| Publication | Date of Publication | Type |
|---|
| Updatable public-key encryption, revisited | 2024-11-13 | Paper |
| On proving equivalence class signatures secure from non-interactive assumptions | 2024-11-12 | Paper |
| Concurrently secure blind Schnorr signatures | 2024-11-12 | Paper |
| SNACKs: leveraging proofs of sequential work for blockchain light clients | 2023-08-25 | Paper |
| Non-interactive Mimblewimble transactions, revisited | 2023-08-25 | Paper |
| Approximate distance-comparison-preserving symmetric encryption | 2023-07-25 | Paper |
| The One-More Discrete Logarithm Assumption in the Generic Group Model | 2023-05-26 | Paper |
| Efficient signatures on randomizable ciphertexts | 2022-12-16 | Paper |
| Double-authentication-preventing signatures in the standard model | 2022-12-16 | Paper |
| A classification of computational assumptions in the algebraic group model | 2022-11-09 | Paper |
| Simpler constructions of asymmetric primitives from obfuscation | 2022-07-06 | Paper |
| Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model | 2022-03-23 | Paper |
| Transferable e-cash: a cleaner model and the first practical instantiation | 2021-12-21 | Paper |
| Adaptively secure proxy re-encryption | 2020-01-28 | Paper |
| Structure-preserving signatures on equivalence classes and constant-size anonymous credentials | 2019-06-20 | Paper |
| The algebraic group model and its applications | 2018-09-26 | Paper |
| Non-interactive zaps of knowledge | 2018-08-10 | Paper |
| Weakly secure equivalence-class signatures from standard assumptions | 2018-05-29 | Paper |
| Subversion-zero-knowledge SNARKs | 2018-05-16 | Paper |
| Access Control Encryption for Equality, Comparison, and More | 2017-06-13 | Paper |
| NIZKs with an untrusted CRS: security in the face of parameter subversion | 2017-01-06 | Paper |
| Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions | 2016-10-21 | Paper |
| Offline witness encryption | 2016-10-04 | Paper |
| Constrained PRFs for unbounded inputs with short keys | 2016-10-04 | Paper |
| Structure-preserving signatures and commitments to group elements | 2016-06-01 | Paper |
| Constrained PRFs for unbounded inputs | 2016-04-08 | Paper |
| Standard Security Does Imply Security Against Selective Opening for Markov Distributions | 2016-03-23 | Paper |
| Practical Round-Optimal Blind Signatures in the Standard Model | 2015-12-10 | Paper |
| A quasipolynomial reduction for generalized selective decryption on trees | 2015-12-10 | Paper |
| Anonymous transferable e-cash | 2015-08-27 | Paper |
| Key-homomorphic constrained pseudorandom functions | 2015-07-06 | Paper |
| Adaptive Security of Constrained PRFs | 2015-01-06 | Paper |
| Constrained verifiable random functions | 2014-10-14 | Paper |
| Policy-Based Signatures | 2014-03-25 | Paper |
| Enhanced chosen-ciphertext security and applications | 2014-03-25 | Paper |
| Efficient signatures of knowledge and DAA in the standard model | 2014-01-24 | Paper |
| Plaintext-checkable encryption | 2012-06-08 | Paper |
| Achieving optimal anonymity in transferable e-cash with a judge | 2011-06-29 | Paper |
| Commuting signatures and verifiable encryption | 2011-05-27 | Paper |
| Signatures on randomizable ciphertexts | 2011-03-15 | Paper |
| Structure-preserving signatures and commitments to group elements | 2010-08-24 | Paper |
| Batch Groth-Sahai | 2010-07-06 | Paper |
| Public-key encryption with non-interactive opening: new constructions and stronger definitions | 2010-05-04 | Paper |
| Fair blind signatures without random oracles | 2010-05-04 | Paper |
| Strong cryptography from weak secrets. Building efficient PKE and IBE from distributed passwords | 2010-05-04 | Paper |
| Efficient rational secret sharing in standard communication networks | 2010-02-24 | Paper |
| Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures | 2009-08-18 | Paper |
| Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures | 2009-06-09 | Paper |
| Anonymous Proxy Signatures | 2008-11-20 | Paper |