| Publication | Date of Publication | Type |
|---|
A modular approach to registered ABE for unbounded predicates | 2024-12-13 | Paper |
Signature for objects: formalizing how to authenticate physical data and more | 2024-07-17 | Paper |
Public‐Key Encryption and Security Notions Asymmetric Cryptography | 2023-08-04 | Paper |
Maliciously circuit-private multi-key FHE and MPC based on LWE Designs, Codes and Cryptography | 2023-04-28 | Paper |
Unbounded dynamic predicate compositions in ABE from standard assumptions | 2023-03-29 | Paper |
Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA | 2022-11-09 | Paper |
Generic constructions for fully secure revocable attribute-based encryption | 2022-08-25 | Paper |
Constant-round client-aided secure comparison protocol | 2022-08-25 | Paper |
Constructive \(t\)-secure homomorphic secret sharing for low degree polynomials | 2022-07-06 | Paper |
Evolving homomorphic secret sharing for hierarchical access structures | 2022-04-22 | Paper |
Client-aided two-party secure interval test protocol Cryptology and Network Security | 2020-07-20 | Paper |
Field extension in secret-shared form and its applications to efficient secure computation | 2020-05-27 | Paper |
Unbounded dynamic predicate compositions in attribute-based encryption | 2020-02-04 | Paper |
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\) | 2020-01-28 | Paper |
Attribute-based signatures for unbounded languages from standard assumptions | 2019-01-23 | Paper |
Token-based multi-input functional encryption | 2018-11-07 | Paper |
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups | 2018-09-26 | Paper |
Dual system framework in multilinear settings and applications to fully secure (compact) ABE for unbounded-size circuits Lecture Notes in Computer Science | 2017-06-13 | Paper |
Dual system encryption framework in prime-order groups via computational pair encodings Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security Information and Communications Security | 2016-12-19 | Paper |
Attribute-based encryption for range attributes Lecture Notes in Computer Science | 2016-10-21 | Paper |
Attribute Based Encryption with Direct Efficiency Tradeoff Applied Cryptography and Network Security | 2016-10-04 | Paper |
A Framework for Identity-Based Encryption with Almost Tight Security Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Attribute-based signatures for circuits from bilinear map Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings Lecture Notes in Computer Science | 2016-03-02 | Paper |
A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list Applied Cryptography and Network Security | 2014-07-07 | Paper |
Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
A framework and compact constructions for non-monotonic attribute-based encryption Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Time-specific encryption from forward-secure encryption Lecture Notes in Computer Science | 2012-09-25 | Paper |
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Attribute-based encryption schemes with constant-size ciphertexts Theoretical Computer Science | 2012-05-14 | Paper |
Functional encryption for public-attribute inner products: achieving constant-size ciphertexts with adaptive security or support for negation Journal of Mathematical Cryptology | 2011-11-15 | Paper |
Homomorphic network coding signatures in the standard model Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Generic constructions for chosen-ciphertext secure attribute based encryption Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Expressive key-policy attribute-based encryption with constant-size ciphertexts Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
Attribute-based encryption supporting direct/indirect revocation modes Cryptography and Coding | 2010-01-07 | Paper |
Advances in Cryptology - ASIACRYPT 2003 Lecture Notes in Computer Science | 2010-01-05 | Paper |
Conjunctive Broadcast and Attribute-Based Encryption Pairing-Based Cryptography – Pairing 2009 | 2009-08-18 | Paper |
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
Efficient Identity-Based Encryption with Tight Security Reduction Cryptology and Network Security | 2009-01-09 | Paper |
Relations Among Notions of Security for Identity Based Encryption Schemes LATIN 2006: Theoretical Informatics | 2008-09-18 | Paper |
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function Provable Security | 2008-06-10 | Paper |
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations Lecture Notes in Computer Science | 2008-03-18 | Paper |
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys Automata, Languages and Programming | 2007-11-28 | Paper |