| Publication | Date of Publication | Type |
|---|
| Lightweight delegatable proofs of storage | 2022-08-19 | Paper |
| Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing | 2020-02-06 | Paper |
| Identity-based aggregate signcryption in the standard model from multilinear maps | 2019-01-22 | Paper |
| How to protect privacy in optimistic fair exchange of digital signatures | 2018-05-18 | Paper |
| Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe | 2016-03-10 | Paper |
| Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors | 2015-12-02 | Paper |
| Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts | 2015-11-25 | Paper |
| Ambiguous One-Move Nominative Signature Without Random Oracles | 2015-10-16 | Paper |
| Practical (fully) distributed signatures provably secure in the standard model | 2015-07-24 | Paper |
| Efficient algorithms for secure outsourcing of bilinear pairings | 2014-12-02 | Paper |
| Ambiguous optimistic fair exchange: definition and constructions | 2014-12-02 | Paper |
| Concurrent signature without random oracles | 2014-12-02 | Paper |
| Extending concurrent signature to multiple parties | 2014-08-27 | Paper |
| The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles | 2014-08-01 | Paper |
| Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts | 2014-06-06 | Paper |
| P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures | 2014-03-28 | Paper |
| Practical Distributed Signatures in the Standard Model | 2014-03-28 | Paper |
| Identity based identification from algebraic coding theory | 2014-01-13 | Paper |
| Fairness in Concurrent Signatures Revisited | 2013-06-28 | Paper |
| A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles | 2013-06-04 | Paper |
| Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones | 2013-05-28 | Paper |
| Short and efficient convertible undeniable signature schemes without random oracles | 2013-04-17 | Paper |
| One-Move Convertible Nominative Signature in the Standard Model | 2012-11-06 | Paper |
| Generic security-amplifying methods of ordinary digital signatures | 2012-10-17 | Paper |
| Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes | 2012-09-07 | Paper |
| The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles | 2012-07-20 | Paper |
| Group-oriented fair exchange of signatures | 2012-07-13 | Paper |
| Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles | 2011-11-22 | Paper |
| Concurrent signatures with fully negotiable binding control | 2011-09-16 | Paper |
| Short Convertible Undeniable Signature in the Standard Model | 2011-05-19 | Paper |
| Oblivious transfer with access control: realizing disjunction without duplication | 2010-11-26 | Paper |
| A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange | 2010-11-26 | Paper |
| A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) | 2010-10-12 | Paper |
| Efficient Group Signature with Forward Secure Revocation | 2010-04-23 | Paper |
| Probabilistic public key encryption with equality test | 2010-03-16 | Paper |
| Signcryption from randomness recoverable public key encryption | 2010-03-11 | Paper |
| Certificateless threshold ring signature | 2009-10-01 | Paper |
| Efficient Non-interactive Range Proof | 2009-07-23 | Paper |
| On the security of a visual cryptography scheme for color images | 2009-04-03 | Paper |
| Generic Transformation to Strongly Unforgeable Signatures | 2009-03-10 | Paper |
| A More Natural Way to Construct Identity-Based Identification Schemes | 2009-03-10 | Paper |
| On the Relation among Various Security Models for Certificateless Cryptography | 2009-03-09 | Paper |
| Certificateless Signature Revisited | 2009-03-06 | Paper |
| Generic Certificateless Key Encapsulation Mechanism | 2009-03-06 | Paper |
| On the relation among various security models for certificateless cryptography | 2009-02-24 | Paper |
| On Secret Reconstruction in Secret Sharing Schemes | 2009-02-24 | Paper |
| An efficient one-move nominative signature scheme | 2009-02-24 | Paper |
| Ambiguous Optimistic Fair Exchange | 2009-02-10 | Paper |
| Two-factor mutual authentication based on smart cards and passwords | 2008-11-19 | Paper |
| A new framework for the design and analysis of identity-based identification schemes | 2008-11-18 | Paper |
| Traceable and Retrievable Identity-Based Encryption | 2008-06-13 | Paper |
| Generic Security-Amplifying Methods of Ordinary Digital Signatures | 2008-06-13 | Paper |
| Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles | 2008-04-24 | Paper |
| An Efficient Password-Only Two-Server Authenticated Key Exchange System | 2008-03-25 | Paper |
| Formal Definition and Construction of Nominative Signature | 2008-03-25 | Paper |
| On the Security Models of (Threshold) Ring Signature Schemes | 2008-03-17 | Paper |
| Progress in Cryptology - INDOCRYPT 2003 | 2007-11-29 | Paper |
| Efficient Anonymous Roaming and Its Security Analysis | 2007-09-24 | Paper |
| Certificateless signature: a new security model and an improved generic construction | 2007-09-20 | Paper |
| Key Replacement Attack Against a Generic Construction of Certificateless Signature | 2007-09-07 | Paper |
| On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures | 2007-09-04 | Paper |
| An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices | 2007-06-13 | Paper |
| Applied Cryptography and Network Security | 2007-05-02 | Paper |
| Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
| Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
| Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
| ENHANCED SECURITY MODELS AND A GENERIC CONSTRUCTION APPROACH FOR LINKABLE RING SIGNATURE | 2007-02-08 | Paper |
| Generalised cumulative arrays in secret sharing | 2006-11-22 | Paper |
| Information Security | 2006-10-20 | Paper |
| RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES | 2006-10-16 | Paper |
| Information Security and Privacy | 2006-06-22 | Paper |
| Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
| Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
| Information Security Practice and Experience | 2005-09-13 | Paper |
| Information Security and Privacy | 2005-09-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4474180 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4408431 | 2003-06-29 | Paper |