| Publication | Date of Publication | Type |
|---|
Limits of black-box anamorphic encryption | 2024-12-04 | Paper |
Anamorphic encryption: new constructions and homomorphic realizations | 2024-11-12 | Paper |
Chainable functional commitments for unbounded-depth circuits | 2024-08-02 | Paper |
Adaptively Secure Single Secret Leader Election from DDH Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing | 2024-03-26 | Paper |
Efficient and universally composable single secret leader election from pairings Lecture Notes in Computer Science | 2023-11-24 | Paper |
Additive-homomorphic functional commitments and applications to homomorphic signatures Advances in Cryptology – ASIACRYPT 2022 | 2023-08-21 | Paper |
On the impossibility of algebraic vector commitments in pairing-free groups Theory of Cryptography | 2023-08-14 | Paper |
Inner-product functional encryption with fine-grained access control | 2023-03-29 | Paper |
Double-authentication-preventing signatures in the standard model | 2022-12-16 | Paper |
Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security Theoretical Computer Science | 2022-11-17 | Paper |
Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data | 2022-08-25 | Paper |
Bandwidth-efficient threshold EC-DSA | 2021-12-01 | Paper |
Mon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \) | 2021-12-01 | Paper |
Two-party ECDSA from hash proof systems and efficient instantiations | 2020-03-09 | Paper |
Efficient function-hiding functional encryption: from inner-products to orthogonality | 2020-01-28 | Paper |
Verifiable pattern matching on outsourced texts Journal of Discrete Algorithms | 2019-01-04 | Paper |
Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings | 2018-09-12 | Paper |
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions Designs, Codes and Cryptography | 2018-09-06 | Paper |
On the security notions for homomorphic signatures | 2018-08-10 | Paper |
Practical homomorphic message authenticators for arithmetic circuits Journal of Cryptology | 2018-04-26 | Paper |
Practical functional encryption for quadratic functions with applications to predicate encryption | 2017-11-03 | Paper |
Zero-Knowledge Sets With Short Proofs IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Verifiable pattern matching on outsourced texts Lecture Notes in Computer Science | 2016-10-21 | Paper |
Programmable hash functions go private: constructions and applications to (homomorphic) signatures with shorter public keys Lecture Notes in Computer Science | 2015-12-10 | Paper |
Algebraic (trapdoor) one-way functions: constructions and applications Theoretical Computer Science | 2015-10-08 | Paper |
Authenticating computation on groups: new homomorphic primitives and applications Lecture Notes in Computer Science | 2015-01-06 | Paper |
Homomorphic signatures and message authentication codes Lecture Notes in Computer Science | 2014-10-14 | Paper |
Verifiable random functions: relations to identity-based key encapsulation and new constructions Journal of Cryptology | 2014-09-25 | Paper |
Homomorphic signatures with efficient verification for polynomial functions Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Generalizing homomorphic MACs for arithmetic circuits Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Practical homomorphic MACs for arithmetic circuits Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Vector commitments and their applications Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Algebraic (Trapdoor) one-way functions and their applications Theory of Cryptography | 2013-03-18 | Paper |
Efficient network coding signatures in the standard model Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Adaptive pseudo-free groups and applications Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Wildcarded identity-based encryption Journal of Cryptology | 2011-04-01 | Paper |
Coercion-resistant electronic elections Towards Trustworthy Elections | 2010-06-17 | Paper |
A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications Lecture Notes in Computer Science | 2010-01-05 | Paper |
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
Hybrid commitments and their applications to zero-knowledge proof systems Theoretical Computer Science | 2009-06-22 | Paper |
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions Journal of Cryptology | 2009-06-08 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
Verifiable Random Functions from Identity-Based Key Encapsulation Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
Zero-Knowledge Sets with Short Proofs Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions Advances in Cryptology – CRYPTO 2005 | 2008-03-17 | Paper |
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |
Identity-Based Encryption Gone Wild Automata, Languages and Programming | 2007-09-11 | Paper |
Improved On-Line/Off-Line Threshold Signatures Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication Journal of Cryptology | 2007-05-24 | Paper |
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring Theoretical Computer Science | 2007-02-26 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2007-02-12 | Paper |
Efficient distributed computation modulo a shared secret | 2006-09-25 | Paper |
Computing inverses over a shared secret modulus | 2006-03-01 | Paper |
Automata, Languages and Programming Lecture Notes in Computer Science | 2006-01-10 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
Contemporary cryptology. Advanced Courses in Mathematics -- CRM Barcelona | 2005-08-30 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm Lecture Notes in Computer Science | 2003-07-16 | Paper |
Paillier's trapdoor function hides up to \(O(n)\) bits Journal of Cryptology | 2003-03-25 | Paper |
scientific article; zbMATH DE number 1722681 (Why is no real title available?) | 2002-03-21 | Paper |
scientific article; zbMATH DE number 1629859 (Why is no real title available?) | 2001-11-04 | Paper |
New efficient and secure protocols for verifiable signature sharing and other applications Journal of Computer and System Sciences | 2001-06-10 | Paper |
scientific article; zbMATH DE number 1302841 (Why is no real title available?) | 2000-03-09 | Paper |