| Publication | Date of Publication | Type |
|---|
| Anonymous reputation systems with revocation, revisited | 2025-05-23 | Paper |
| Signature for objects: formalizing how to authenticate physical data and more | 2024-07-17 | Paper |
| Practical round-optimal blind signatures in the ROM from standard assumptions | 2024-06-26 | Paper |
| Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions | 2024-03-14 | Paper |
Succinct attribute-based signatures for bounded-size circuits by combining algebraic and arithmetic proofs Lecture Notes in Computer Science | 2023-07-25 | Paper |
| Achieving pairing-free aggregate signatures using pre-communication between signers | 2023-03-21 | Paper |
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition 1511.68043 | 2022-12-22 | Paper |
| Field extension in secret-shared form and its applications to efficient secure computation | 2020-05-27 | Paper |
| Attribute-based signatures for unbounded languages from standard assumptions | 2019-01-23 | Paper |
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures International Journal of Applied Cryptography | 2018-11-26 | Paper |
| Formal treatment of verifiable privacy-preserving data-aggregation protocols | 2018-11-07 | Paper |
| Group signature with deniability: how to disavow a signature | 2018-10-26 | Paper |
| Simple, secure, and efficient searchable symmetric encryption with multiple encrypted indexes | 2018-10-24 | Paper |
| Fully anonymous group signature with verifier-local revocation | 2018-10-17 | Paper |
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency Theoretical Computer Science | 2016-05-02 | Paper |
Attribute-based signatures for circuits from bilinear map Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
THE INVERSE MEAN CURVATURE FLOW IN RANK ONE SYMMETRIC SPACES OF NON-COMPACT TYPE Kyushu Journal of Mathematics | 2015-12-11 | Paper |
Dynamic threshold public-key encryption with decryption consistency from static assumptions Information Security and Privacy | 2015-10-20 | Paper |
A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list Applied Cryptography and Network Security | 2014-07-07 | Paper |
Group signatures with message-dependent opening Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
Three-subset meet-in-the-middle attack on reduced XTEA Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Ciphertext-policy delegatable hidden vector encryption and its application to searchable encryption in multi-user setting Cryptography and Coding | 2011-12-16 | Paper |
Towards restricting plaintext space in public key encryption Advances in Information and Computer Security | 2011-11-10 | Paper |