| Publication | Date of Publication | Type |
|---|
| Improved polynomial secret-sharing schemes | 2024-08-02 | Paper |
| One-out-of-\(q\) OT combiners | 2024-07-22 | Paper |
| Linear Secret-Sharing Schemes for Forbidden Graph Access Structures | 2022-05-30 | Paper |
| The share size of secret-sharing schemes for almost all access structures and graphs | 2022-03-23 | Paper |
| Privacy-preserving data splitting: a combinatorial approach | 2021-06-24 | Paper |
| Secret sharing schemes for ports of matroids of rank 3 | 2021-04-13 | Paper |
| Common information, matroid representation, and secret sharing for matroid ports | 2021-01-25 | Paper |
| Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing | 2020-12-04 | Paper |
| Secret-sharing schemes for general and uniform access structures | 2020-02-04 | Paper |
| Self-enforcing protocols via co-utile reputation management | 2020-01-06 | Paper |
| Local bounds for the optimal information ratio of secret sharing schemes | 2019-05-24 | Paper |
| Improving the linear programming technique in the search for lower bounds in secret sharing | 2018-07-09 | Paper |
| Linear secret-sharing schemes for forbidden graph access structures | 2018-01-19 | Paper |
| Resource-efficient OT combiners with active security | 2018-01-19 | Paper |
| On the information ratio of non-perfect secret sharing schemes | 2018-01-05 | Paper |
| Ideal Hierarchical Secret Sharing Schemes | 2017-07-12 | Paper |
| Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts | 2017-05-16 | Paper |
| Natural Generalizations of Threshold Secret Sharing | 2017-05-16 | Paper |
| Secret Sharing Schemes for Dense Forbidden Graphs | 2016-10-21 | Paper |
| Recent Advances in Non-perfect Secret Sharing Schemes | 2016-08-17 | Paper |
| Generalization-based privacy preservation and discrimination prevention in data publishing and mining | 2016-08-04 | Paper |
| Secret-sharing schemes for very dense graphs | 2016-06-01 | Paper |
| Extending Brickell-Davenport theorem to non-perfect secret sharing schemes | 2015-02-19 | Paper |
| Optimal Non-perfect Uniform Secret Sharing Schemes | 2014-08-07 | Paper |
| Linear spaces and transversal designs: \(k\)-anonymous combinatorial configurations for anonymous database search notes | 2014-04-29 | Paper |
| Provably secure threshold public-key encryption with adaptive security and short ciphertexts | 2012-10-25 | Paper |
| Linear threshold multisecret sharing schemes | 2012-10-23 | Paper |
| Secret Sharing Schemes for Very Dense Graphs | 2012-09-25 | Paper |
| Ideal multipartite secret sharing schemes | 2012-07-10 | Paper |
| TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections | 2012-06-08 | Paper |
| On the optimization of bipartite secret sharing schemes | 2012-03-23 | Paper |
| Bridging Broadcast Encryption and Group Key Agreement | 2011-12-02 | Paper |
| Natural Generalizations of Threshold Secret Sharing | 2011-12-02 | Paper |
| Ideal Secret Sharing Schemes for Useful Multipartite Access Structures | 2011-06-08 | Paper |
| Linear Threshold Multisecret Sharing Schemes | 2010-09-29 | Paper |
| On the Optimization of Bipartite Secret Sharing Schemes | 2010-09-29 | Paper |
| Ideal Hierarchical Secret Sharing Schemes | 2010-02-24 | Paper |
| Ideal Multipartite Secret Sharing Schemes | 2007-11-29 | Paper |
| A Note on Extension Properties and Representations of Matroids | N/A | Paper |