| Publication | Date of Publication | Type |
|---|
| COMPASS: a compact PASS-lineage accumulator with succinct proofs | 2026-03-23 | Paper |
Public-key encryption with filtered equality test against adaptive chosen-ciphertext attacks Theoretical Computer Science | 2026-02-27 | Paper |
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives Designs, Codes and Cryptography | 2024-05-27 | Paper |
Public key encryption with hierarchical authorized keyword search Lecture Notes in Computer Science | 2023-08-21 | Paper |
Cryptanalysis of a round optimal lattice-based multisignature scheme Information Processing Letters | 2023-06-05 | Paper |
| Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices | 2023-01-18 | Paper |
Quantum \((t, n)\) threshold group signature based on Bell state Quantum Information Processing | 2023-01-05 | Paper |
Public key encryption with filtered equality test revisited Designs, Codes and Cryptography | 2021-10-04 | Paper |
Efficient quantum multi-proxy signature Quantum Information Processing | 2019-03-15 | Paper |
Threshold quantum state sharing based on entanglement swapping Quantum Information Processing | 2018-11-05 | Paper |
Establishing rational networking using the DL04 quantum secure direct communication protocol Quantum Information Processing | 2018-11-05 | Paper |
Multi-dimensional quantum state sharing based on quantum Fourier transform Quantum Information Processing | 2018-04-26 | Paper |
Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption Journal of Computer and System Sciences | 2017-09-07 | Paper |
Certificateless message recovery signatures providing Girault's level-3 security Journal of Shanghai Jiaotong University (Science) | 2014-09-02 | Paper |
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message Information Security and Cryptology | 2009-02-10 | Paper |
Efficient and Short Certificateless Signature Cryptology and Network Security | 2009-01-09 | Paper |
Efficient ID-Based Digital Signatures with Message Recovery Cryptology and Network Security | 2008-04-15 | Paper |
Verifier-Key-Flexible Universal Designated-Verifier Signatures Cryptography and Coding | 2008-03-07 | Paper |
| scientific article; zbMATH DE number 5180844 (Why is no real title available?) | 2007-08-20 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
| One-way and two-party authenticated ID-based key agreement protocols using pairing | 2006-06-22 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |