| Publication | Date of Publication | Type |
|---|
| Vector commitments with proofs of smallness: short range proofs and more | 2024-11-12 | Paper |
| Simulation-extractable KZG polynomial commitments and applications to HyperPlonk | 2024-11-12 | Paper |
| PointProofs, revisited | 2023-08-21 | Paper |
| Cumulatively all-lossy-but-one trapdoor functions from standard assumptions | 2023-07-25 | Paper |
| New and improved constructions for partially equivocable public key encryption | 2023-07-25 | Paper |
| Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors | 2023-07-05 | Paper |
| Simulation-sound arguments for LWE and applications to KDM-CCA2 security | 2023-03-21 | Paper |
| Lattice-based e-cash, revisited | 2023-03-21 | Paper |
| Adaptive Simulation Security for Inner Product Functional Encryption | 2022-10-13 | Paper |
| New constructions of statistical NIZKs: dual-mode DV-NIZKs and more | 2021-12-01 | Paper |
| Adaptive oblivious transfer with access control from lattice assumptions | 2021-10-21 | Paper |
| Adaptively secure distributed PRFs from \(\mathsf{LWE}\) | 2021-07-30 | Paper |
| SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions | 2021-05-10 | Paper |
| Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions | 2020-11-06 | Paper |
| Multi-client functional encryption for linear functions in the standard model from LWE | 2020-05-11 | Paper |
| Lossy algebraic filters with short tags | 2020-01-28 | Paper |
| Zero-knowledge elementary databases with more expressive queries | 2020-01-28 | Paper |
| Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption | 2019-01-18 | Paper |
| Adaptively secure distributed PRFs from LWE | 2018-12-06 | Paper |
| Compact IBBE and fuzzy IBE from simple assumptions | 2018-10-17 | Paper |
| Lattice-based zero-knowledge arguments for integer relations | 2018-09-26 | Paper |
| Adaptive oblivious transfer with access control from lattice assumptions | 2018-04-06 | Paper |
| Zero-knowledge arguments for lattice-based PRFs and applications to E-cash | 2018-02-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4598166 | 2017-12-19 | Paper |
| All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE | 2017-10-27 | Paper |
| Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption | 2017-07-27 | Paper |
| Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability With Short Ciphertexts and Private Keys | 2017-07-12 | Paper |
| Efficient cryptosystems from \(2^k\)-th power residue symbols | 2017-05-22 | Paper |
| Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves | 2017-04-12 | Paper |
| Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions | 2017-01-06 | Paper |
| Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption | 2017-01-06 | Paper |
| Fully Secure Functional Encryption for Inner Products, from Standard Assumptions | 2016-11-09 | Paper |
| Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys | 2016-10-21 | Paper |
| A Lattice-Based Group Signature Scheme with Message-Dependent Opening | 2016-10-04 | Paper |
| Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares | 2016-08-31 | Paper |
| Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors | 2016-07-15 | Paper |
| Compactly Hiding Linear Spans | 2016-06-10 | Paper |
| Efficient revocation and threshold pairing based cryptosystems | 2015-09-04 | Paper |
| Born and raised distributively | 2015-09-03 | Paper |
| Group Signatures with Message-Dependent Opening in the Standard Model | 2014-03-28 | Paper |
| Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications | 2014-03-25 | Paper |
| Lattice-Based Group Signatures with Logarithmic Signature Size | 2013-12-10 | Paper |
| A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data | 2013-11-12 | Paper |
| Linearly Homomorphic Structure-Preserving Signatures and Their Applications | 2013-09-17 | Paper |
| Adaptively secure non-interactive threshold cryptosystems | 2013-06-06 | Paper |
| Efficient Cryptosystems from 2 k -th Power Residue Symbols | 2013-05-31 | Paper |
| Robust Encryption, Revisited | 2013-04-19 | Paper |
| Divisible E-Cash in the Standard Model | 2013-04-04 | Paper |
| Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems | 2013-01-07 | Paper |
| Group Signatures with Almost-for-Free Revocation | 2012-09-25 | Paper |
| Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model | 2012-07-20 | Paper |
| Scalable Group Signatures with Revocation | 2012-06-29 | Paper |
| Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions | 2012-06-15 | Paper |
| Short Attribute-Based Signatures for Threshold Predicates | 2012-06-08 | Paper |
| Fully Forward-Secure Group Signatures | 2012-06-08 | Paper |
| Attribute-based encryption schemes with constant-size ciphertexts | 2012-05-14 | Paper |
| Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes | 2011-12-16 | Paper |
| Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security | 2011-12-02 | Paper |
| Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security | 2011-12-02 | Paper |
| Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation | 2011-11-15 | Paper |
| Adaptively Secure Non-interactive Threshold Cryptosystems | 2011-07-07 | Paper |
| Signcryption Schemes Based on the Diffie–Hellman Problem | 2011-05-18 | Paper |
| Signcryption Schemes Based on Bilinear Maps | 2011-05-18 | Paper |
| Homomorphic Network Coding Signatures in the Standard Model | 2011-03-15 | Paper |
| Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts | 2011-03-15 | Paper |
| Efficient traceable signatures in the standard model | 2011-03-14 | Paper |
| Efficient Completely Non-malleable Public Key Encryption | 2010-09-07 | Paper |
| Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation | 2010-05-28 | Paper |
| Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions | 2010-05-04 | Paper |
| Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs | 2010-02-24 | Paper |
| Group Encryption: Non-interactive Realization in the Standard Model | 2009-12-15 | Paper |
| Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model | 2009-11-26 | Paper |
| Efficient Traceable Signatures in the Standard Model | 2009-08-18 | Paper |
| Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups | 2009-05-14 | Paper |
| Topics in Cryptology – CT-RSA 2004 | 2009-05-07 | Paper |
| Adaptive-ID Secure Revocable Identity-Based Encryption | 2009-04-29 | Paper |
| Key Evolution Systems in Untrusted Update Environments | 2009-04-29 | Paper |
| Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys | 2009-03-24 | Paper |
| Tracing Malicious Proxies in Proxy Re-encryption | 2009-02-10 | Paper |
| Efficient Intrusion-Resilient Signatures Without Random Oracles | 2009-01-15 | Paper |
| Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions | 2008-11-27 | Paper |
| Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps | 2008-03-18 | Paper |
| Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption | 2008-03-05 | Paper |
| Certificateless Encryption Schemes Strongly Secure in the Standard Model | 2008-03-05 | Paper |
| Practical Time Capsule Signatures in the Standard Model from Bilinear Maps | 2007-11-29 | Paper |
| Identity Based Encryption Without Redundancy | 2007-09-24 | Paper |
| Parallel Key-Insulated Public Key Encryption Without Random Oracles | 2007-09-04 | Paper |
| Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
| Information and Communications Security | 2006-10-24 | Paper |
| Information Security | 2006-10-16 | Paper |
| Security in Communication Networks | 2006-10-10 | Paper |