| Publication | Date of Publication | Type |
|---|
Efficient IBS from a new assumption in the multivariate-quadratic setting Lecture Notes in Computer Science | 2023-08-14 | Paper |
Revisiting the security of salted UOV signature Lecture Notes in Computer Science | 2023-08-14 | Paper |
Identity-based signature and extended forking algorithm in the multivariate quadratic setting Lecture Notes in Computer Science | 2023-05-12 | Paper |
| From rerandomizability to sequential aggregation: efficient signature schemes based on SXDH assumption | 2021-06-08 | Paper |
| Rerandomizable signatures under standard assumption | 2020-05-12 | Paper |
Malleability and ownership of proxy signatures: towards a stronger definition and its limitations Advances in Mathematics of Communications | 2020-05-04 | Paper |
| Large universe subset predicate encryption based on static assumption (without random oracle) | 2020-01-28 | Paper |
| Keyword search meets membership testing: adaptive security from SXDH | 2019-03-29 | Paper |
| Towards static assumption based cryptosystem in pairing setting: further applications of DéjàQ and dual-form signature (extended abstract) | 2018-11-07 | Paper |
Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis Journal of Mathematical Cryptology | 2018-10-04 | Paper |
Private set-intersection with common set-up Advances in Mathematics of Communications | 2018-09-21 | Paper |
| CCA-secure predicate encryption from pair encoding in prime order groups: generic and efficient | 2018-04-26 | Paper |
| Another look at tightness. II: Practical issues in cryptography | 2017-10-23 | Paper |
On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One IEEE Transactions on Computers | 2017-09-08 | Paper |
Fault Attacks on Pairing-Based Protocols: Revisited IEEE Transactions on Computers | 2017-05-16 | Paper |
Type 2 structure-preserving signature schemes revisited Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
A closer look at multiple forking: leveraging (in)dependence for a tighter bound Algorithmica | 2016-05-31 | Paper |
Property preserving symmetric encryption revisited Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
Framework for efficient search and statistics computation on encrypted cloud data Advances in Information and Computer Security | 2015-05-27 | Paper |
From selective-ID to full-ID IBS without random oracles Security, Privacy, and Applied Cryptography Engineering | 2014-09-15 | Paper |
Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption International Journal of Applied Cryptography | 2013-11-15 | Paper |
Galindo-Garcia identity-based signature revisited Lecture Notes in Computer Science | 2013-06-04 | Paper |
Variants of Waters' dual system primitives using asymmetric pairings. (Extended abstract) Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Another look at tightness Selected Areas in Cryptography | 2012-06-08 | Paper |
On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited Discrete Applied Mathematics | 2011-08-10 | Paper |
A generic variant of NIST'S KAS2 key agreement protocol Information Security and Privacy | 2011-07-07 | Paper |
| Identity-based encryption | 2011-04-07 | Paper |
Combined security analysis of the one- and three-pass unified model key agreement protocols Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
On the efficiency and security of pairing-based protocols in the type 1 and type 4 settings Arithmetic of Finite Fields | 2010-07-20 | Paper |
Comparing two pairing-based aggregate signature schemes Designs, Codes and Cryptography | 2010-05-19 | Paper |
A new protocol for the nearby friend problem Cryptography and Coding | 2010-01-07 | Paper |
Reusing static keys in key agreement protocols Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
| Identity-based encryption and hierarchical identity-based encryption | 2009-03-24 | Paper |
Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks Provable Security | 2008-06-10 | Paper |
New Constructions of Constant Size Ciphertext HIBE Without Random Oracle Information Security and Cryptology – ICISC 2006 | 2008-05-06 | Paper |
HIBE With Short Public Parameters Without Random Oracle Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields Lecture Notes in Computer Science | 2008-03-17 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |