| Publication | Date of Publication | Type |
|---|
Efficient succinct zero-knowledge arguments in the CL framework Journal of Cryptology | 2025-01-17 | Paper |
An improved threshold homomorphic cryptosystem based on class groups | 2025-01-10 | Paper |
Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\) Advances in Cryptology – ASIACRYPT 2022 | 2023-08-16 | Paper |
I want to ride my \texttt{BICYCL} : \texttt{BICYCL} implements cryptography in class groups Journal of Cryptology | 2023-07-05 | Paper |
Blind Functional Encryption 1511.68112 | 2022-12-21 | Paper |
Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security Theoretical Computer Science | 2022-11-17 | Paper |
A tighter proof for CCA secure inner product functional encryption: genericity meets efficiency Theoretical Computer Science | 2022-04-19 | Paper |
Bandwidth-efficient threshold EC-DSA | 2021-12-01 | Paper |
Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions Algorithmica | 2021-02-01 | Paper |
Two-party ECDSA from hash proof systems and efficient instantiations | 2020-03-09 | Paper |
Practical fully secure unrestricted inner product functional encryption modulo \(p\) | 2019-01-23 | Paper |
Verifiable message-locked encryption | 2018-10-26 | Paper |
Encryption switching protocols revisited: switching modulo \(p\) | 2017-11-03 | Paper |
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Implementing candidate graded encoding schemes from ideal lattices Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
Linearly homomorphic encryption from \(\mathsf {DDH}\) Lecture Notes in Computer Science | 2016-03-02 | Paper |
Proxy re-encryption scheme supporting a selection of delegatees Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
Lattice-based group signatures with logarithmic signature size Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Relations between semantic security and anonymity in identity-based encryption Information Processing Letters | 2013-03-28 | Paper |
Homomorphic encryption for multiplications and pairing evaluation Lecture Notes in Computer Science | 2012-09-25 | Paper |
Short attribute-based signatures for threshold predicates Lecture Notes in Computer Science | 2012-06-08 | Paper |
Plaintext-checkable encryption Lecture Notes in Computer Science | 2012-06-08 | Paper |
Attribute-based encryption schemes with constant-size ciphertexts Theoretical Computer Science | 2012-05-14 | Paper |
A variant of Miller's formula and algorithm Lecture Notes in Computer Science | 2010-11-26 | Paper |
Time-selective convertible undeniable signatures with short conversion receipts Information Sciences | 2010-07-20 | Paper |
Constant size ciphertexts in threshold attribute-based encryption Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
Multi-designated verifiers signatures: anonymity without encryption Information Processing Letters | 2010-01-29 | Paper |
Factoring \(pq ^{2}\) with quadratic forms: Nice cryptanalyses Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions Lecture Notes in Computer Science | 2008-11-27 | Paper |
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures Lecture Notes in Computer Science | 2008-06-24 | Paper |
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption Lecture Notes in Computer Science | 2008-06-17 | Paper |
Trapdoor Sanitizable Signatures and Their Application to Content Protection Applied Cryptography and Network Security | 2008-06-13 | Paper |
Universally Convertible Directed Signatures Lecture Notes in Computer Science | 2008-03-18 | Paper |
Short Undeniable Signatures Without Random Oracles: The Missing Link Progress in Cryptology - INDOCRYPT 2005 | 2008-03-17 | Paper |
Security in Communication Networks Lecture Notes in Computer Science | 2006-10-10 | Paper |
Topics in Cryptology – CT-RSA 2005 Lecture Notes in Computer Science | 2005-12-08 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
Universal forgery on Sekhar's signature scheme with message recovery International Journal of Computer Mathematics | 2005-02-28 | Paper |