| Publication | Date of Publication | Type |
|---|
| Public-key anamorphism in (CCA-secure) public-key encryption and beyond | 2024-12-04 | Paper |
| Fully dynamic attribute-based signatures for circuits from codes | 2024-11-12 | Paper |
| Verifiable decentralized multi-client functional encryption for inner product | 2024-09-13 | Paper |
| Anamorphic signatures: secrecy from a dictator who only permits authentication! | 2024-02-02 | Paper |
| \textsf{Catalic}: delegated PSI cardinality with applications to contact tracing | 2023-03-29 | Paper |
| Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms | 2022-11-02 | Paper |
| Zero-knowledge proofs for committed symmetric Boolean functions | 2022-03-22 | Paper |
| Linearly-homomorphic signatures and scalable mix-nets | 2021-12-01 | Paper |
| A concise bounded anonymous broadcast yielding combinatorial trace-and-revoke schemes | 2021-02-23 | Paper |
| Traceable inner product functional encryption | 2020-08-05 | Paper |
| Downgradable identity-based encryption and applications | 2020-01-28 | Paper |
| Decentralized multi-client functional encryption for inner product | 2019-01-23 | Paper |
| A new technique for compacting secret key in attribute-based broadcast encryption | 2018-10-26 | Paper |
| A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption | 2018-04-04 | Paper |
| Hardness of \(k\)-LWE and applications in traitor tracing | 2018-01-05 | Paper |
| Identity-based encryption from codes with rank metric | 2017-10-27 | Paper |
| Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate | 2014-08-21 | Paper |
| Hardness of k-LWE and Applications in Traitor Tracing | 2014-08-07 | Paper |
| Black-box Trace\&Revoke codes | 2013-11-11 | Paper |
| Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model | 2013-06-07 | Paper |
| Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model | 2013-06-07 | Paper |
| Decentralized Dynamic Broadcast Encryption | 2012-09-25 | Paper |
| Message-Based Traitor Tracing with Optimal Ciphertext Rate | 2012-09-21 | Paper |
| Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts | 2012-09-07 | Paper |
| Identity-Based Trace and Revoke Schemes | 2011-09-16 | Paper |
| Security Notions for Broadcast Encryption | 2011-06-28 | Paper |
| Advances in Cryptology - ASIACRYPT 2003 | 2010-01-05 | Paper |
| Traitors Collaborating in Public: Pirates 2.0 | 2009-05-12 | Paper |
| A CCA Secure Hybrid Damgård’s ElGamal Encryption | 2009-01-27 | Paper |
| Efficient Traitor Tracing from Collusion Secure Codes | 2009-01-09 | Paper |
| Hybrid Damgård Is CCA1-Secure under the DDH Assumption | 2009-01-09 | Paper |
| Traitor Tracing with Optimal Transmission Rate | 2008-06-24 | Paper |
| Public Traceability in Traitor Tracing Schemes | 2008-05-06 | Paper |
| Optimal Asymmetric Encryption and Signature Paddings | 2007-09-24 | Paper |
| Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability | 2007-09-11 | Paper |
| Identity-Based Traitor Tracing | 2007-09-04 | Paper |
| Security in Communication Networks | 2006-10-10 | Paper |
| Selected Areas in Cryptography | 2006-10-10 | Paper |
| OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding | 2005-08-12 | Paper |