| Publication | Date of Publication | Type |
|---|
| Improved polynomial secret-sharing schemes | 2024-08-02 | Paper |
| One-out-of-\(q\) OT combiners | 2024-07-22 | Paper |
| Linear Secret-Sharing Schemes for Forbidden Graph Access Structures | 2022-05-30 | Paper |
| The share size of secret-sharing schemes for almost all access structures and graphs | 2022-03-23 | Paper |
| Privacy-preserving data splitting: a combinatorial approach | 2021-06-24 | Paper |
| Secret sharing schemes for ports of matroids of rank 3. | 2021-04-13 | Paper |
| Common information, matroid representation, and secret sharing for matroid ports | 2021-01-25 | Paper |
| Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing | 2020-12-04 | Paper |
| Secret-sharing schemes for general and uniform access structures | 2020-02-04 | Paper |
| Self-enforcing protocols via co-utile reputation management | 2020-01-06 | Paper |
| Local bounds for the optimal information ratio of secret sharing schemes | 2019-05-24 | Paper |
| Improving the linear programming technique in the search for lower bounds in secret sharing | 2018-07-09 | Paper |
| Linear secret-sharing schemes for forbidden graph access structures | 2018-01-19 | Paper |
| Resource-efficient OT combiners with active security | 2018-01-19 | Paper |
| On the information ratio of non-perfect secret sharing schemes | 2018-01-05 | Paper |
| Ideal Hierarchical Secret Sharing Schemes | 2017-07-12 | Paper |
| Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts | 2017-05-16 | Paper |
| Natural Generalizations of Threshold Secret Sharing | 2017-05-16 | Paper |
| Secret sharing schemes for dense forbidden graphs | 2016-10-21 | Paper |
| Recent advances in non-perfect secret sharing schemes | 2016-08-17 | Paper |
| Generalization-based privacy preservation and discrimination prevention in data publishing and mining | 2016-08-04 | Paper |
| Secret-sharing schemes for very dense graphs | 2016-06-01 | Paper |
| Extending Brickell-Davenport theorem to non-perfect secret sharing schemes | 2015-02-19 | Paper |
| Optimal non-perfect uniform secret sharing schemes | 2014-08-07 | Paper |
| Linear spaces and transversal designs: \(k\)-anonymous combinatorial configurations for anonymous database search notes | 2014-04-29 | Paper |
| Provably secure threshold public-key encryption with adaptive security and short ciphertexts | 2012-10-25 | Paper |
| Linear threshold multisecret sharing schemes | 2012-10-23 | Paper |
| Secret sharing schemes for very dense graphs | 2012-09-25 | Paper |
| Ideal multipartite secret sharing schemes | 2012-07-10 | Paper |
| TTP smartcard-based ElGamal cryptosystem using threshold scheme for electronic elections | 2012-06-08 | Paper |
| On the optimization of bipartite secret sharing schemes | 2012-03-23 | Paper |
| Bridging broadcast encryption and group key agreement | 2011-12-02 | Paper |
| Natural generalizations of threshold secret sharing | 2011-12-02 | Paper |
| Ideal secret sharing schemes for useful multipartite access structures | 2011-06-08 | Paper |
| Linear threshold multisecret sharing schemes | 2010-09-29 | Paper |
| On the Optimization of Bipartite Secret Sharing Schemes | 2010-09-29 | Paper |
| Ideal hierarchical secret sharing schemes | 2010-02-24 | Paper |
| Ideal Multipartite Secret Sharing Schemes | 2007-11-29 | Paper |
| A Note on Extension Properties and Representations of Matroids | N/A | Paper |