| Publication | Date of Publication | Type |
|---|
| PKE and ABE with collusion-resistant secure key leasing | 2026-02-04 | Paper |
| Non-committing identity based encryption: constructions and applications | 2025-07-29 | Paper |
| Robust combiners and universal constructions for quantum cryptography | 2025-07-25 | Paper |
| Quantum public-key encryption with tamper-resilient public keys from one-way functions | 2024-12-13 | Paper |
| Certified everlasting secure collusion-resistant functional encryption, and more | 2024-11-13 | Paper |
| One-out-of-many unclonable cryptography: definitions, constructions, and more | 2024-08-15 | Paper |
| Publicly verifiable deletion from minimal assumptions | 2024-08-15 | Paper |
Compact NIZKs from standard assumptions on bilinear maps Journal of Cryptology | 2024-07-10 | Paper |
Watermarking PRFs and PKE against quantum adversaries Journal of Cryptology | 2024-05-13 | Paper |
| Obfuscation of pseudo-deterministic quantum circuits | 2024-05-08 | Paper |
Public key encryption with secure key leasing Advances in Cryptology – EUROCRYPT 2023 | 2024-01-16 | Paper |
Compact structure-preserving signatures with almost tight security Journal of Cryptology | 2023-08-22 | Paper |
Functional encryption with secure key leasing Advances in Cryptology – ASIACRYPT 2022 | 2023-08-21 | Paper |
Bounded functional encryption for Turing machines: adaptive security from general assumptions Theory of Cryptography | 2023-08-14 | Paper |
KDM security for the Fujisaki-Okamoto transformations in the QROM Public-Key Cryptography – PKC 2022 | 2023-08-10 | Paper |
The direction of updatable encryption does matter Public-Key Cryptography – PKC 2022 | 2023-08-10 | Paper |
Certified everlasting zero-knowledge proof for QMA Advances in Cryptology – CRYPTO 2022 | 2023-06-12 | Paper |
Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication Lecture Notes in Computer Science | 2023-05-12 | Paper |
Secure software leasing from standard assumptions (available as arXiv preprint) | 2023-03-31 | Paper |
| Adaptively secure inner product encryption from LWE | 2023-03-29 | Paper |
| Adaptively secure constrained pseudorandom functions in the standard model | 2022-11-09 | Paper |
Fast, compact, and expressive attribute-based encryption Lecture Notes in Computer Science | 2022-10-13 | Paper |
Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 Designs, Codes and Cryptography | 2022-09-22 | Paper |
Watermarking PRFs against quantum adversaries (available as arXiv preprint) | 2022-08-30 | Paper |
Obfustopia built on secret-key functional encryption Journal of Cryptology | 2022-06-08 | Paper |
| Universal proxy re-encryption | 2021-12-21 | Paper |
| Round-optimal blind signatures in the plain model from classical and quantum standard assumptions | 2021-12-08 | Paper |
| Compact NIZKs from standard assumptions on bilinear maps | 2021-12-01 | Paper |
| Equipping public-key cryptographic primitives with watermarking (or: a hole is to watermark) | 2021-12-01 | Paper |
Compact designated verifier NIZKs from the CDH assumption without pairings Journal of Cryptology | 2021-11-24 | Paper |
Fast, compact, and expressive attribute-based encryption Designs, Codes and Cryptography | 2021-10-19 | Paper |
Simple and generic constructions of succinct functional encryption Journal of Cryptology | 2021-07-30 | Paper |
From cryptomania to obfustopia through secret-key functional encryption Journal of Cryptology | 2020-04-28 | Paper |
| Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously | 2020-03-09 | Paper |
| Exploring constructions of compact NIZKs from various assumptions | 2020-03-09 | Paper |
| Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions | 2020-02-06 | Paper |
| Adaptively single-key secure constrained PRFs for \(\text{NC}^1\) | 2020-01-28 | Paper |
| Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio | 2020-01-28 | Paper |
Watermarking cryptographic capabilities SIAM Journal on Computing | 2018-12-05 | Paper |
| Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups | 2018-09-26 | Paper |
Obfustopia built on secret-key functional encryption Advances in Cryptology – EUROCRYPT 2018 | 2018-07-09 | Paper |
Simple and generic constructions of succinct functional encryption Public-Key Cryptography – PKC 2018 | 2018-05-29 | Paper |
| Compact structure-preserving signatures with almost tight security | 2017-11-15 | Paper |
| Watermarking cryptographic programs | 2017-10-23 | Paper |
Watermarking cryptographic capabilities Proceedings of the forty-eighth annual ACM symposium on Theory of Computing | 2017-09-29 | Paper |
From cryptomania to obfustopia through secret-key functional encryption Theory of Cryptography | 2016-12-22 | Paper |
Constant-size structure-preserving signatures: generic constructions and simple assumptions Journal of Cryptology | 2016-10-13 | Paper |
Anonymous traitor tracing: how to embed arbitrary information in a key Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES Designs, Codes and Cryptography | 2015-09-30 | Paper |
Generalizing efficient multiparty computation Lecture Notes in Computer Science | 2015-09-24 | Paper |
Universally composable identity-based encryption Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
How to watermark cryptographic functions Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Tagged one-time signatures: tight security and optimal tag size Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Constant-size structure-preserving signatures: generic constructions and simple assumptions Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
A multi-trapdoor commitment scheme from the RSA assumption Information Security and Privacy | 2010-10-25 | Paper |
CCA proxy re-encryption without bilinear maps in the standard model Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
Efficient non-interactive universally composable string-commitment schemes Provable Security | 2009-12-11 | Paper |
On the insecurity of the Fiat-Shamir signatures with iterative hash functions Provable Security | 2009-12-11 | Paper |
Security on Hybrid Encryption with the Tag-KEM/DEM Framework Information Security and Privacy | 2009-06-25 | Paper |