| Publication | Date of Publication | Type |
|---|
| Efficient IBS from a new assumption in the multivariate-quadratic setting | 2023-08-14 | Paper |
| Revisiting the security of salted UOV signature | 2023-08-14 | Paper |
| Identity-based signature and extended forking algorithm in the multivariate quadratic setting | 2023-05-12 | Paper |
| From rerandomizability to sequential aggregation: efficient signature schemes based on SXDH assumption | 2021-06-08 | Paper |
| Rerandomizable signatures under standard assumption | 2020-05-12 | Paper |
| Malleability and ownership of proxy signatures: towards a stronger definition and its limitations | 2020-05-04 | Paper |
| Large universe subset predicate encryption based on static assumption (without random oracle) | 2020-01-28 | Paper |
| Keyword search meets membership testing: adaptive security from SXDH | 2019-03-29 | Paper |
| Towards static assumption based cryptosystem in pairing setting: further applications of DéjàQ and dual-form signature (extended abstract) | 2018-11-07 | Paper |
| Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis | 2018-10-04 | Paper |
| Private set-intersection with common set-up | 2018-09-21 | Paper |
| CCA-secure predicate encryption from pair encoding in prime order groups: generic and efficient | 2018-04-26 | Paper |
| Another look at tightness. II: Practical issues in cryptography | 2017-10-23 | Paper |
| On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One | 2017-09-08 | Paper |
| Fault Attacks on Pairing-Based Protocols: Revisited | 2017-05-16 | Paper |
| Type 2 Structure-Preserving Signature Schemes Revisited | 2016-06-10 | Paper |
| A closer look at multiple forking: leveraging (in)dependence for a tighter bound | 2016-05-31 | Paper |
| Property Preserving Symmetric Encryption Revisited | 2016-03-23 | Paper |
| Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data | 2015-05-27 | Paper |
| From Selective-ID to Full-ID IBS without Random Oracles | 2014-09-15 | Paper |
| Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption | 2013-11-15 | Paper |
| Galindo-Garcia Identity-Based Signature Revisited | 2013-06-04 | Paper |
| Variants of Waters’ Dual System Primitives Using Asymmetric Pairings | 2012-07-20 | Paper |
| Another Look at Tightness | 2012-06-08 | Paper |
| On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited | 2011-08-10 | Paper |
| A Generic Variant of NIST’s KAS2 Key Agreement Protocol | 2011-07-07 | Paper |
| Identity-Based Encryption | 2011-04-07 | Paper |
| Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols | 2010-12-07 | Paper |
| On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings | 2010-07-20 | Paper |
| Comparing two pairing-based aggregate signature schemes | 2010-05-19 | Paper |
| A new protocol for the nearby friend problem | 2010-01-07 | Paper |
| Reusing static keys in key agreement protocols | 2009-12-17 | Paper |
| Identity-based encryption and hierarchical identity-based encryption | 2009-03-24 | Paper |
| Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks | 2008-06-10 | Paper |
| New Constructions of Constant Size Ciphertext HIBE Without Random Oracle | 2008-05-06 | Paper |
| HIBE With Short Public Parameters Without Random Oracle | 2008-04-24 | Paper |
| Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext | 2008-04-11 | Paper |
| Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields | 2008-03-17 | Paper |
| Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
| Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |