10-07 | Paper |
| Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters | 2020-09-22 | Paper |
| Practical Range Proof for Cryptocurrency Monero with Provable Security | 2020-07-20 | Paper |
| Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications | 2020-05-20 | Paper |
| Strongly secure authenticated key exchange from supersingular isogenies | 2020-05-20 | Paper |
| Collusion resistant watermarking schemes for cryptographic functionalities | 2020-05-20 | Paper |
| Ring signatures based on Middle-Product Learning with Errors problems | 2020-05-06 | Paper |
| Raptor: a practical lattice-based (linkable) ring signature | 2020-01-30 | Paper |
| Strong leakage and tamper-resilient PKE from refined hash proof system | 2020-01-30 | Paper |
| A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices | 2020-01-28 | Paper |
| An efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks using online/offline certificateless aggregate signature | 2020-01-10 | Paper |
| Simulation-based selective opening security for receivers under chosen-ciphertext attacks | 2019-05-24 | Paper |
| Fuzzy public-key encryption based on biometric data | 2018-11-07 | Paper |
| Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps | 2018-10-22 | Paper |
| Unforgeable watermarking schemes with public extraction | 2018-10-17 | Paper |
| Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0) | 2018-09-26 | Paper |
| Lattice-based universal accumulator with nonmembership arguments | 2018-09-26 | Paper |
| Practical signatures from the Partial Fourier Recovery problem revisited: a provably-secure and Gaussian-distributed construction | 2018-09-26 | Paper |
| Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation | 2018-09-26 | Paper |
| Hedged nonce-based public-key encryption: adaptive security under randomness failures | 2018-05-16 | Paper |
| Functional encryption for computational hiding in prime order groups via pair encodings | 2018-01-26 | Paper |
| A general framework for secure sharing of personal health records in cloud system | 2017-09-15 | Paper |
| Exploring effect of location number on map-based graphical password authentication | 2017-08-25 | Paper |
| <inline-formula><tex-math>$k$</tex-math><alternatives> <inline-graphic xlink:type="simple" xlink:href="huang-ieq1-2366741.gif"/></alternatives></inline-formula>-Times Attribute-Based Anonymous Access Control for Cloud Computing | 2017-05-16 | Paper |
| Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator | 2016-12-19 | Paper |
| A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups | 2016-10-21 | Paper |
| Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security | 2016-09-02 | Paper |
| Leakage-Resilient Functional Encryption via Pair Encodings | 2016-08-31 | Paper |
| Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy | 2016-08-31 | Paper |
| Relations between robustness and RKA security under public-key encryption | 2016-04-13 | Paper |
| Complete Robustness in Identity-Based Encryption | 2015-09-29 | Paper |
| PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption | 2015-07-27 | Paper |
| Security pitfalls of an efficient threshold proxy signature scheme for mobile agents | 2015-06-25 | Paper |
| Optimistic fair exchange in the enhanced chosen-key model | 2014-12-02 | Paper |
| Attribute-based optimistic fair exchange: how to restrict brokers with policies | 2014-03-13 | Paper |
| Efficient Semi-static Secure Broadcast Encryption Scheme | 2014-02-18 | Paper |
| Anonymous Signcryption against Linear Related-Key Attacks | 2013-10-23 | Paper |
| Fairness in Concurrent Signatures Revisited | 2013-06-28 | Paper |
| Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” | 2013-06-28 | Paper |
| Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction | 2013-02-19 | Paper |
| Efficient Escrow-Free Identity-Based Signature | 2012-11-06 | Paper |
| Electronic Cash with Anonymous User Suspension | 2011-07-07 | Paper |
| Oblivious Transfer with Access Control : Realizing Disjunction without Duplication | 2010-11-26 | Paper |
| A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) | 2010-10-12 | Paper |
| Escrowed Deniable Identification Schemes | 2010-04-23 | Paper |
| Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? | 2009-12-11 | Paper |
| Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems | 2009-04-29 | Paper |
| Practical Compact E-Cash | 2009-03-06 | Paper |
| Constant-Size Dynamic k-TAA | 2008-11-27 | Paper |
| Traceable and Retrievable Identity-Based Encryption | 2008-06-13 | Paper |
| Compact E-Cash from Bounded Accumulator | 2008-04-17 | Paper |
| Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature | 2008-04-11 | Paper |
| (Convertible) Undeniable Signatures Without Random Oracles | 2008-03-25 | Paper |
| Short E-Cash | 2008-03-17 | Paper |
| Event-Oriented k-Times Revocable-iff-Linked Group Signatures | 2007-09-07 | Paper |
| Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |