| Publication | Date of Publication | Type |
|---|
| Ring/module learning with errors under linear leakage -- hardness and applications | 2024-11-12 | Paper |
Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices Designs, Codes and Cryptography | 2024-05-27 | Paper |
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates Journal of Cryptology | 2024-04-21 | Paper |
Batch bootstrapping. I: A new framework for SIMD bootstrapping in polynomial modulus Advances in Cryptology – EUROCRYPT 2023 | 2023-12-12 | Paper |
Batch bootstrapping. II: Bootstrapping in polynomial modulus only requires \(\tilde{O}(1)\) FHE multiplications in amortization Advances in Cryptology – EUROCRYPT 2023 | 2023-12-12 | Paper |
Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices Public-Key Cryptography – PKC 2022 | 2023-08-10 | Paper |
| Ring-based identity based encryption -- asymptotically shorter MPK and tighter security | 2023-04-13 | Paper |
| Rounding in the rings | 2022-11-09 | Paper |
Almost tight security in lattices with polynomial moduli -- PRF, IBE, all-but-many LTF, and more Lecture Notes in Computer Science | 2022-10-13 | Paper |
| Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks | 2021-12-21 | Paper |
| New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertexts | 2021-12-08 | Paper |
| Non-malleable codes for partial functions with manipulation detection | 2020-06-30 | Paper |
Locally decodable and updatable non-malleable codes and their applications Journal of Cryptology | 2020-03-03 | Paper |
| Proxy re-encryption and re-signatures from lattices | 2020-01-30 | Paper |
| FE for inner products and its application to decentralized ABE | 2020-01-28 | Paper |
Leakage resilience from program obfuscation Journal of Cryptology | 2019-08-13 | Paper |
| Parameter-hiding order revealing encryption | 2018-12-20 | Paper |
Deniable Attribute Based Encryption for Branching Programs from LWE Theory of Cryptography | 2016-12-22 | Paper |
Leakage-resilient public-key encryption from obfuscation Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Constant-Round MPC with Fairness and Guarantee of Output Delivery Lecture Notes in Computer Science | 2015-12-10 | Paper |
Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Locally decodable and updatable non-malleable codes and their applications Theory of Cryptography | 2015-07-06 | Paper |
Multi-client verifiable computation with stronger security guarantees Theory of Cryptography | 2015-07-06 | Paper |
Multi-input functional encryption Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Leakage resilient fully homomorphic encryption Theory of Cryptography | 2014-02-18 | Paper |
Tamper and Leakage Resilience in the Split-State Model Lecture Notes in Computer Science | 2012-09-25 | Paper |
Public-key cryptography from new multivariate quadratic assumptions Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Memory delegation Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Efficient secure two-party exponentiation Topics in Cryptology – CT-RSA 2011 | 2011-02-11 | Paper |
Efficient string-commitment from weak bit-commitment Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Algorithmic Tamper-Proof Security under Probing Attacks Lecture Notes in Computer Science | 2010-09-10 | Paper |
Parallel repetition theorems for interactive arguments Theory of Cryptography | 2010-02-24 | Paper |
Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$ Post-Quantum Cryptography | 2008-11-11 | Paper |