| Publication | Date of Publication | Type |
|---|
| Polynomial commitments from lattices: post-quantum security, fast verification and transparent setup | 2025-01-10 | Paper |
| Circuit ABE with \(\mathsf{poly}(\mathrm{depth},\lambda )\)-sized ciphertexts and keys from lattices | 2024-12-13 | Paper |
| Laconic function evaluation and ABE for RAMs from (Ring-)LWE | 2024-12-13 | Paper |
| Succinct functional commitments for circuits from \(k\)-\textsf{Lin} | 2024-11-12 | Paper |
| Lattice-based functional commitments: fast verification and cryptanalysis | 2024-09-13 | Paper |
| Distributed broadcast encryption from bilinear groups | 2024-09-13 | Paper |
| Succinct vector, polynomial, and functional commitments from lattices | 2023-12-12 | Paper |
| Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin | 2023-12-12 | Paper |
| One-One Constrained Pseudorandom Functions. | 2023-11-02 | Paper |
| Witness encryption and null-iO from evasive LWE | 2023-08-25 | Paper |
| Multi-authority ABE from lattices without random oracles | 2023-08-14 | Paper |
| ABE for DFA from LWE against bounded collusions, revisited | 2023-04-13 | Paper |
| Succinct LWE sampling, random polynomials, and obfuscation | 2023-04-13 | Paper |
| Functional encryption for attribute-weighted sums from \(k\)-Lin | 2022-11-09 | Paper |
| Time-space tradeoffs and short collisions in Merkle-Damgård hash functions | 2022-11-09 | Paper |
| Optimal broadcast encryption and CP-ABE from evasive lattice assumptions | 2022-08-30 | Paper |
| On the inner product predicate and a generalization of matching vector families | 2022-07-21 | Paper |
| Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin | 2022-05-18 | Paper |
| Information-theoretic 2-round MPC without round collapsing: adaptive security, and more | 2022-03-23 | Paper |
| Candidate obfuscation via oblivious LWE sampling | 2021-12-08 | Paper |
| Functional encryption for quadratic functions from \(k\)-lin, revisited | 2021-12-01 | Paper |
| Adaptively secure ABE for DFA from \(k\)-Lin and more | 2021-12-01 | Paper |
| New constructions of statistical NIZKs: dual-mode DV-NIZKs and more | 2021-12-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5140842 | 2020-12-17 | Paper |
| Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin | 2020-06-15 | Paper |
| Matrix PRFs: constructions, attacks, and applications to obfuscation | 2020-04-30 | Paper |
| ABE for DFA from \(k\)-lin | 2020-03-09 | Paper |
| Compact adaptively secure ABE for \(\mathrm{NC}^1\) from \(k\)-lin | 2020-02-04 | Paper |
| Obfuscating simple functionalities from knowledge assumptions | 2020-01-28 | Paper |
| Improved inner-product encryption with adaptive security and full attribute-hiding | 2019-01-23 | Paper |
| Traitor-tracing from LWE made simple and attribute-based | 2018-12-06 | Paper |
| Tight adaptively secure broadcast encryption with short ciphertexts and keys | 2018-10-17 | Paper |
| On the Inner Product Predicate and a Generalization of Matching Vector Families | 2018-10-04 | Paper |
| GGH15 beyond permutation branching programs: proofs, attacks, and candidates | 2018-09-26 | Paper |
| Attribute-based encryption for circuits | 2018-08-02 | Paper |
| Towards breaking the exponential barrier for general secret sharing | 2018-07-09 | Paper |
| Unbounded ABE via bilinear entropy expansion, revisited | 2018-07-09 | Paper |
| A black-box construction of non-malleable encryption from semantically secure encryption | 2018-04-26 | Paper |
| Improved, black-box, non-malleable encryption from semantic security | 2018-04-06 | Paper |
| Private constrained PRFs (and more) from LWE | 2018-01-19 | Paper |
| Attribute-hiding predicate encryption in bilinear groups, revisited | 2018-01-19 | Paper |
| Conditional disclosure of secrets via non-linear reconstruction | 2017-11-03 | Paper |
| Multi-input inner-product functional encryption from pairings | 2017-06-13 | Paper |
| Targeted homomorphic attribute-based encryption | 2016-12-22 | Paper |
| FHE circuit privacy almost for free | 2016-10-27 | Paper |
| Leakage-resilient cryptography from minimal assumptions | 2016-09-21 | Paper |
| Tightly CCA-secure encryption without pairings | 2016-09-09 | Paper |
| Obfuscating conjunctions under entropic ring LWE | 2016-04-15 | Paper |
| KDM-security via homomorphic smooth projective hashing | 2016-04-13 | Paper |
| Déjà Q: encore! Un petit IBE | 2016-04-08 | Paper |
| Security Against Related Randomness Attacks via Reconstructive Extractors | 2016-01-12 | Paper |
| Structure-preserving signatures from standard assumptions, revisited | 2015-12-10 | Paper |
| Communication complexity of conditional disclosure of secrets and attribute-based encryption | 2015-12-10 | Paper |
| Predicate encryption for circuits from LWE | 2015-12-10 | Paper |
| Implicit zero-knowledge arguments and applications to the malicious setting | 2015-12-10 | Paper |
| Quasi-adaptive NIZK for linear subspaces revisited | 2015-09-30 | Paper |
| Improved dual system ABE in prime-order groups via predicate encodings | 2015-09-30 | Paper |
| Predicate encryption for multi-dimensional range queries from lattices | 2015-08-27 | Paper |
| Selfish caching in distributed systems, a game-theoretic analysis | 2015-08-03 | Paper |
| Inaccessible entropy | 2015-02-04 | Paper |
| Semi-adaptive attribute-based encryption and improved delegation for Boolean formula | 2014-10-14 | Paper |
| Shorter identity-based encryption via asymmetric pairings | 2014-09-04 | Paper |
| Attribute-based encryption for circuits | 2014-08-07 | Paper |
| Doubly spatial encryption from DBDH | 2014-07-07 | Paper |
| Partial garbling schemes and their applications | 2014-07-01 | Paper |
| On the complexity of UC commitments | 2014-05-27 | Paper |
| Dual System Encryption via Predicate Encodings | 2014-02-18 | Paper |
| Fully, (Almost) Tightly Secure IBE and Dual System Groups | 2013-09-17 | Paper |
| Functional encryption: new perspectives and lower bounds | 2013-09-17 | Paper |
| On the security of the TLS protocol: a systematic analysis | 2013-09-02 | Paper |
| Leakage-resilient cryptography from minimal assumptions | 2013-05-31 | Paper |
| Multi-party computation of polynomials and branching programs without simultaneous interaction | 2013-05-31 | Paper |
| Efficient, adaptively secure, and composable oblivious transfer with a single, global CRS | 2013-04-19 | Paper |
| Shorter IBE and signatures via asymmetric pairings | 2013-04-04 | Paper |
| Lossy trapdoor functions from homomorphic reproducible encryption | 2012-10-23 | Paper |
| Functional encryption with bounded collusions via multi-party computation | 2012-09-25 | Paper |
| Public Key Encryption against Related Key Attacks | 2012-07-20 | Paper |
| Efficient password authenticated key exchange via oblivious transfer | 2012-07-20 | Paper |
| Functional encryption for threshold functions (or fuzzy IBE) from lattices | 2012-07-20 | Paper |
| Dual projective hashing and its applications -- lossy trapdoor functions and more | 2012-06-29 | Paper |
| Threshold and revocation cryptosystems via extractable hash proofs | 2011-05-27 | Paper |
| Optimal cryptographic hardness of learning monotone functions | 2011-05-24 | Paper |
| On the round complexity of zero-knowledge proofs based on one-way permutations | 2010-08-31 | Paper |
| Efficient chosen-ciphertext security via extractable hash proofs | 2010-08-24 | Paper |
| On obfuscating point functions | 2010-08-16 | Paper |
| Constant-round non-malleable commitments from sub-exponential one-way functions | 2010-06-01 | Paper |
| Encryption schemes secure against chosen-ciphertext selective opening attacks | 2010-06-01 | Paper |
| Universal one-way hash functions via inaccessible entropy | 2010-06-01 | Paper |
| Improved non-committing encryption with applications to adaptively secure protocols | 2009-12-15 | Paper |
| Zero knowledge in the random oracle model, revisited | 2009-12-15 | Paper |
| Amplifying Collision Resistance: A Complexity-Theoretic Treatment | 2009-03-10 | Paper |
| Simple, Black-Box Constructions of Adaptively Secure Protocols | 2009-03-03 | Paper |
| Black-Box Constructions of Two-Party Protocols from One-Way Functions | 2009-03-03 | Paper |
| Optimal Cryptographic Hardness of Learning Monotone Functions | 2008-08-28 | Paper |
| Pebbling and Proofs of Work | 2008-03-17 | Paper |
| Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One | 2008-03-05 | Paper |
| One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments | 2007-08-30 | Paper |
| Lower Bounds for Non-interactive Zero-Knowledge | 2007-08-30 | Paper |
| Theory of Cryptography | 2007-02-12 | Paper |
| Automata, Languages and Programming | 2006-01-10 | Paper |
| Theory of Cryptography | 2005-12-07 | Paper |
| Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques | 2005-08-25 | Paper |