| Publication | Date of Publication | Type |
|---|
| Reinsurance contracts under Stackelberg game and market equilibrium | 2025-01-08 | Paper |
| Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts | 2024-04-11 | Paper |
| A tightly secure ID-based signature scheme under DL assumption in AGM | 2024-01-11 | Paper |
| Efficient Traceable Oblivious Transfer and Its Applications | 2023-06-30 | Paper |
| DSH: Deniable Secret Handshake Framework | 2023-06-30 | Paper |
| Multimodal private signatures | 2023-06-28 | Paper |
| Public key encryption with fuzzy matching | 2023-04-13 | Paper |
| Broadcast Authenticated Encryption with Keyword Search | 2023-04-13 | Paper |
| Concise Mercurial Subvector Commitments: Definitions and Constructions | 2023-04-13 | Paper |
| A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key | 2022-12-22 | Paper |
| Group-Based Source-Destination Verifiable Encryption with Blacklist Checking | 2022-12-09 | Paper |
| Attribute based broadcast encryption with short ciphertext and decryption key | 2022-08-19 | Paper |
| Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved | 2022-05-18 | Paper |
| Privacy-enhanced remote data integrity checking with updatable timestamp | 2021-04-19 | Paper |
| Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation | 2020-10-07 | Paper |
| Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters | 2020-09-22 | Paper |
| Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes | 2020-07-20 | Paper |
| The Wiener attack on RSA revisited: a quest for the exact bound | 2020-05-27 | Paper |
| Location based encryption | 2020-05-27 | Paper |
| Towards enhanced security for certificateless public-key authenticated encryption with keyword search | 2020-01-10 | Paper |
| Strongly leakage resilient authenticated key exchange, revisited | 2019-11-07 | Paper |
| Outsourced ciphertext-policy attribute-based encryption with equality test | 2019-10-31 | Paper |
| Cooperative secret sharing using QR codes and symmetric keys | 2019-10-30 | Paper |
| A privacy preserving source verifiable encryption scheme | 2018-12-07 | Paper |
| A new public remote integrity checking scheme with user and data privacy | 2018-11-26 | Paper |
| Efficient attribute-based encryption with blackbox traceability | 2018-11-07 | Paper |
| Deniable ring authentication based on projective hash functions | 2018-11-07 | Paper |
| One-Round Attribute-Based Key Exchange in the Multi-Party Setting | 2018-02-23 | Paper |
| Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample | 2017-11-15 | Paper |
| Strong authenticated key exchange with auxiliary inputs | 2017-09-15 | Paper |
| A note on the strong authenticated key exchange with auxiliary inputs | 2017-09-15 | Paper |
| Mergeable and revocable identity-based encryption | 2017-08-25 | Paper |
| Privacy-preserving \(k\)-time authenticated secret handshakes | 2017-08-25 | Paper |
| Hierarchical functional encryption for linear transformations | 2017-08-25 | Paper |
| A new generic construction of anonymous designated confirmer signature for privacy-preserving fair exchange | 2017-07-28 | Paper |
| Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting | 2017-07-27 | Paper |
| Achieving IND-CCA Security for Functional Encryption for Inner Products | 2017-05-05 | Paper |
| Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions | 2017-02-01 | Paper |
| Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction | 2017-01-06 | Paper |
| One-Round Attribute-Based Key Exchange in the Multi-party Setting | 2017-01-06 | Paper |
| Edit Distance Based Encryption and Its Application | 2016-09-02 | Paper |
| One-Round Strong Oblivious Signature-Based Envelope | 2016-09-02 | Paper |
| Proxy Signature with Revocation | 2016-09-02 | Paper |
| Linear Encryption with Keyword Search | 2016-09-02 | Paper |
| Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing | 2016-08-31 | Paper |
| Threshold Broadcast Encryption with Keyword Search | 2016-07-25 | Paper |
| Strongly Leakage-Resilient Authenticated Key Exchange | 2016-04-08 | Paper |
| An Efficient Privacy-Preserving E-coupon System | 2015-11-25 | Paper |
| A New General Framework for Secure Public Key Encryption with Keyword Search | 2015-10-20 | Paper |
| A New Public Remote Integrity Checking Scheme with User Privacy | 2015-10-20 | Paper |
| Efficient Hidden Vector Encryption with Constant-Size Ciphertext | 2015-07-24 | Paper |
| Ambiguous optimistic fair exchange: definition and constructions | 2014-12-02 | Paper |
| Identity based identification from algebraic coding theory | 2014-01-13 | Paper |
| k-time Proxy Signature: Formal Definition and Efficient Construction | 2013-10-23 | Paper |
| Certificateless cryptography with KGC trust level 3 | 2011-10-10 | Paper |
| Certificateless public key encryption: a new generic construction and two pairing-free schemes | 2011-02-21 | Paper |
| Dynamic Group Key Exchange Revisited | 2010-12-07 | Paper |
| Probabilistic Public Key Encryption with Equality Test | 2010-03-16 | Paper |
| Efficient Non-interactive Range Proof | 2009-07-23 | Paper |
| A More Natural Way to Construct Identity-Based Identification Schemes | 2009-03-10 | Paper |
| Ambiguous Optimistic Fair Exchange | 2009-02-10 | Paper |
| Two-factor mutual authentication based on smart cards and passwords | 2008-11-19 | Paper |
| A new framework for the design and analysis of identity-based identification schemes | 2008-11-18 | Paper |
| Traceable and Retrievable Identity-Based Encryption | 2008-06-13 | Paper |
| Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles | 2008-04-24 | Paper |
| Efficient Anonymous Roaming and Its Security Analysis | 2007-09-24 | Paper |
| An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices | 2007-06-13 | Paper |
| Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
| Information Security | 2006-10-20 | Paper |
| Information Security and Privacy | 2006-06-22 | Paper |