| Publication | Date of Publication | Type |
|---|
| Threshold structure-preserving signatures: strong and adaptive security under standard assumptions | 2024-11-12 | Paper |
| Bringing order to chaos: the case of collision-resistant chameleon-hashes | 2024-08-30 | Paper |
| Revisiting updatable encryption: controlled forward security, constructions and a puncturable perspective | 2024-08-02 | Paper |
| Threshold structure-preserving signatures | 2024-06-26 | Paper |
| (Inner-product) functional encryption with updatable ciphertexts | 2024-01-23 | Paper |
| Unique-path identity based encryption with applications to strongly secure messaging | 2023-12-08 | Paper |
| CRS-updatable asymmetric quasi-adaptive NIZK arguments | 2023-08-14 | Paper |
| Logarithmic-size (linkable) threshold ring signatures in the plain model | 2023-08-10 | Paper |
| Protean Signature Schemes | 2023-06-28 | Paper |
| Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More | 2023-04-13 | Paper |
| CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors | 2023-03-21 | Paper |
| Fully collision-resistant chameleon-hashes from simpler and post-quantum assumptions | 2022-12-16 | Paper |
| Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes | 2022-10-13 | Paper |
| Subversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKs | 2022-06-29 | Paper |
| Versatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract) | 2022-06-24 | Paper |
| Fine-grained forward secrecy: allow-list/deny-list encryption and applications | 2022-06-22 | Paper |
| Updatable signatures and message authentication codes | 2021-12-21 | Paper |
| Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange | 2021-06-28 | Paper |
| Homomorphic proxy re-authenticators and applications to verifiable multi-user data aggregation | 2021-03-17 | Paper |
| Policy-based sanitizable signatures | 2020-08-05 | Paper |
| Structure-preserving signatures on equivalence classes from standard assumptions | 2020-05-11 | Paper |
| A framework for UC-secure commitments from publicly computable smooth projective hashing | 2020-05-06 | Paper |
| Structure-preserving signatures on equivalence classes and constant-size anonymous credentials | 2019-06-20 | Paper |
| Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge | 2019-05-24 | Paper |
| Generic double-authentication preventing signatures and a post-quantum instantiation | 2018-11-07 | Paper |
| Signer-anonymous designated-verifier redactable signatures for cloud-based data sharing | 2018-10-26 | Paper |
| Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs | 2018-10-10 | Paper |
| Chameleon-hashes with dual long-term trapdoors and their applications | 2018-07-17 | Paper |
| Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange | 2018-07-17 | Paper |
| Post-quantum zero-knowledge proofs for accumulators with applications to ring signatures from symmetric-key primitives | 2018-06-22 | Paper |
| Revisiting proxy re-encryption: forward secrecy, improved security, and applications | 2018-05-16 | Paper |
| Linking-based revocation for group signatures: a pragmatic approach for efficient revocation checks | 2017-10-23 | Paper |
| Practical strongly invisible and strongly accountable sanitizable signatures | 2017-08-25 | Paper |
| Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures | 2017-06-13 | Paper |
| Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions | 2016-10-21 | Paper |
| A general framework for redactable signatures and new constructions | 2016-05-19 | Paper |
| Non-interactive plaintext (in-)equality proofs and group signatures with verifiable controllable linkability | 2016-04-08 | Paper |
| Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives | 2016-03-02 | Paper |
| Rethinking privacy for extended sanitizable signatures and a black-box construction of strongly private schemes | 2016-01-27 | Paper |
| A new approach to efficient revocable attribute-based anonymous credentials | 2016-01-12 | Paper |
| Practical Round-Optimal Blind Signatures in the Standard Model | 2015-12-10 | Paper |
| Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials | 2015-01-16 | Paper |
| Warrant-hiding delegation-by-certificate proxy signature schemes | 2014-01-14 | Paper |
| Efficient schemes for anonymous yet authorized and bounded use of cloud resources | 2012-06-08 | Paper |