| Publication | Date of Publication | Type |
|---|
Quantum public-key encryption with tamper-resilient public keys from one-way functions | 2024-12-13 | Paper |
Certified everlasting secure collusion-resistant functional encryption, and more | 2024-11-13 | Paper |
One-out-of-many unclonable cryptography: definitions, constructions, and more | 2024-08-15 | Paper |
Publicly verifiable deletion from minimal assumptions | 2024-08-15 | Paper |
Watermarking PRFs and PKE against quantum adversaries Journal of Cryptology | 2024-05-13 | Paper |
Obfuscation of pseudo-deterministic quantum circuits | 2024-05-08 | Paper |
Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions | 2024-03-14 | Paper |
Public key encryption with secure key leasing Advances in Cryptology – EUROCRYPT 2023 | 2024-01-16 | Paper |
Functional encryption with secure key leasing Advances in Cryptology – ASIACRYPT 2022 | 2023-08-21 | Paper |
Bounded functional encryption for Turing machines: adaptive security from general assumptions Theory of Cryptography | 2023-08-14 | Paper |
KDM security for the Fujisaki-Okamoto transformations in the QROM Public-Key Cryptography – PKC 2022 | 2023-08-10 | Paper |
NIZK from SNARGs Journal of Cryptology | 2023-07-05 | Paper |
Secure software leasing from standard assumptions | 2023-03-31 | Paper |
Circular security is complete for KDM security | 2023-03-21 | Paper |
Non-committing encryption with constant ciphertext expansion from standard assumptions | 2023-03-21 | Paper |
Watermarking PRFs against quantum adversaries | 2022-08-30 | Paper |
Obfustopia built on secret-key functional encryption Journal of Cryptology | 2022-06-08 | Paper |
CCA security and trapdoor functions via key-dependent-message security Journal of Cryptology | 2022-04-04 | Paper |
Secret sharing with statistical privacy and computational relaxed non-malleability | 2022-03-24 | Paper |
NIZK from SNARG | 2021-12-01 | Paper |
Simple and generic constructions of succinct functional encryption Journal of Cryptology | 2021-07-30 | Paper |
Simple and efficient KDM-CCA secure public key encryption | 2020-05-11 | Paper |
Non-committing encryption with quasi-optimal ciphertext-rate based on the DDH problem | 2020-05-11 | Paper |
CPA-to-CCA transformation for KDM security | 2020-04-30 | Paper |
Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously | 2020-03-09 | Paper |
CCA security and trapdoor functions via key-dependent-message security Advances in Cryptology – CRYPTO 2019 | 2020-03-09 | Paper |
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions Theoretical Computer Science | 2019-10-18 | Paper |
A framework for achieving KDM-CCA secure public-key encryption | 2019-01-23 | Paper |
Formal treatment of verifiable privacy-preserving data-aggregation protocols | 2018-11-07 | Paper |
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions Lecture Notes in Computer Science | 2018-10-17 | Paper |
Obfustopia built on secret-key functional encryption Advances in Cryptology – EUROCRYPT 2018 | 2018-07-09 | Paper |
Simple and generic constructions of succinct functional encryption Public-Key Cryptography – PKC 2018 | 2018-05-29 | Paper |
Key dependent message security and receiver selective opening security for identity-based encryption | 2018-05-16 | Paper |
On the key dependent message security of the Fujisaki-Okamoto constructions Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Completeness of single-bit projection-KDM security for public key encryption Lecture Notes in Computer Science | 2016-03-02 | Paper |
Efficient key dependent message security amplification against chosen ciphertext attacks Information Security and Cryptology - ICISC 2014 | 2015-09-11 | Paper |