| Publication | Date of Publication | Type |
|---|
On the security of functional encryption in the generic group model Designs, Codes and Cryptography | 2023-09-07 | Paper |
Efficient zero-knowledge arguments in discrete logarithm setting: sublogarithmic proof or sublinear verifier Advances in Cryptology – ASIACRYPT 2022 | 2023-08-16 | Paper |
Public key encryption with equality test in the standard model Information Sciences | 2021-03-31 | Paper |
Efficient revocable identity-based encryption with short public parameters Theoretical Computer Science | 2021-03-18 | Paper |
Efficient digital signatures from RSA without random oracles Information Sciences | 2021-03-18 | Paper |
Public key encryption with equality test from generic assumptions in the random oracle model Information Sciences | 2020-12-10 | Paper |
A new scale-invariant homomorphic encryption scheme Information Sciences | 2020-07-16 | Paper |
Semi-generic construction of public key encryption and identity-based encryption with equality test Information Sciences | 2020-02-06 | Paper |
A new approach to practical function-private inner product encryption Theoretical Computer Science | 2019-08-13 | Paper |
Adaptive-ID secure revocable hierarchical identity-based encryption | 2018-10-24 | Paper |
Short signatures from Diffie-Hellman: realizing almost compact public key Journal of Cryptology | 2017-10-12 | Paper |
New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures Applied Cryptography and Network Security | 2016-03-10 | Paper |
Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts Lecture Notes in Computer Science | 2016-03-02 | Paper |
Revocable hierarchical identity-based encryption via history-free approach Theoretical Computer Science | 2016-01-21 | Paper |
Security analysis of multilinear maps over the integers Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Revocable hierarchical identity-based encryption Theoretical Computer Science | 2014-06-23 | Paper |
Practical signatures from standard assumptions Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Revocable identity-based encryption revisited: security model and construction Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
On the (Im)possibility of projecting property in prime-order setting Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Efficient delegation of key generation and revocation functionalities in identity-based encryption Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Beyond the limitation of prime-order bilinear groups, and round optimal blind signatures Theory of Cryptography | 2012-06-15 | Paper |
Round-efficient sub-linear zero-knowledge arguments for linear algebra Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
ANALYSIS OF PRIVACY-PRESERVING ELEMENT REDUCTION OF A MULTISET Journal of the Korean Mathematical Society | 2009-05-05 | Paper |
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |