| Publication | Date of Publication | Type |
|---|
Fully-succinct multi-key homomorphic signatures from standard assumptions | 2024-12-13 | Paper |
Witness encryption for succinct functional commitments and applications | 2024-11-12 | Paper |
Lookup arguments: improvements, extensions and applications to zero-knowledge decision trees | 2024-11-12 | Paper |
Cuckoo commitments: registration-based encryption and key-value map commitments for large spaces | 2024-09-13 | Paper |
Chainable functional commitments for unbounded-depth circuits | 2024-08-02 | Paper |
From polynomial IOP and commitments to non-malleable zkSNARKs | 2024-08-02 | Paper |
Adaptively Secure Single Secret Leader Election from DDH Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing | 2024-03-26 | Paper |
Extendable threshold ring signatures with enhanced anonymity Lecture Notes in Computer Science | 2023-11-24 | Paper |
Efficient and universally composable single secret leader election from pairings Lecture Notes in Computer Science | 2023-11-24 | Paper |
Zero-knowledge proofs for set membership: efficient, succinct, modular Designs, Codes and Cryptography | 2023-11-07 | Paper |
Additive-homomorphic functional commitments and applications to homomorphic signatures Advances in Cryptology – ASIACRYPT 2022 | 2023-08-21 | Paper |
On the impossibility of algebraic vector commitments in pairing-free groups Theory of Cryptography | 2023-08-14 | Paper |
Verifiable Computation and Succinct Arguments for NP Asymmetric Cryptography | 2023-08-04 | Paper |
Ring signatures with user-controlled linkability Computer Security – ESORICS 2022 | 2023-07-28 | Paper |
Inner product functional commitments with constant-size public parameters and openings Lecture Notes in Computer Science | 2023-07-25 | Paper |
\(\mathcal{Lunar}\): a toolbox for more efficient universal and updatable zkSNARKs and commit-and-prove extensions Lecture Notes in Computer Science | 2023-05-12 | Paper |
Incrementally aggregatable vector commitments and applications to verifiable decentralized storage | 2023-03-21 | Paper |
Progressive and efficient verification for digital signatures | 2022-11-09 | Paper |
Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data | 2022-08-25 | Paper |
Subversion-resilient enhanced privacy ID | 2022-07-06 | Paper |
Zero-knowledge proofs for set membership: efficient, succinct, modular | 2022-06-17 | Paper |
Flexible and efficient verifiable computation on encrypted data | 2021-12-21 | Paper |
Boosting verifiable computation on encrypted data | 2021-12-01 | Paper |
Mon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \) | 2021-12-01 | Paper |
Unilaterally-authenticated key exchange Financial Cryptography and Data Security | 2021-03-17 | Paper |
Improving the efficiency of re-randomizable and replayable CCA secure public key encryption | 2021-02-23 | Paper |
Structure-preserving and re-randomizable RCCA-secure public key encryption and its applications | 2020-05-11 | Paper |
Automated analysis of cryptographic assumptions in generic group models Journal of Cryptology | 2019-06-20 | Paper |
Matrioska: a compiler for multi-key homomorphic signatures | 2018-10-17 | Paper |
Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings | 2018-09-12 | Paper |
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions Designs, Codes and Cryptography | 2018-09-06 | Paper |
On the security notions for homomorphic signatures | 2018-08-10 | Paper |
Practical homomorphic message authenticators for arithmetic circuits Journal of Cryptology | 2018-04-26 | Paper |
Practical functional encryption for quadratic functions with applications to predicate encryption | 2017-11-03 | Paper |
Zero-Knowledge Sets With Short Proofs IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Multi-key Homomorphic Authenticators Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
On the (in)security of SNARKs in the presence of oracles Theory of Cryptography | 2016-12-21 | Paper |
Nearly optimal verifiable data streaming Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Programmable hash functions go private: constructions and applications to (homomorphic) signatures with shorter public keys Lecture Notes in Computer Science | 2015-12-10 | Paper |
Algebraic (trapdoor) one-way functions: constructions and applications Theoretical Computer Science | 2015-10-08 | Paper |
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds Lecture Notes in Computer Science | 2015-08-27 | Paper |
Privacy-preserving accountable computation Lecture Notes in Computer Science | 2014-10-16 | Paper |
Interactive encryption and message authentication Lecture Notes in Computer Science | 2014-10-14 | Paper |
Verifiable random functions: relations to identity-based key encapsulation and new constructions Journal of Cryptology | 2014-09-25 | Paper |
Homomorphic signatures with efficient verification for polynomial functions Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Automated analysis of cryptographic assumptions in generic group models Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Generalizing homomorphic MACs for arithmetic circuits Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Practical homomorphic MACs for arithmetic circuits Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Vector commitments and their applications Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Algebraic (Trapdoor) one-way functions and their applications Theory of Cryptography | 2013-03-18 | Paper |
Efficient network coding signatures in the standard model Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
From selective to full security: semi-generic transformations in the standard model Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Uniqueness is a different story: impossibility of verifiable random functions from trapdoor permutations Theory of Cryptography | 2012-06-15 | Paper |
Adaptive pseudo-free groups and applications Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Constructing certificateless encryption and ID-based encryption from ID-based key agreement Lecture Notes in Computer Science | 2010-11-26 | Paper |
Making the Diffie-Hellman Protocol Identity-Based Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Verifiable Random Functions from Identity-Based Key Encapsulation Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Zero-Knowledge Sets with Short Proofs Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |