| Publication | Date of Publication | Type |
|---|
| A modular approach to registered ABE for unbounded predicates | 2024-12-13 | Paper |
| Signature for objects: formalizing how to authenticate physical data and more | 2024-07-17 | Paper |
| Public‐Key Encryption and Security Notions | 2023-08-04 | Paper |
| Maliciously circuit-private multi-key FHE and MPC based on LWE | 2023-04-28 | Paper |
| Unbounded dynamic predicate compositions in ABE from standard assumptions | 2023-03-29 | Paper |
| Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA | 2022-11-09 | Paper |
| Generic constructions for fully secure revocable attribute-based encryption | 2022-08-25 | Paper |
| Constant-round client-aided secure comparison protocol | 2022-08-25 | Paper |
| Constructive \(t\)-secure homomorphic secret sharing for low degree polynomials | 2022-07-06 | Paper |
| Evolving homomorphic secret sharing for hierarchical access structures | 2022-04-22 | Paper |
| Client-aided two-party secure interval test protocol | 2020-07-20 | Paper |
| Field extension in secret-shared form and its applications to efficient secure computation | 2020-05-27 | Paper |
| Unbounded dynamic predicate compositions in attribute-based encryption | 2020-02-04 | Paper |
| Adaptively single-key secure constrained PRFs for \(\text{NC}^1\) | 2020-01-28 | Paper |
| Attribute-based signatures for unbounded languages from standard assumptions | 2019-01-23 | Paper |
| Token-based multi-input functional encryption | 2018-11-07 | Paper |
| Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups | 2018-09-26 | Paper |
| Dual system framework in multilinear settings and applications to fully secure (compact) ABE for unbounded-size circuits | 2017-06-13 | Paper |
| Dual system encryption framework in prime-order groups via computational pair encodings | 2017-01-06 | Paper |
| New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security | 2016-12-19 | Paper |
| Attribute-based encryption for range attributes | 2016-10-21 | Paper |
| Attribute Based Encryption with Direct Efficiency Tradeoff | 2016-10-04 | Paper |
| A Framework for Identity-Based Encryption with Almost Tight Security | 2016-06-10 | Paper |
| Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs | 2016-06-10 | Paper |
| Attribute-based signatures for circuits from bilinear map | 2016-04-13 | Paper |
| Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings | 2016-03-02 | Paper |
| A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list | 2014-07-07 | Paper |
| Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more | 2014-05-27 | Paper |
| A framework and compact constructions for non-monotonic attribute-based encryption | 2014-03-25 | Paper |
| Time-specific encryption from forward-secure encryption | 2012-09-25 | Paper |
| Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication | 2012-07-20 | Paper |
| Attribute-based encryption schemes with constant-size ciphertexts | 2012-05-14 | Paper |
| Functional encryption for public-attribute inner products: achieving constant-size ciphertexts with adaptive security or support for negation | 2011-11-15 | Paper |
| Homomorphic network coding signatures in the standard model | 2011-03-15 | Paper |
| Generic constructions for chosen-ciphertext secure attribute based encryption | 2011-03-15 | Paper |
| Expressive key-policy attribute-based encryption with constant-size ciphertexts | 2011-03-15 | Paper |
| Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation | 2010-05-28 | Paper |
| Attribute-based encryption supporting direct/indirect revocation modes | 2010-01-07 | Paper |
| Advances in Cryptology - ASIACRYPT 2003 | 2010-01-05 | Paper |
| Conjunctive Broadcast and Attribute-Based Encryption | 2009-08-18 | Paper |
| A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low | 2009-01-22 | Paper |
| Efficient Identity-Based Encryption with Tight Security Reduction | 2009-01-09 | Paper |
| Relations Among Notions of Security for Identity Based Encryption Schemes | 2008-09-18 | Paper |
| A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function | 2008-06-10 | Paper |
| Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys | 2008-04-24 | Paper |
| Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations | 2008-03-18 | Paper |
| Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys | 2007-11-28 | Paper |