| Publication | Date of Publication | Type |
|---|
| Robust decentralized multi-client functional encryption: motivation, definition, and inner-product constructions | 2024-09-13 | Paper |
| Compact accountable ring signatures in the plain model | 2024-07-17 | Paper |
| Compact ring signatures with post-quantum security in standard model | 2024-07-17 | Paper |
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts Information Sciences | 2024-04-11 | Paper |
| A tightly secure ID-based signature scheme under DL assumption in AGM | 2024-01-11 | Paper |
Efficient unique ring signatures from lattices Computer Security – ESORICS 2022 | 2023-07-28 | Paper |
Multimodal private signatures Advances in Cryptology – CRYPTO 2022 | 2023-06-28 | Paper |
| Optimal tightness for chain-based unique signatures | 2022-08-30 | Paper |
Lattice-based IBE with equality test supporting flexible authorization in the standard model (available as arXiv preprint) | 2022-07-06 | Paper |
Generic construction for tightly-secure signatures from discrete log Theoretical Computer Science | 2021-09-27 | Paper |
Certificateless aggregate signature scheme secure against fully chosen-key attacks Information Sciences | 2021-03-31 | Paper |
Accountable identity-based encryption with distributed private key generators Information Sciences | 2021-03-16 | Paper |
Generalized public-key cryptography with tight security Information Sciences | 2021-02-05 | Paper |
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters Information Sciences | 2020-09-22 | Paper |
Privacy-enhanced attribute-based private information retrieval Information Sciences | 2020-09-08 | Paper |
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes Information Sciences | 2020-07-20 | Paper |
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts Theoretical Computer Science | 2020-01-29 | Paper |
Strongly leakage resilient authenticated key exchange, revisited Designs, Codes and Cryptography | 2019-11-07 | Paper |
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems Theoretical Computer Science | 2019-03-26 | Paper |
| Introduction to security reduction | 2018-07-18 | Paper |
Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost Theoretical Computer Science | 2018-02-06 | Paper |
Functional encryption for computational hiding in prime order groups via pair encodings Designs, Codes and Cryptography | 2018-01-26 | Paper |
| Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample | 2017-11-15 | Paper |
Strong authenticated key exchange with auxiliary inputs Designs, Codes and Cryptography | 2017-09-15 | Paper |
A note on the strong authenticated key exchange with auxiliary inputs Designs, Codes and Cryptography | 2017-09-15 | Paper |
Cryptographic reverse firewall via malleable smooth projective hash functions Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Iterated random oracle: a universal approach for finding loss in security reduction Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Ciphertext-policy attribute based encryption supporting access policy update Provable Security | 2017-01-06 | Paper |
Oblivious keyword search with authorization Provable Security | 2017-01-06 | Paper |
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups Lecture Notes in Computer Science | 2016-10-21 | Paper |
Public Key Encryption with Authorized Keyword Search Information Security and Privacy | 2016-09-02 | Paper |
Anonymous identity-based broadcast encryption with revocation for file sharing Information Security and Privacy | 2016-09-02 | Paper |
One-round strong oblivious signature-based envelope Information Security and Privacy | 2016-09-02 | Paper |
Ciphertext-policy attribute-based encryption with key-delegation abuse resistance Information Security and Privacy | 2016-08-31 | Paper |
Generalized closest substring encryption Designs, Codes and Cryptography | 2016-06-27 | Paper |
Strongly leakage-resilient authenticated key exchange Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
Efficient dynamic threshold identity-based encryption with constant-size ciphertext Theoretical Computer Science | 2015-12-08 | Paper |
A new general framework for secure public key encryption with keyword search Information Security and Privacy | 2015-10-20 | Paper |
Improved identity-based online/offline encryption Information Security and Privacy | 2015-10-20 | Paper |
Efficient and secure stored-value cards with leakage resilience Computers and Electrical Engineering | 2013-08-19 | Paper |
Efficient and secure stored-value cards with leakage resilience Computers and Electrical Engineering | 2013-08-19 | Paper |
Membership encryption and its applications Information Security and Privacy | 2013-06-28 | Paper |
A pre-computable signature scheme with efficient verification for RFID Information Security Practice and Experience | 2012-06-29 | Paper |
Online/offline verification of short signatures Information Security and Cryptology | 2011-07-29 | Paper |
Efficient online/offline signatures with computational leakage resilience in online phase Information Security and Cryptology | 2011-07-29 | Paper |
How to prove security of a signature with a tighter security reduction Provable Security | 2009-12-11 | Paper |
Multi-identity management for identity-based cryptography Journal of Discrete Mathematical Sciences and Cryptography | 2009-04-28 | Paper |
Identity-Based Online/Offline Encryption Financial Cryptography and Data Security | 2009-02-12 | Paper |
Multi-Identity Single-Key Decryption without Random Oracles Information Security and Cryptology | 2009-02-10 | Paper |
Optimal Online/Offline Signature: How to Sign a Message without Online Computation Provable Security | 2009-01-27 | Paper |
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles Cryptology and Network Security | 2008-04-15 | Paper |
Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key Pairing-Based Cryptography – Pairing 2007 | 2007-11-29 | Paper |