| Publication | Date of Publication | Type |
|---|
Polynomial commitments from lattices: post-quantum security, fast verification and transparent setup | 2025-01-10 | Paper |
Circuit ABE with \(\mathsf{poly}(\mathrm{depth},\lambda )\)-sized ciphertexts and keys from lattices | 2024-12-13 | Paper |
Laconic function evaluation and ABE for RAMs from (Ring-)LWE | 2024-12-13 | Paper |
Succinct functional commitments for circuits from \(k\)-\textsf{Lin} | 2024-11-12 | Paper |
Lattice-based functional commitments: fast verification and cryptanalysis | 2024-09-13 | Paper |
Distributed broadcast encryption from bilinear groups | 2024-09-13 | Paper |
Succinct vector, polynomial, and functional commitments from lattices Advances in Cryptology – EUROCRYPT 2023 | 2023-12-12 | Paper |
Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin Advances in Cryptology – EUROCRYPT 2023 | 2023-12-12 | Paper |
One-One Constrained Pseudorandom Functions. | 2023-11-02 | Paper |
Witness encryption and null-iO from evasive LWE Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Multi-authority ABE from lattices without random oracles Theory of Cryptography | 2023-08-14 | Paper |
ABE for DFA from LWE against bounded collusions, revisited | 2023-04-13 | Paper |
Succinct LWE sampling, random polynomials, and obfuscation | 2023-04-13 | Paper |
Functional encryption for attribute-weighted sums from \(k\)-Lin | 2022-11-09 | Paper |
Time-space tradeoffs and short collisions in Merkle-Damgård hash functions | 2022-11-09 | Paper |
Optimal broadcast encryption and CP-ABE from evasive lattice assumptions | 2022-08-30 | Paper |
On the inner product predicate and a generalization of matching vector families | 2022-07-21 | Paper |
Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin | 2022-05-18 | Paper |
Information-theoretic 2-round MPC without round collapsing: adaptive security, and more | 2022-03-23 | Paper |
Candidate obfuscation via oblivious LWE sampling | 2021-12-08 | Paper |
Functional encryption for quadratic functions from \(k\)-lin, revisited | 2021-12-01 | Paper |
Adaptively secure ABE for DFA from \(k\)-Lin and more | 2021-12-01 | Paper |
New constructions of statistical NIZKs: dual-mode DV-NIZKs and more | 2021-12-01 | Paper |
scientific article; zbMATH DE number 7286918 (Why is no real title available?) Theory of Computing | 2020-12-17 | Paper |
Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin Journal of Cryptology | 2020-06-15 | Paper |
Matrix PRFs: constructions, attacks, and applications to obfuscation | 2020-04-30 | Paper |
ABE for DFA from \(k\)-lin | 2020-03-09 | Paper |
Compact adaptively secure ABE for \(\mathrm{NC}^1\) from \(k\)-lin | 2020-02-04 | Paper |
Obfuscating simple functionalities from knowledge assumptions | 2020-01-28 | Paper |
Improved inner-product encryption with adaptive security and full attribute-hiding | 2019-01-23 | Paper |
Traitor-tracing from LWE made simple and attribute-based | 2018-12-06 | Paper |
Tight adaptively secure broadcast encryption with short ciphertexts and keys | 2018-10-17 | Paper |
On the Inner Product Predicate and a Generalization of Matching Vector Families | 2018-10-04 | Paper |
GGH15 beyond permutation branching programs: proofs, attacks, and candidates | 2018-09-26 | Paper |
Attribute-based encryption for circuits Journal of the ACM | 2018-08-02 | Paper |
Towards breaking the exponential barrier for general secret sharing | 2018-07-09 | Paper |
Unbounded ABE via bilinear entropy expansion, revisited | 2018-07-09 | Paper |
A black-box construction of non-malleable encryption from semantically secure encryption Journal of Cryptology | 2018-04-26 | Paper |
Improved, black-box, non-malleable encryption from semantic security Designs, Codes and Cryptography | 2018-04-06 | Paper |
Private constrained PRFs (and more) from LWE | 2018-01-19 | Paper |
Attribute-hiding predicate encryption in bilinear groups, revisited | 2018-01-19 | Paper |
Conditional disclosure of secrets via non-linear reconstruction | 2017-11-03 | Paper |
Multi-input inner-product functional encryption from pairings Lecture Notes in Computer Science | 2017-06-13 | Paper |
Targeted homomorphic attribute-based encryption Theory of Cryptography | 2016-12-22 | Paper |
FHE circuit privacy almost for free Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Leakage-resilient cryptography from minimal assumptions Journal of Cryptology | 2016-09-21 | Paper |
Tightly CCA-secure encryption without pairings Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Obfuscating conjunctions under entropic ring LWE Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science | 2016-04-15 | Paper |
KDM-security via homomorphic smooth projective hashing Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Déjà Q: encore! Un petit IBE Theory of Cryptography | 2016-04-08 | Paper |
Security Against Related Randomness Attacks via Reconstructive Extractors Cryptography and Coding | 2016-01-12 | Paper |
Structure-preserving signatures from standard assumptions, revisited Lecture Notes in Computer Science | 2015-12-10 | Paper |
Communication complexity of conditional disclosure of secrets and attribute-based encryption Lecture Notes in Computer Science | 2015-12-10 | Paper |
Predicate encryption for circuits from LWE Lecture Notes in Computer Science | 2015-12-10 | Paper |
Implicit zero-knowledge arguments and applications to the malicious setting Lecture Notes in Computer Science | 2015-12-10 | Paper |
Quasi-adaptive NIZK for linear subspaces revisited Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Improved dual system ABE in prime-order groups via predicate encodings Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Predicate encryption for multi-dimensional range queries from lattices Lecture Notes in Computer Science | 2015-08-27 | Paper |
Selfish caching in distributed systems, a game-theoretic analysis Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing | 2015-08-03 | Paper |
Inaccessible entropy Proceedings of the forty-first annual ACM symposium on Theory of computing | 2015-02-04 | Paper |
Semi-adaptive attribute-based encryption and improved delegation for Boolean formula Lecture Notes in Computer Science | 2014-10-14 | Paper |
Shorter identity-based encryption via asymmetric pairings Designs, Codes and Cryptography | 2014-09-04 | Paper |
Attribute-based encryption for circuits Proceedings of the forty-eighth annual ACM symposium on Theory of Computing | 2014-08-07 | Paper |
Doubly spatial encryption from DBDH Theoretical Computer Science | 2014-07-07 | Paper |
Partial garbling schemes and their applications Automata, Languages, and Programming | 2014-07-01 | Paper |
On the complexity of UC commitments Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Dual System Encryption via Predicate Encodings Theory of Cryptography | 2014-02-18 | Paper |
Fully, (Almost) Tightly Secure IBE and Dual System Groups Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Functional encryption: new perspectives and lower bounds Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
On the security of the TLS protocol: a systematic analysis Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Leakage-resilient cryptography from minimal assumptions Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Multi-party computation of polynomials and branching programs without simultaneous interaction Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Efficient, adaptively secure, and composable oblivious transfer with a single, global CRS Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Shorter IBE and signatures via asymmetric pairings Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
Lossy trapdoor functions from homomorphic reproducible encryption Information Processing Letters | 2012-10-23 | Paper |
Functional encryption with bounded collusions via multi-party computation Lecture Notes in Computer Science | 2012-09-25 | Paper |
Public Key Encryption against Related Key Attacks Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Efficient password authenticated key exchange via oblivious transfer Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Functional encryption for threshold functions (or fuzzy IBE) from lattices Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Dual projective hashing and its applications -- lossy trapdoor functions and more Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Threshold and revocation cryptosystems via extractable hash proofs Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Optimal cryptographic hardness of learning monotone functions Theory of Computing | 2011-05-24 | Paper |
On the round complexity of zero-knowledge proofs based on one-way permutations Lecture Notes in Computer Science | 2010-08-31 | Paper |
Efficient chosen-ciphertext security via extractable hash proofs Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
On obfuscating point functions Proceedings of the thirty-seventh annual ACM symposium on Theory of computing | 2010-08-16 | Paper |
Constant-round non-malleable commitments from sub-exponential one-way functions Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Encryption schemes secure against chosen-ciphertext selective opening attacks Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Universal one-way hash functions via inaccessible entropy Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Improved non-committing encryption with applications to adaptively secure protocols Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Zero knowledge in the random oracle model, revisited Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Amplifying Collision Resistance: A Complexity-Theoretic Treatment Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
Simple, Black-Box Constructions of Adaptively Secure Protocols Theory of Cryptography | 2009-03-03 | Paper |
Black-Box Constructions of Two-Party Protocols from One-Way Functions Theory of Cryptography | 2009-03-03 | Paper |
Optimal Cryptographic Hardness of Learning Monotone Functions Automata, Languages and Programming | 2008-08-28 | Paper |
Pebbling and Proofs of Work Advances in Cryptology – CRYPTO 2005 | 2008-03-17 | Paper |
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One Theory of Cryptography | 2008-03-05 | Paper |
One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments Theory of Cryptography | 2007-08-30 | Paper |
Lower Bounds for Non-interactive Zero-Knowledge Theory of Cryptography | 2007-08-30 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2007-02-12 | Paper |
Automata, Languages and Programming Lecture Notes in Computer Science | 2006-01-10 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2005-12-07 | Paper |
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques Lecture Notes in Computer Science | 2005-08-25 | Paper |