| Publication | Date of Publication | Type |
|---|
Zero-history confidential chains with zero-knowledge contracts: a new normal for decentralized ledgers? Computer Security – ESORICS 2022 | 2023-07-21 | Paper |
| Anonymous Lattice Identity-Based Encryption with Traceable Identities | 2023-04-13 | Paper |
| Compact Multi-Party Confidential Transactions | 2023-03-22 | Paper |
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing 1511.94061 | 2022-12-22 | Paper |
| A simple and efficient CCA-secure lattice KEM in the standard model | 2022-12-16 | Paper |
| The complex shape of anonymity in cryptocurrencies: case studies from a systematic approach | 2022-06-17 | Paper |
| Secure hybrid encryption in the standard model from hard learning problems | 2022-03-22 | Paper |
Efficient public-key encryption with equality test from lattices Theoretical Computer Science | 2021-10-21 | Paper |
CCA-security from adaptive all-but-one lossy trapdoor functions Theoretical Computer Science | 2021-08-27 | Paper |
| Direct CCA-secure KEM and deterministic PKE from plain LWE | 2020-02-25 | Paper |
Signcryption schemes with insider security in an ideal permutation model Journal of Mathematical Cryptology | 2019-07-08 | Paper |
| Forward-secure linkable ring signatures | 2018-09-26 | Paper |
| Almost tight multi-instance multi-ciphertext identity-based encryption on lattices | 2018-08-10 | Paper |
| All-but-many lossy trapdoor functions from lattices and applications | 2017-10-27 | Paper |
| Key recovery: inert and public | 2017-10-23 | Paper |
Towards tightly secure lattice short signature and id-based encryption Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Unconditionally anonymous ring and mesh signatures Journal of Cryptology | 2016-10-13 | Paper |
Turing machines with shortcuts: efficient attribute-based encryption for bounded functions Applied Cryptography and Network Security | 2016-10-04 | Paper |
Attribute-based encryption for finite automata from LWE Provable Security | 2016-01-27 | Paper |
Sealing the leak on classical NTRU signatures Post-Quantum Cryptography | 2015-01-14 | Paper |
Key-private proxy re-encryption under LWE Lecture Notes in Computer Science | 2014-01-14 | Paper |
Expressive Cryptography: Lattice Perspectives Information Security and Privacy | 2013-06-28 | Paper |
Adapting Lyubashevsky's signature schemes to the ring signature setting Progress in Cryptology – AFRICACRYPT 2013 | 2013-06-07 | Paper |
Attribute-based functional encryption on lattices Theory of Cryptography | 2013-03-18 | Paper |
Functional encryption for threshold functions (or fuzzy IBE) from lattices Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Expressive Encryption Systems from Lattices Cryptology and Network Security | 2012-07-20 | Paper |
Efficient selective identity-based encryption without random oracles Journal of Cryptology | 2012-01-13 | Paper |
Identity-Based Signcryption Practical Signcryption | 2011-05-18 | Paper |
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Shrinking the keys of discrete-log-type lossy trapdoor functions Applied Cryptography and Network Security | 2010-07-06 | Paper |
Efficient lattice (H)IBE in the standard model Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Lattice mixing and vanishing trapdoors: a framework for fully secure short signatures and more Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
Preventing pollution attacks in multi-source network coding Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
Strong cryptography from weak secrets. Building efficient PKE and IBE from distributed passwords Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
HPAKE : Password Authentication Secure against Cross-Site User Impersonation Cryptology and Network Security | 2009-11-26 | Paper |
Distributed Public-Key Cryptography from Weak Secrets Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
| Generalized IBE in the exponent-inversion framework | 2009-03-24 | Paper |
| scientific article; zbMATH DE number 5532062 (Why is no real title available?) | 2009-03-24 | Paper |
The Uber-Assumption Family Pairing-Based Cryptography – Pairing 2008 | 2009-02-10 | Paper |
A tapestry of identity-based encryption: practical frameworks compared International Journal of Applied Cryptography | 2009-01-15 | Paper |
Expressive Subgroup Signatures Lecture Notes in Computer Science | 2008-11-20 | Paper |
New Paradigms for Password Security Information Security and Privacy | 2008-07-08 | Paper |
Miniature CCA2 PK Encryption: Tight Security Without Redundancy Advances in Cryptology – ASIACRYPT 2007 | 2008-05-15 | Paper |
Short signatures without random oracles and the SDH assumption in bilinear groups Journal of Cryptology | 2008-05-06 | Paper |
Hierarchical Identity Based Encryption with Constant Size Ciphertext Lecture Notes in Computer Science | 2008-05-06 | Paper |
Mesh Signatures Advances in Cryptology - EUROCRYPT 2007 | 2007-11-29 | Paper |
General Ad Hoc Encryption from Exponent Inversion IBE Advances in Cryptology - EUROCRYPT 2007 | 2007-11-29 | Paper |
Advances in Cryptology - CRYPTO 2003 Lecture Notes in Computer Science | 2007-11-28 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Compact Group Signatures Without Random Oracles Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) Lecture Notes in Computer Science | 2007-09-04 | Paper |
Full-Domain Subgroup Hiding and Constant-Size Group Signatures Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions Lecture Notes in Computer Science | 2007-09-04 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |