| Publication | Date of Publication | Type |
|---|
| A modular approach to registered ABE for unbounded predicates | 2024-12-13 | Paper |
| Signature for objects: formalizing how to authenticate physical data and more | 2024-07-17 | Paper |
| Public‐Key Encryption and Security Notions | 2023-08-04 | Paper |
| Maliciously circuit-private multi-key FHE and MPC based on LWE | 2023-04-28 | Paper |
| Unbounded dynamic predicate compositions in ABE from standard assumptions | 2023-03-29 | Paper |
| Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA | 2022-11-09 | Paper |
| Generic constructions for fully secure revocable attribute-based encryption | 2022-08-25 | Paper |
| Constant-round client-aided secure comparison protocol | 2022-08-25 | Paper |
| Constructive \(t\)-secure homomorphic secret sharing for low degree polynomials | 2022-07-06 | Paper |
| Evolving homomorphic secret sharing for hierarchical access structures | 2022-04-22 | Paper |
| Client-Aided Two-Party Secure Interval Test Protocol | 2020-07-20 | Paper |
| Field extension in secret-shared form and its applications to efficient secure computation | 2020-05-27 | Paper |
| Unbounded dynamic predicate compositions in attribute-based encryption | 2020-02-04 | Paper |
| Adaptively single-key secure constrained PRFs for \(\text{NC}^1\) | 2020-01-28 | Paper |
| Attribute-based signatures for unbounded languages from standard assumptions | 2019-01-23 | Paper |
| Token-based multi-input functional encryption | 2018-11-07 | Paper |
| Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups | 2018-09-26 | Paper |
| Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits | 2017-06-13 | Paper |
| Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings | 2017-01-06 | Paper |
| New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security | 2016-12-19 | Paper |
| Attribute-Based Encryption for Range Attributes | 2016-10-21 | Paper |
| Attribute Based Encryption with Direct Efficiency Tradeoff | 2016-10-04 | Paper |
| A Framework for Identity-Based Encryption with Almost Tight Security | 2016-06-10 | Paper |
| Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs | 2016-06-10 | Paper |
| Attribute-Based Signatures for Circuits from Bilinear Map | 2016-04-13 | Paper |
| Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings | 2016-03-02 | Paper |
| A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List | 2014-07-07 | Paper |
| Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More | 2014-05-27 | Paper |
| A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption | 2014-03-25 | Paper |
| Time-Specific Encryption from Forward-Secure Encryption | 2012-09-25 | Paper |
| Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication | 2012-07-20 | Paper |
| Attribute-based encryption schemes with constant-size ciphertexts | 2012-05-14 | Paper |
| Functional encryption for public-attribute inner products: achieving constant-size ciphertexts with adaptive security or support for negation | 2011-11-15 | Paper |
| Homomorphic network coding signatures in the standard model | 2011-03-15 | Paper |
| Generic constructions for chosen-ciphertext secure attribute based encryption | 2011-03-15 | Paper |
| Expressive key-policy attribute-based encryption with constant-size ciphertexts | 2011-03-15 | Paper |
| Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation | 2010-05-28 | Paper |
| Attribute-based encryption supporting direct/indirect revocation modes | 2010-01-07 | Paper |
| Advances in Cryptology - ASIACRYPT 2003 | 2010-01-05 | Paper |
| Conjunctive Broadcast and Attribute-Based Encryption | 2009-08-18 | Paper |
| A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low | 2009-01-22 | Paper |
| Efficient Identity-Based Encryption with Tight Security Reduction | 2009-01-09 | Paper |
| Relations Among Notions of Security for Identity Based Encryption Schemes | 2008-09-18 | Paper |
| A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function | 2008-06-10 | Paper |
| Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys | 2008-04-24 | Paper |
| Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations | 2008-03-18 | Paper |
| Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys | 2007-11-28 | Paper |