| Publication | Date of Publication | Type |
|---|
| Signature for objects: formalizing how to authenticate physical data and more | 2024-07-17 | Paper |
| Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions | 2024-03-14 | Paper |
Maliciously circuit-private multi-key FHE and MPC based on LWE Designs, Codes and Cryptography | 2023-04-28 | Paper |
| Achieving pairing-free aggregate signatures using pre-communication between signers | 2023-03-21 | Paper |
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition 1511.68043 | 2022-12-22 | Paper |
On Private Information Retrieval Supporting Range Queries 1511.68044 | 2022-12-22 | Paper |
| Generic constructions for fully secure revocable attribute-based encryption | 2022-08-25 | Paper |
| Constant-round client-aided secure comparison protocol | 2022-08-25 | Paper |
Generic transformation from broadcast encryption to round-optimal deniable ring authentication Designs, Codes and Cryptography | 2022-03-21 | Paper |
| Impossibility on tamper-resilient cryptography with uniqueness properties | 2021-12-21 | Paper |
Generic hardness of inversion on ring and its relation to self-bilinear map Theoretical Computer Science | 2020-04-21 | Paper |
| Improved security evaluation techniques for imperfect randomness from arbitrary distributions | 2020-01-28 | Paper |
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions Theoretical Computer Science | 2019-10-18 | Paper |
| Attribute-based signatures for unbounded languages from standard assumptions | 2019-01-23 | Paper |
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures International Journal of Applied Cryptography | 2018-11-26 | Paper |
| Formal treatment of verifiable privacy-preserving data-aggregation protocols | 2018-11-07 | Paper |
| Token-based multi-input functional encryption | 2018-11-07 | Paper |
| Group signature with deniability: how to disavow a signature | 2018-10-26 | Paper |
| On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data | 2018-10-24 | Paper |
| Secure multi-party computation using polarizing cards | 2018-10-24 | Paper |
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions Lecture Notes in Computer Science | 2018-10-17 | Paper |
| Fully anonymous group signature with verifier-local revocation | 2018-10-17 | Paper |
| Memory lower bounds of reductions revisited | 2018-07-09 | Paper |
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems Designs, Codes and Cryptography | 2018-07-03 | Paper |
| Fast lattice basis reduction suitable for massive parallelization and its application to the shortest vector problem | 2018-05-16 | Paper |
| A public-key encryption scheme based on non-linear indeterminate equations | 2018-04-26 | Paper |
Secure grouping protocol using a deck of cards (available as arXiv preprint) | 2018-03-16 | Paper |
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications Algorithmica | 2018-01-05 | Paper |
| Towards user-friendly cryptography | 2017-10-23 | Paper |
On the Security of Pseudorandomized Information-Theoretically Secure Schemes IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness Lecture Notes in Computer Science | 2017-01-06 | Paper |
Size-Hiding Computation for Multiple Parties Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security Information and Communications Security | 2016-12-19 | Paper |
Adversary-dependent lossy trapdoor function from hardness of factoring semi-smooth RSA subgroup moduli Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Signatures Resilient to Uninvertible Leakage Lecture Notes in Computer Science | 2016-10-21 | Paper |
Attribute-based encryption for range attributes Lecture Notes in Computer Science | 2016-10-21 | Paper |
Attribute Based Encryption with Direct Efficiency Tradeoff Applied Cryptography and Network Security | 2016-10-04 | Paper |
Fuzzy signatures: relaxing requirements and a new construction Applied Cryptography and Network Security | 2016-10-04 | Paper |
Generalized hardness assumption for self-bilinear map with auxiliary information Information Security and Privacy | 2016-09-02 | Paper |
A Framework for Identity-Based Encryption with Almost Tight Security Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks Information Security and Cryptology - ICISC 2015 | 2016-05-19 | Paper |
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency Theoretical Computer Science | 2016-05-02 | Paper |
Attribute-based signatures for circuits from bilinear map Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
On the key dependent message security of the Fujisaki-Okamoto constructions Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Trading plaintext-awareness for simulatability to achieve chosen ciphertext security Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
A signature scheme with a fuzzy private key Applied Cryptography and Network Security | 2016-03-10 | Paper |
Completeness of single-bit projection-KDM security for public key encryption Lecture Notes in Computer Science | 2016-03-02 | Paper |
Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption Lecture Notes in Computer Science | 2016-03-02 | Paper |
Black-box separations of hash-and-sign signatures in the non-programmable random oracle model Provable Security | 2016-01-27 | Paper |
Multi-party computation with small shuffle complexity using regular polygon cards Provable Security | 2016-01-27 | Paper |
Dynamic threshold public-key encryption with decryption consistency from static assumptions Information Security and Privacy | 2015-10-20 | Paper |
Compact public key encryption with minimum ideal property of hash functions Provable Security | 2015-09-29 | Paper |
A short fail-stop signature scheme from factoring Provable Security | 2015-09-29 | Paper |
Efficient key dependent message security amplification against chosen ciphertext attacks Information Security and Cryptology - ICISC 2014 | 2015-09-11 | Paper |
Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms Theory of Cryptography | 2015-07-06 | Paper |
More constructions of re-splittable threshold public key encryption Advances in Information and Computer Security | 2015-05-27 | Paper |
Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues Lecture Notes in Computer Science | 2014-10-14 | Paper |
Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption Advances in Information and Computer Security | 2014-09-15 | Paper |
Reducing the spread of damage of key exposures in key-insulated encryption Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list Applied Cryptography and Network Security | 2014-07-07 | Paper |
All-but-one dual projective hashing and its applications Applied Cryptography and Network Security | 2014-07-07 | Paper |
Chosen ciphertext security via UCE Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
A framework and compact constructions for non-monotonic attribute-based encryption Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Chosen ciphertext security via point obfuscation Theory of Cryptography | 2014-02-18 | Paper |
Ciphertext Policy Multi-dimensional Range Encryption Lecture Notes in Computer Science | 2013-06-04 | Paper |
Chosen ciphertext secure keyed-homomorphic public-key encryption Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Key encapsulation mechanisms from extractable hash proof systems, revisited Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Group signatures with message-dependent opening Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
Time-specific encryption from forward-secure encryption Lecture Notes in Computer Science | 2012-09-25 | Paper |
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups Lecture Notes in Computer Science | 2012-09-25 | Paper |
Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Space efficient signature schemes from the RSA assumption Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption Lecture Notes in Computer Science | 2012-06-08 | Paper |
Two-dimensional representation of cover free families and its applications: short signatures and more Lecture Notes in Computer Science | 2012-06-08 | Paper |
Towards restricting plaintext space in public key encryption Advances in Information and Computer Security | 2011-11-10 | Paper |
Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks Applied Cryptography and Network Security | 2011-06-28 | Paper |
Applications of signcryption Practical Signcryption | 2011-05-18 | Paper |
Generic constructions for chosen-ciphertext secure attribute based encryption Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
On the security of a bidirectional proxy re-encryption scheme from PKC 2010 Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Efficient broadcast encryption with personalized messages Provable Security | 2010-10-12 | Paper |
Toward an easy-to-understand structure for achieving chosen ciphertext security from the decisional Diffie-Hellman assumption Provable Security | 2010-10-12 | Paper |
An improvement of pseudorandomization against unbounded attack algorithms -- the case of fingerprint codes Lecture Notes in Computer Science | 2010-09-29 | Paper |
On the Security of Pseudorandomized Information-Theoretically Secure Schemes Lecture Notes in Computer Science | 2010-09-29 | Paper |
Generic constructions of parallel key-insulated encryption Lecture Notes in Computer Science | 2010-09-10 | Paper |
Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations Lecture Notes in Computer Science | 2010-02-09 | Paper |
The role of arbiters in asymmetric authentication schemes Lecture Notes in Computer Science | 2010-02-09 | Paper |
Unconditionally secure chaffing-and-winnowing for multiple use Lecture Notes in Computer Science | 2009-12-03 | Paper |
On the Theoretical Gap between Group Signatures with and without Unlinkability Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Introduction to the Special Issue on Information Theoretic Security IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Orthogonality between Key Privacy and Data Privacy, Revisited Information Security and Cryptology | 2009-02-10 | Paper |
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk) Lecture Notes in Computer Science | 2009-01-09 | Paper |
Efficient Identity-Based Encryption with Tight Security Reduction Cryptology and Network Security | 2009-01-09 | Paper |
Relations Among Notions of Security for Identity Based Encryption Schemes LATIN 2006: Theoretical Informatics | 2008-09-18 | Paper |
An Efficient Strong Key-Insulated Signature Scheme and Its Application Public Key Infrastructure | 2008-06-12 | Paper |
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function Provable Security | 2008-06-10 | Paper |
Formal Security Treatments for Signatures from Identity-Based Encryption Provable Security | 2008-06-10 | Paper |
Bounded CCA2-Secure Encryption Advances in Cryptology – ASIACRYPT 2007 | 2008-05-15 | Paper |
Trade-Off Traitor Tracing Lecture Notes in Computer Science | 2008-04-11 | Paper |
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application Lecture Notes in Computer Science | 2008-03-18 | Paper |
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service Information Security and Privacy | 2007-09-07 | Paper |
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT Information Security and Privacy | 2007-09-07 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes Lecture Notes in Computer Science | 2007-02-12 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes Lecture Notes in Computer Science | 2007-02-12 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes Lecture Notes in Computer Science | 2007-02-12 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
| scientific article; zbMATH DE number 2086723 (Why is no real title available?) | 2004-08-11 | Paper |
| scientific article; zbMATH DE number 2085422 (Why is no real title available?) | 2004-08-09 | Paper |
| scientific article; zbMATH DE number 2080181 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2043335 (Why is no real title available?) | 2004-02-16 | Paper |
| scientific article; zbMATH DE number 1980951 (Why is no real title available?) | 2003-09-15 | Paper |
Unconditionally Secure Anonymous Encryption and Group Authentication Lecture Notes in Computer Science | 2003-07-16 | Paper |
| scientific article; zbMATH DE number 1941244 (Why is no real title available?) | 2003-06-29 | Paper |
| scientific article; zbMATH DE number 1618052 (Why is no real title available?) | 2002-11-04 | Paper |
| scientific article; zbMATH DE number 1617941 (Why is no real title available?) | 2002-09-01 | Paper |
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks The Computer Journal | 2002-08-28 | Paper |
| scientific article; zbMATH DE number 1424191 (Why is no real title available?) | 2002-04-08 | Paper |
| scientific article; zbMATH DE number 1583775 (Why is no real title available?) | 2002-03-06 | Paper |
| scientific article; zbMATH DE number 1504561 (Why is no real title available?) | 2002-01-29 | Paper |
| scientific article; zbMATH DE number 1420972 (Why is no real title available?) | 2000-09-04 | Paper |
| scientific article; zbMATH DE number 1189383 (Why is no real title available?) | 1998-08-13 | Paper |