| Publication | Date of Publication | Type |
|---|
| Folding schemes with selective verification | 2024-10-16 | Paper |
Linear-map vector commitments and their practical applications Advances in Cryptology – ASIACRYPT 2022 | 2023-08-21 | Paper |
| Simulation Extractable Versions of Groth’s zk-SNARK Revisited | 2023-03-22 | Paper |
Signatures of Knowledge for Boolean Circuits Under Standard Assumptions Progress in Cryptology - AFRICACRYPT 2020 | 2022-11-09 | Paper |
QA-NIZK arguments of same opening for bilateral commitments Progress in Cryptology - AFRICACRYPT 2020 | 2022-11-09 | Paper |
Updateable Inner Product Argument with Logarithmic Verifier and Applications Lecture Notes in Computer Science | 2022-10-13 | Paper |
Signatures of knowledge for Boolean circuits under standard assumptions Theoretical Computer Science | 2022-05-31 | Paper |
| An algebraic framework for universal and updatable SNARKs | 2022-03-31 | Paper |
| Structure-preserving and re-randomizable RCCA-secure public key encryption and its applications | 2020-05-11 | Paper |
| Shorter pairing-based arguments under standard assumptions | 2020-05-11 | Paper |
| Shorter quadratic QA-NIZK proofs | 2020-01-28 | Paper |
Short tightly secure signatures for signing a vector of group elements: a new approach Theoretical Computer Science | 2019-10-18 | Paper |
An algebraic framework for Diffie-Hellman assumptions Journal of Cryptology | 2017-03-02 | Paper |
The kernel matrix Diffie-Hellman assumption Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
New Techniques for Non-interactive Shuffle and Range Arguments Applied Cryptography and Network Security | 2016-10-04 | Paper |
QA-NIZK arguments in asymmetric groups: new tools and new constructions Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Stretching Groth-Sahai: NIZK proofs of partial satisfiability Theory of Cryptography | 2015-07-06 | Paper |
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Identity-based lossy trapdoor functions: new definitions, hierarchical extensions, and implications Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
On dynamic distribution of private keys over MANETs Electronic Notes in Theoretical Computer Science | 2013-12-06 | Paper |
Ad-hoc threshold broadcast encryption with shorter ciphertexts Electronic Notes in Theoretical Computer Science | 2013-12-06 | Paper |
An algebraic framework for Diffie-Hellman assumptions Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Relations between semantic security and anonymity in identity-based encryption Information Processing Letters | 2013-03-28 | Paper |
Short attribute-based signatures for threshold predicates Lecture Notes in Computer Science | 2012-06-08 | Paper |
Attribute-based encryption schemes with constant-size ciphertexts Theoretical Computer Science | 2012-05-14 | Paper |
Extensions of access structures and their cryptographic applications Applicable Algebra in Engineering, Communication and Computing | 2010-08-23 | Paper |
Constant size ciphertexts in threshold attribute-based encryption Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
| scientific article; zbMATH DE number 5556018 (Why is no real title available?) | 2009-05-22 | Paper |
The Security of All Bits Using List Decoding Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts Provable Security | 2008-06-10 | Paper |
Cryptographic techniques for mobile ad-hoc networks Computer Networks | 2007-11-30 | Paper |