| Publication | Date of Publication | Type |
|---|
| Fully-succinct multi-key homomorphic signatures from standard assumptions | 2024-12-13 | Paper |
| Witness encryption for succinct functional commitments and applications | 2024-11-12 | Paper |
| Lookup arguments: improvements, extensions and applications to zero-knowledge decision trees | 2024-11-12 | Paper |
| Cuckoo commitments: registration-based encryption and key-value map commitments for large spaces | 2024-09-13 | Paper |
| Chainable functional commitments for unbounded-depth circuits | 2024-08-02 | Paper |
| From polynomial IOP and commitments to non-malleable zkSNARKs | 2024-08-02 | Paper |
| Adaptively Secure Single Secret Leader Election from DDH | 2024-03-26 | Paper |
| Extendable threshold ring signatures with enhanced anonymity | 2023-11-24 | Paper |
| Efficient and universally composable single secret leader election from pairings | 2023-11-24 | Paper |
| Zero-knowledge proofs for set membership: efficient, succinct, modular | 2023-11-07 | Paper |
| Additive-homomorphic functional commitments and applications to homomorphic signatures | 2023-08-21 | Paper |
| On the impossibility of algebraic vector commitments in pairing-free groups | 2023-08-14 | Paper |
| Verifiable Computation and Succinct Arguments for NP | 2023-08-04 | Paper |
| Ring signatures with user-controlled linkability | 2023-07-28 | Paper |
| Inner product functional commitments with constant-size public parameters and openings | 2023-07-25 | Paper |
| \(\mathcal{Lunar}\): a toolbox for more efficient universal and updatable zkSNARKs and commit-and-prove extensions | 2023-05-12 | Paper |
| Incrementally aggregatable vector commitments and applications to verifiable decentralized storage | 2023-03-21 | Paper |
| Progressive and efficient verification for digital signatures | 2022-11-09 | Paper |
| Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data | 2022-08-25 | Paper |
| Subversion-resilient enhanced privacy ID | 2022-07-06 | Paper |
| Zero-knowledge proofs for set membership: efficient, succinct, modular | 2022-06-17 | Paper |
| Flexible and efficient verifiable computation on encrypted data | 2021-12-21 | Paper |
| Boosting verifiable computation on encrypted data | 2021-12-01 | Paper |
| Mon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \) | 2021-12-01 | Paper |
| Unilaterally-Authenticated Key Exchange | 2021-03-17 | Paper |
| Improving the efficiency of re-randomizable and replayable CCA secure public key encryption | 2021-02-23 | Paper |
| Structure-preserving and re-randomizable RCCA-secure public key encryption and its applications | 2020-05-11 | Paper |
| Automated analysis of cryptographic assumptions in generic group models | 2019-06-20 | Paper |
| Matrioska: a compiler for multi-key homomorphic signatures | 2018-10-17 | Paper |
| Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings | 2018-09-12 | Paper |
| Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions | 2018-09-06 | Paper |
| On the security notions for homomorphic signatures | 2018-08-10 | Paper |
| Practical homomorphic message authenticators for arithmetic circuits | 2018-04-26 | Paper |
| Practical functional encryption for quadratic functions with applications to predicate encryption | 2017-11-03 | Paper |
| Zero-Knowledge Sets With Short Proofs | 2017-07-27 | Paper |
| Multi-key Homomorphic Authenticators | 2017-01-06 | Paper |
| On the (In)Security of SNARKs in the Presence of Oracles | 2016-12-21 | Paper |
| Nearly Optimal Verifiable Data Streaming | 2016-04-13 | Paper |
| Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys | 2015-12-10 | Paper |
| Algebraic (trapdoor) one-way functions: constructions and applications | 2015-10-08 | Paper |
| Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds | 2015-08-27 | Paper |
| Privacy-Preserving Accountable Computation | 2014-10-16 | Paper |
| Interactive Encryption and Message Authentication | 2014-10-14 | Paper |
| Verifiable random functions: relations to identity-based key encapsulation and new constructions | 2014-09-25 | Paper |
| Homomorphic Signatures with Efficient Verification for Polynomial Functions | 2014-08-07 | Paper |
| Automated Analysis of Cryptographic Assumptions in Generic Group Models | 2014-08-07 | Paper |
| Generalizing Homomorphic MACs for Arithmetic Circuits | 2014-03-25 | Paper |
| Practical Homomorphic MACs for Arithmetic Circuits | 2013-05-31 | Paper |
| Vector Commitments and Their Applications | 2013-04-19 | Paper |
| Algebraic (Trapdoor) One-Way Functions and Their Applications | 2013-03-18 | Paper |
| Efficient network coding signatures in the standard model | 2012-07-20 | Paper |
| From selective to full security: semi-generic transformations in the standard model | 2012-07-20 | Paper |
| Uniqueness is a different story: impossibility of verifiable random functions from trapdoor permutations | 2012-06-15 | Paper |
| Adaptive pseudo-free groups and applications | 2011-05-27 | Paper |
| Constructing certificateless encryption and ID-based encryption from ID-based key agreement | 2010-11-26 | Paper |
| Making the Diffie-Hellman Protocol Identity-Based | 2010-03-16 | Paper |
| Verifiable Random Functions from Identity-Based Key Encapsulation | 2009-05-12 | Paper |
| Zero-Knowledge Sets with Short Proofs | 2008-04-15 | Paper |
| Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results | 2008-03-05 | Paper |