| Publication | Date of Publication | Type |
|---|
| Robust decentralized multi-client functional encryption: motivation, definition, and inner-product constructions | 2024-09-13 | Paper |
| Compact accountable ring signatures in the plain model | 2024-07-17 | Paper |
| Compact ring signatures with post-quantum security in standard model | 2024-07-17 | Paper |
| Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts | 2024-04-11 | Paper |
| A tightly secure ID-based signature scheme under DL assumption in AGM | 2024-01-11 | Paper |
| Efficient unique ring signatures from lattices | 2023-07-28 | Paper |
| Multimodal private signatures | 2023-06-28 | Paper |
| Optimal tightness for chain-based unique signatures | 2022-08-30 | Paper |
| Lattice-based IBE with equality test supporting flexible authorization in the standard model | 2022-07-06 | Paper |
| Generic construction for tightly-secure signatures from discrete log | 2021-09-27 | Paper |
| Certificateless aggregate signature scheme secure against fully chosen-key attacks | 2021-03-31 | Paper |
| Accountable identity-based encryption with distributed private key generators | 2021-03-16 | Paper |
| Generalized public-key cryptography with tight security | 2021-02-05 | Paper |
| Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters | 2020-09-22 | Paper |
| Privacy-enhanced attribute-based private information retrieval | 2020-09-08 | Paper |
| Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes | 2020-07-20 | Paper |
| Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts | 2020-01-29 | Paper |
| Strongly leakage resilient authenticated key exchange, revisited | 2019-11-07 | Paper |
| Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems | 2019-03-26 | Paper |
| Introduction to security reduction | 2018-07-18 | Paper |
| Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost | 2018-02-06 | Paper |
| Functional encryption for computational hiding in prime order groups via pair encodings | 2018-01-26 | Paper |
| Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample | 2017-11-15 | Paper |
| Strong authenticated key exchange with auxiliary inputs | 2017-09-15 | Paper |
| A note on the strong authenticated key exchange with auxiliary inputs | 2017-09-15 | Paper |
| Cryptographic reverse firewall via malleable smooth projective hash functions | 2017-02-01 | Paper |
| Iterated random oracle: a universal approach for finding loss in security reduction | 2017-01-06 | Paper |
| Ciphertext-policy attribute based encryption supporting access policy update | 2017-01-06 | Paper |
| Oblivious keyword search with authorization | 2017-01-06 | Paper |
| A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups | 2016-10-21 | Paper |
| Public Key Encryption with Authorized Keyword Search | 2016-09-02 | Paper |
| Anonymous identity-based broadcast encryption with revocation for file sharing | 2016-09-02 | Paper |
| One-round strong oblivious signature-based envelope | 2016-09-02 | Paper |
| Ciphertext-policy attribute-based encryption with key-delegation abuse resistance | 2016-08-31 | Paper |
| Generalized closest substring encryption | 2016-06-27 | Paper |
| Strongly leakage-resilient authenticated key exchange | 2016-04-08 | Paper |
| Efficient dynamic threshold identity-based encryption with constant-size ciphertext | 2015-12-08 | Paper |
| A new general framework for secure public key encryption with keyword search | 2015-10-20 | Paper |
| Improved identity-based online/offline encryption | 2015-10-20 | Paper |
| Efficient and secure stored-value cards with leakage resilience | 2013-08-19 | Paper |
| Membership encryption and its applications | 2013-06-28 | Paper |
| A pre-computable signature scheme with efficient verification for RFID | 2012-06-29 | Paper |
| Online/offline verification of short signatures | 2011-07-29 | Paper |
| Efficient online/offline signatures with computational leakage resilience in online phase | 2011-07-29 | Paper |
| How to prove security of a signature with a tighter security reduction | 2009-12-11 | Paper |
| Multi-identity management for identity-based cryptography | 2009-04-28 | Paper |
| Identity-Based Online/Offline Encryption | 2009-02-12 | Paper |
| Multi-Identity Single-Key Decryption without Random Oracles | 2009-02-10 | Paper |
| Optimal Online/Offline Signature: How to Sign a Message without Online Computation | 2009-01-27 | Paper |
| Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles | 2008-04-15 | Paper |
| Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key | 2007-11-29 | Paper |