| Publication | Date of Publication | Type |
|---|
| Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices | 2022-08-25 | Paper |
| Asymptotically tight lower bounds in anonymous broadcast encryption and authentication | 2022-06-29 | Paper |
Identity-based encryption with security against the KGC: a formal model and its instantiations Theoretical Computer Science | 2021-12-22 | Paper |
Efficient identity-based encryption with hierarchical key-insulation from HIBE Designs, Codes and Cryptography | 2021-10-04 | Paper |
Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption Designs, Codes and Cryptography | 2021-06-24 | Paper |
Efficient revocable identity-based encryption with short public parameters Theoretical Computer Science | 2021-03-18 | Paper |
Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more Theoretical Computer Science | 2020-12-15 | Paper |
Randomness Extraction via a Quantum Generalization of the Conditional Collision Entropy IEEE Transactions on Information Theory | 2020-01-28 | Paper |
Identity-based encryption with hierarchical key-insulation in the standard model Designs, Codes and Cryptography | 2019-05-17 | Paper |
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance International Journal of Applied Cryptography | 2018-11-26 | Paper |
| Key-updatable public-key encryption with keyword search: models and generic constructions | 2018-09-26 | Paper |
| Broadcast encryption with guessing secrecy | 2018-03-16 | Paper |
Timed-release computational secret sharing and threshold encryption Designs, Codes and Cryptography | 2018-01-26 | Paper |
| Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance | 2017-08-25 | Paper |
New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness Lecture Notes in Computer Science | 2017-01-06 | Paper |
Constructions of unconditionally secure broadcast encryption from key predistribution systems with trade-offs between communication and storage Provable Security | 2016-01-27 | Paper |
Constructions of CCA-Secure Revocable Identity-Based Encryption Information Security and Privacy | 2015-10-20 | Paper |
Information-theoretically secure entity authentication in the multi-user setting Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
Timed-release computational secret sharing scheme and its applications Provable Security | 2015-09-29 | Paper |
Timed-release secret sharing schemes with information theoretic security Cryptography and Information Security in the Balkans | 2015-09-21 | Paper |
Information-theoretic timed-release security: key-agreement, encryption, and authentication codes Lecture Notes in Computer Science | 2012-11-06 | Paper |
Differential geometry on diffeomorphism groups and Lagrangian stability of viscous flows Physica D | 2007-03-15 | Paper |
Privacy amplification for quantum key distribution Journal of Physics A: Mathematical and Theoretical | 2007-02-08 | Paper |
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
Geometrical analysis of free rotation of a rigid body Journal of Physics A: Mathematical and General | 1999-12-06 | Paper |
A geometrical method for the stability analysis of dynamical systems Journal of Physics A: Mathematical and General | 1999-12-06 | Paper |