| Publication | Date of Publication | Type |
|---|
| Threshold structure-preserving signatures: strong and adaptive security under standard assumptions | 2024-11-12 | Paper |
| Bringing order to chaos: the case of collision-resistant chameleon-hashes | 2024-08-30 | Paper |
| Revisiting updatable encryption: controlled forward security, constructions and a puncturable perspective | 2024-08-02 | Paper |
| Threshold structure-preserving signatures | 2024-06-26 | Paper |
| (Inner-product) functional encryption with updatable ciphertexts | 2024-01-23 | Paper |
| Unique-path identity based encryption with applications to strongly secure messaging | 2023-12-08 | Paper |
| CRS-updatable asymmetric quasi-adaptive NIZK arguments | 2023-08-14 | Paper |
| Logarithmic-size (linkable) threshold ring signatures in the plain model | 2023-08-10 | Paper |
| Protean Signature Schemes | 2023-06-28 | Paper |
| Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More | 2023-04-13 | Paper |
| CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors | 2023-03-21 | Paper |
| Fully collision-resistant chameleon-hashes from simpler and post-quantum assumptions | 2022-12-16 | Paper |
| Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes | 2022-10-13 | Paper |
| Subversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKs | 2022-06-29 | Paper |
| Versatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract) | 2022-06-24 | Paper |
| Fine-grained forward secrecy: allow-list/deny-list encryption and applications | 2022-06-22 | Paper |
| Updatable signatures and message authentication codes | 2021-12-21 | Paper |
| Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange | 2021-06-28 | Paper |
| Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation | 2021-03-17 | Paper |
| Policy-based sanitizable signatures | 2020-08-05 | Paper |
| Structure-preserving signatures on equivalence classes from standard assumptions | 2020-05-11 | Paper |
| A framework for UC-secure commitments from publicly computable smooth projective hashing | 2020-05-06 | Paper |
| Structure-preserving signatures on equivalence classes and constant-size anonymous credentials | 2019-06-20 | Paper |
| Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge | 2019-05-24 | Paper |
| Generic double-authentication preventing signatures and a post-quantum instantiation | 2018-11-07 | Paper |
| Signer-anonymous designated-verifier redactable signatures for cloud-based data sharing | 2018-10-26 | Paper |
| Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs | 2018-10-10 | Paper |
| Chameleon-hashes with dual long-term trapdoors and their applications | 2018-07-17 | Paper |
| Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange | 2018-07-17 | Paper |
| Post-quantum zero-knowledge proofs for accumulators with applications to ring signatures from symmetric-key primitives | 2018-06-22 | Paper |
| Revisiting proxy re-encryption: forward secrecy, improved security, and applications | 2018-05-16 | Paper |
| Linking-based revocation for group signatures: a pragmatic approach for efficient revocation checks | 2017-10-23 | Paper |
| Practical strongly invisible and strongly accountable sanitizable signatures | 2017-08-25 | Paper |
| Chameleon-Hashes with Ephemeral Trapdoors | 2017-06-13 | Paper |
| Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions | 2016-10-21 | Paper |
| A General Framework for Redactable Signatures and New Constructions | 2016-05-19 | Paper |
| Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability | 2016-04-08 | Paper |
| Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives | 2016-03-02 | Paper |
| Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes | 2016-01-27 | Paper |
| A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials | 2016-01-12 | Paper |
| Practical Round-Optimal Blind Signatures in the Standard Model | 2015-12-10 | Paper |
| Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials | 2015-01-16 | Paper |
| Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes | 2014-01-14 | Paper |
| Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources | 2012-06-08 | Paper |