| Publication | Date of Publication | Type |
|---|
Non-interactive zero-knowledge functional proofs | 2024-09-13 | Paper |
Robust publicly verifiable covert security: limited information leakage and guaranteed correctness with low overhead | 2024-08-30 | Paper |
Asymmetric group message franking: definitions and constructions Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Anonymous public key encryption under corruptions Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Simulation-based bi-selective opening security for public key encryption Lecture Notes in Computer Science | 2023-05-12 | Paper |
Receiver selective opening security for identity-based encryption in the multi-challenge setting Designs, Codes and Cryptography | 2023-04-12 | Paper |
Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting | 2023-03-21 | Paper |
Lattice Codes for Lattice-Based PKE | 2022-08-28 | Paper |
Making \textit{any} attribute-based encryption accountable, efficiently | 2022-08-25 | Paper |
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation Theoretical Computer Science | 2020-11-06 | Paper |
Practical public key encryption with selective opening security for receivers Information Sciences | 2020-10-07 | Paper |
Collusion resistant watermarking schemes for cryptographic functionalities | 2020-05-20 | Paper |
Simulation-based selective opening security for receivers under chosen-ciphertext attacks Designs, Codes and Cryptography | 2019-05-24 | Paper |
Unforgeable watermarking schemes with public extraction | 2018-10-17 | Paper |
Lattice-based universal accumulator with nonmembership arguments | 2018-09-26 | Paper |
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation Information Security and Privacy | 2018-09-26 | Paper |
Hedged nonce-based public-key encryption: adaptive security under randomness failures | 2018-05-16 | Paper |
Adaptable key-policy attribute-based encryption with time interval Soft Computing | 2018-04-11 | Paper |
Dual trapdoor identity-based encryption with keyword search Soft Computing | 2018-02-27 | Paper |
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures Provable Security | 2017-01-06 | Paper |
Secret handshakes with dynamic expressive matching policy Information Security and Privacy | 2016-08-31 | Paper |
Towards semantically secure outsourcing of association rule mining on categorical data Information Sciences | 2016-07-08 | Paper |
CCA-secure keyed-fully homomorphic encryption Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Verifiable computation on outsourced encrypted data Computer Security - ESORICS 2014 | 2015-07-24 | Paper |
Authorized keyword search on encrypted data Computer Security - ESORICS 2014 | 2015-07-24 | Paper |
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Adaptable Ciphertext-Policy Attribute-Based Encryption Pairing-Based Cryptography – Pairing 2013 | 2014-02-18 | Paper |
Accountable trapdoor sanitizable signatures Information Security Practice and Experience | 2013-10-10 | Paper |
Accountable Authority Identity-Based Encryption with Public Traceability Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
General construction of chameleon all-but-one trapdoor functions Provable Security | 2011-09-16 | Paper |
Self-generated-certificate public key encryption without pairing and its application Information Sciences | 2011-06-22 | Paper |
Fully secure cipertext-policy hiding CP-ABE Information Security Practice and Experience | 2011-05-19 | Paper |
Chameleon all-but-one TDFs and their application to chosen-ciphertext security Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Efficient CCA-Secure PKE from Identity-Based Techniques Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Self-Generated-Certificate Public Key Encryption Without Pairing Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |