| Publication | Date of Publication | Type |
|---|
| Multi-signer locally verifiable aggregate signature from (leveled) multilinear maps | 2026-03-11 | Paper |
On the ability to approximate \(k\)-DSP of HKZ, BKZ and slide reduction Designs, Codes and Cryptography | 2026-02-24 | Paper |
| Registered attribute-based signature | 2024-11-12 | Paper |
| Public-key encryption with keyword search in multi-user, multi-challenge setting under adaptive corruptions | 2024-11-12 | Paper |
| Improved fully adaptive decentralized MA-ABE for NC1 from MDDH | 2024-09-13 | Paper |
Tightly secure (H)IBE in the random oracle model Theoretical Computer Science | 2024-06-28 | Paper |
| Leakage-resilient attribute-based encryption with attribute-hiding | 2024-05-31 | Paper |
Efficient code-based fully dynamic group signature scheme Theoretical Computer Science | 2024-02-20 | Paper |
| Master-key KDM-secure ABE via predicate encoding | 2021-12-21 | Paper |
A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting Theoretical Computer Science | 2020-08-17 | Paper |
Public key encryption with equality test via hash proof system Theoretical Computer Science | 2019-10-18 | Paper |
Attribute-based data integrity checking for cloud storage Fundamenta Informaticae | 2019-03-01 | Paper |
Efficient public key encryption with equality test in the standard model Theoretical Computer Science | 2019-02-14 | Paper |
| Improved inner-product encryption with adaptive security and full attribute-hiding | 2019-01-23 | Paper |
| Unbounded ABE via bilinear entropy expansion, revisited | 2018-07-09 | Paper |
Leakage-resilient attribute based encryption in prime-order groups via predicate encodings Designs, Codes and Cryptography | 2018-05-24 | Paper |
| ABE with tag made easy. Concise framework and new instantiations in prime-order groups | 2018-03-08 | Paper |
Tightly Secure IBE Under Constant-Size Master Public Key Lecture Notes in Computer Science | 2017-06-13 | Paper |
Efficient IBE with tight reduction to standard assumption in the multi-challenge setting Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Non-zero inner product encryption with short ciphertexts and private keys Lecture Notes in Computer Science | 2016-10-21 | Paper |
Extended dual system group and shorter unbounded hierarchical identity based encryption Designs, Codes and Cryptography | 2016-07-21 | Paper |
Extended Nested Dual System Groups, Revisited Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Improved dual system ABE in prime-order groups via predicate encodings Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Semi-adaptive attribute-based encryption and improved delegation for Boolean formula Lecture Notes in Computer Science | 2014-10-14 | Paper |
Shorter identity-based encryption via asymmetric pairings Designs, Codes and Cryptography | 2014-09-04 | Paper |
Spatial encryption supporting non-monotone access structure Designs, Codes and Cryptography | 2014-09-04 | Paper |
Doubly spatial encryption from DBDH Theoretical Computer Science | 2014-07-07 | Paper |
The relation and transformation between hierarchical inner product encryption and spatial encryption Designs, Codes and Cryptography | 2014-04-29 | Paper |
Fully, (Almost) Tightly Secure IBE and Dual System Groups Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Shorter IBE and signatures via asymmetric pairings Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Combined public-key schemes: the case of ABE and ABS Provable Security | 2012-11-06 | Paper |
Revocable Identity-Based Encryption from Lattices Information Security and Privacy | 2012-09-07 | Paper |