| Publication | Date of Publication | Type |
|---|
| Updatable public-key encryption, revisited | 2024-11-13 | Paper |
| On proving equivalence class signatures secure from non-interactive assumptions | 2024-11-12 | Paper |
| Concurrently secure blind Schnorr signatures | 2024-11-12 | Paper |
| SNACKs: leveraging proofs of sequential work for blockchain light clients | 2023-08-25 | Paper |
| Non-interactive Mimblewimble transactions, revisited | 2023-08-25 | Paper |
| Approximate distance-comparison-preserving symmetric encryption | 2023-07-25 | Paper |
| The One-More Discrete Logarithm Assumption in the Generic Group Model | 2023-05-26 | Paper |
| Efficient signatures on randomizable ciphertexts | 2022-12-16 | Paper |
| Double-authentication-preventing signatures in the standard model | 2022-12-16 | Paper |
| A classification of computational assumptions in the algebraic group model | 2022-11-09 | Paper |
| Simpler constructions of asymmetric primitives from obfuscation | 2022-07-06 | Paper |
| Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model | 2022-03-23 | Paper |
| Transferable e-cash: a cleaner model and the first practical instantiation | 2021-12-21 | Paper |
| Adaptively secure proxy re-encryption | 2020-01-28 | Paper |
| Structure-preserving signatures on equivalence classes and constant-size anonymous credentials | 2019-06-20 | Paper |
| The algebraic group model and its applications | 2018-09-26 | Paper |
| Non-interactive zaps of knowledge | 2018-08-10 | Paper |
| Weakly secure equivalence-class signatures from standard assumptions | 2018-05-29 | Paper |
| Subversion-zero-knowledge SNARKs | 2018-05-16 | Paper |
| Access Control Encryption for Equality, Comparison, and More | 2017-06-13 | Paper |
| NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion | 2017-01-06 | Paper |
| Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions | 2016-10-21 | Paper |
| Offline Witness Encryption | 2016-10-04 | Paper |
| Constrained PRFs for Unbounded Inputs with Short Keys | 2016-10-04 | Paper |
| Structure-preserving signatures and commitments to group elements | 2016-06-01 | Paper |
| Constrained PRFs for Unbounded Inputs | 2016-04-08 | Paper |
| Standard Security Does Imply Security Against Selective Opening for Markov Distributions | 2016-03-23 | Paper |
| Practical Round-Optimal Blind Signatures in the Standard Model | 2015-12-10 | Paper |
| A Quasipolynomial Reduction for Generalized Selective Decryption on Trees | 2015-12-10 | Paper |
| Anonymous Transferable E-Cash | 2015-08-27 | Paper |
| Key-Homomorphic Constrained Pseudorandom Functions | 2015-07-06 | Paper |
| Adaptive Security of Constrained PRFs | 2015-01-06 | Paper |
| Constrained Verifiable Random Functions | 2014-10-14 | Paper |
| Policy-Based Signatures | 2014-03-25 | Paper |
| Enhanced Chosen-Ciphertext Security and Applications | 2014-03-25 | Paper |
| Efficient Signatures of Knowledge and DAA in the Standard Model | 2014-01-24 | Paper |
| Plaintext-Checkable Encryption | 2012-06-08 | Paper |
| Achieving Optimal Anonymity in Transferable E-Cash with a Judge | 2011-06-29 | Paper |
| Commuting Signatures and Verifiable Encryption | 2011-05-27 | Paper |
| Signatures on Randomizable Ciphertexts | 2011-03-15 | Paper |
| Structure-Preserving Signatures and Commitments to Group Elements | 2010-08-24 | Paper |
| Batch Groth–Sahai | 2010-07-06 | Paper |
| Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions | 2010-05-04 | Paper |
| Fair Blind Signatures without Random Oracles | 2010-05-04 | Paper |
| Strong Cryptography from Weak Secrets | 2010-05-04 | Paper |
| Efficient Rational Secret Sharing in Standard Communication Networks | 2010-02-24 | Paper |
| Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures | 2009-08-18 | Paper |
| Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures | 2009-06-09 | Paper |
| Anonymous Proxy Signatures | 2008-11-20 | Paper |