| Publication | Date of Publication | Type |
|---|
| Signature for objects: formalizing how to authenticate physical data and more | 2024-07-17 | Paper |
Public‐Key Encryption and Security Notions Asymmetric Cryptography | 2023-08-04 | Paper |
NIZK from SNARGs Journal of Cryptology | 2023-07-05 | Paper |
Maliciously circuit-private multi-key FHE and MPC based on LWE Designs, Codes and Cryptography | 2023-04-28 | Paper |
| Circular security is complete for KDM security | 2023-03-21 | Paper |
CCA security and trapdoor functions via key-dependent-message security Journal of Cryptology | 2022-04-04 | Paper |
Generic transformation from broadcast encryption to round-optimal deniable ring authentication Designs, Codes and Cryptography | 2022-03-21 | Paper |
| Impossibility on tamper-resilient cryptography with uniqueness properties | 2021-12-21 | Paper |
| NIZK from SNARG | 2021-12-01 | Paper |
| Field extension in secret-shared form and its applications to efficient secure computation | 2020-05-27 | Paper |
| Simple and efficient KDM-CCA secure public key encryption | 2020-05-11 | Paper |
| CPA-to-CCA transformation for KDM security | 2020-04-30 | Paper |
CCA security and trapdoor functions via key-dependent-message security Advances in Cryptology – CRYPTO 2019 | 2020-03-09 | Paper |
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance Theoretical Computer Science | 2020-01-29 | Paper |
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance Public-Key Cryptography – PKC 2019 | 2020-01-28 | Paper |
| Adaptively single-key secure constrained PRFs for \(\text{NC}^1\) | 2020-01-28 | Paper |
| Improved security evaluation techniques for imperfect randomness from arbitrary distributions | 2020-01-28 | Paper |
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions Theoretical Computer Science | 2019-10-18 | Paper |
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions Lecture Notes in Computer Science | 2018-10-17 | Paper |
| Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups | 2018-09-26 | Paper |
| Efficient bit-decomposition and modulus-conversion protocols with an honest majority | 2018-09-26 | Paper |
| Memory lower bounds of reductions revisited | 2018-07-09 | Paper |
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems Designs, Codes and Cryptography | 2018-07-03 | Paper |
| Related randomness security for public key encryption, revisited | 2018-05-16 | Paper |
How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Signatures Resilient to Uninvertible Leakage Lecture Notes in Computer Science | 2016-10-21 | Paper |
Fuzzy signatures: relaxing requirements and a new construction Applied Cryptography and Network Security | 2016-10-04 | Paper |
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks Information Security and Cryptology - ICISC 2015 | 2016-05-19 | Paper |
On the key dependent message security of the Fujisaki-Okamoto constructions Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Trading plaintext-awareness for simulatability to achieve chosen ciphertext security Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
A signature scheme with a fuzzy private key Applied Cryptography and Network Security | 2016-03-10 | Paper |
Completeness of single-bit projection-KDM security for public key encryption Lecture Notes in Computer Science | 2016-03-02 | Paper |
Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption Lecture Notes in Computer Science | 2016-03-02 | Paper |
Anonymous Data Collection System with Mediators Cryptography and Information Security in the Balkans | 2015-09-21 | Paper |
Efficient key dependent message security amplification against chosen ciphertext attacks Information Security and Cryptology - ICISC 2014 | 2015-09-11 | Paper |
Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms Theory of Cryptography | 2015-07-06 | Paper |
More constructions of re-splittable threshold public key encryption Advances in Information and Computer Security | 2015-05-27 | Paper |
Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption Advances in Information and Computer Security | 2014-09-15 | Paper |
Chosen ciphertext security via UCE Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Chosen ciphertext security via point obfuscation Theory of Cryptography | 2014-02-18 | Paper |
On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations Theory of Cryptography | 2014-02-18 | Paper |
Ciphertext Policy Multi-dimensional Range Encryption Lecture Notes in Computer Science | 2013-06-04 | Paper |
Chosen ciphertext secure keyed-homomorphic public-key encryption Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Key encapsulation mechanisms from extractable hash proof systems, revisited Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Group signatures with message-dependent opening Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
Time-specific encryption from forward-secure encryption Lecture Notes in Computer Science | 2012-09-25 | Paper |
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups Lecture Notes in Computer Science | 2012-09-25 | Paper |
Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Asynchronous multiple source network coding for wireless broadcasting Numerical Algebra, Control and Optimization | 2012-06-25 | Paper |
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption Lecture Notes in Computer Science | 2012-06-08 | Paper |
On black-box separations among injective one-way functions Theory of Cryptography | 2011-05-19 | Paper |
Parallel decryption queries in bounded chosen ciphertext attacks Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Efficient generic constructions of timed-release encryption with pre-open capability Lecture Notes in Computer Science | 2010-11-26 | Paper |
Efficient constructions of signcryption schemes and signcryption composability Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
A Generic Construction of Timed-Release Encryption with Pre-open Capability Advances in Information and Computer Security | 2009-10-28 | Paper |
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function Provable Security | 2008-06-10 | Paper |
Wired/Wireless Internet Communications Lecture Notes in Computer Science | 2007-09-24 | Paper |