| Publication | Date of Publication | Type |
|---|
| How to use (plain) witness encryption: registered ABE, flexible broadcast, and more | 2024-02-06 | Paper |
| Universal amplification of KDM security: from 1-key circular to multi-key KDM | 2024-02-02 | Paper |
| Security-preserving distributed samplers: how to generate any CRS in one round without random oracles | 2024-02-02 | Paper |
| On non-uniform security for black-box non-interactive CCA commitments | 2024-01-16 | Paper |
| Fully adaptive decentralized multi-authority \textsf{ABE} | 2023-12-12 | Paper |
| Registered attribute-based encryption | 2023-12-12 | Paper |
| Non-interactive publicly-verifiable delegation of committed programs | 2023-11-16 | Paper |
| Multi-authority ABE from lattices without random oracles | 2023-08-14 | Paper |
| Adaptive multiparty NIKE | 2023-08-14 | Paper |
| Fully succinct batch arguments for \textsf{NP} from indistinguishability obfuscation | 2023-08-14 | Paper |
| How to sample a discrete Gaussian (and more) from a random oracle | 2023-08-14 | Paper |
| Batch arguments for \textsf{NP} and more from standard bilinear group assumptions | 2023-06-28 | Paper |
| Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups | 2023-05-26 | Paper |
| Bounded Collusion ABE for TMs from IBE | 2023-05-26 | Paper |
| Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH | 2023-04-13 | Paper |
| New constructions of hinting PRGs, OWFs with encryption, and more | 2022-11-09 | Paper |
| Chosen ciphertext security from injective trapdoor functions | 2022-11-09 | Paper |
| Dynamic collusion bounded functional encryption from identity-based encryption | 2022-08-30 | Paper |
| Targeted lossy functions and applications | 2022-05-18 | Paper |
| New techniques in replica encodings with client setup | 2022-03-23 | Paper |
| On the CCA compatibility of public-key infrastructure | 2021-12-21 | Paper |
| Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} | 2021-12-08 | Paper |
| Black-box non-interactive non-malleable commitments | 2021-12-08 | Paper |
| On perfect correctness in (lockable) obfuscation | 2021-12-01 | Paper |
| How to Use Indistinguishability Obfuscation: Deniable Encryption, and More | 2021-05-27 | Paper |
| Adaptively secure constrained pseudorandom functions | 2021-03-17 | Paper |
| New methods and abstractions for RSA-based forward secure signatures | 2021-02-23 | Paper |
| Collusion Resistant Traitor Tracing from Learning with Errors | 2020-10-29 | Paper |
| Output compression, MPC, and iO for Turing machines | 2020-05-20 | Paper |
| New approaches to traitor tracing with embedded identities | 2020-04-30 | Paper |
| Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions | 2020-03-09 | Paper |
| Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption | 2020-03-09 | Paper |
| ABE for DFA from \(k\)-lin | 2020-03-09 | Paper |
| Collusion resistant broadcast and trace from positional witness encryption | 2020-01-28 | Paper |
| Collusion resistant traitor tracing from learning with errors | 2019-08-22 | Paper |
| Upgrading to functional encryption | 2018-12-11 | Paper |
| Impossibility of simulation secure functional encryption even with random oracles | 2018-12-11 | Paper |
| Traitor-tracing from LWE made simple and attribute-based | 2018-12-06 | Paper |
| Synchronized aggregate signatures from the RSA assumption | 2018-07-09 | Paper |
| A generic approach to constructing and proving verifiable random functions | 2018-01-19 | Paper |
| Universal Samplers with Fast Verification | 2017-06-13 | Paper |
| Separating IND-CPA and Circular Security for Unbounded Length Key Cycles | 2017-06-13 | Paper |
| Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption | 2017-06-13 | Paper |
| Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys | 2017-01-13 | Paper |
| How to Generate and Use Universal Samplers | 2017-01-06 | Paper |
| Semi-adaptive Security and Bundling Functionalities Made Generic and Easy | 2016-12-22 | Paper |
| Circular Security Separations for Arbitrary Length Cycles from LWE | 2016-10-27 | Paper |
| Targeted malleability | 2016-10-07 | Paper |
| Deterministic Public-Key Encryption Under Continual Leakage | 2016-10-04 | Paper |
| Constrained Pseudorandom Functions for Unconstrained Inputs | 2016-07-15 | Paper |
| New Negative Results on Differing-Inputs Obfuscation | 2016-07-15 | Paper |
| Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits | 2016-07-04 | Paper |
| Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model | 2016-06-10 | Paper |
| New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators | 2016-06-10 | Paper |
| Time-Lock Puzzles from Randomized Encodings | 2016-04-15 | Paper |
| New Circular Security Counterexamples from Decision Linear and Learning with Errors | 2016-03-23 | Paper |
| A Punctured Programming Approach to Adaptively Secure Functional Encryption | 2015-12-10 | Paper |
| Universal Signature Aggregators | 2015-09-30 | Paper |
| Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption | 2015-09-29 | Paper |
| Indistinguishability Obfuscation for Turing Machines with Unbounded Memory | 2015-08-21 | Paper |
| Separations in Circular Security for Arbitrary Length Key Cycles | 2015-07-06 | Paper |
| How to use indistinguishability obfuscation | 2015-06-26 | Paper |
| Computing on authenticated data | 2015-05-12 | Paper |
| Relaxed Two-to-One Recoding Schemes | 2014-10-14 | Paper |
| Witness encryption and its applications | 2014-08-07 | Paper |
| Low Overhead Broadcast Encryption from Multilinear Maps | 2014-08-07 | Paper |
| Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation | 2014-05-27 | Paper |
| Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions | 2014-03-28 | Paper |
| Online/Offline Attribute-Based Encryption | 2014-03-25 | Paper |
| Constrained Pseudorandom Functions and Their Applications | 2013-12-10 | Paper |
| Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys | 2013-09-17 | Paper |
| Attribute-Based Encryption for Circuits from Multilinear Maps | 2013-09-17 | Paper |
| Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based | 2013-09-02 | Paper |
| Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures | 2013-09-02 | Paper |
| Compact proofs of retrievability | 2013-08-01 | Paper |
| Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles | 2013-06-27 | Paper |
| Predicate encryption supporting disjunctions, polynomial equations, and inner products | 2013-06-27 | Paper |
| Functional Encryption: Origins and Recent Developments | 2013-04-19 | Paper |
| Attribute-Based Encryption with Fast Decryption | 2013-04-19 | Paper |
| Dual Form Signatures: An Approach for Proving Security from Static Assumptions | 2013-03-19 | Paper |
| The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions | 2013-03-18 | Paper |
| New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques | 2012-09-25 | Paper |
| Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption | 2012-09-25 | Paper |
| Functional Encryption for Regular Languages | 2012-09-25 | Paper |
| Identity-Based (Lossy) Trapdoor Functions and Applications | 2012-06-29 | Paper |
| Standard Security Does Not Imply Security against Selective-Opening | 2012-06-29 | Paper |
| Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security | 2012-06-29 | Paper |
| Computing on Authenticated Data | 2012-06-15 | Paper |
| Lossy Trapdoor Functions and Their Applications | 2012-03-15 | Paper |
| Bi-Deniable Public-Key Encryption | 2011-08-12 | Paper |
| Unbounded HIBE and Attribute-Based Encryption | 2011-05-27 | Paper |
| Decentralizing Attribute-Based Encryption | 2011-05-27 | Paper |
| Achieving Leakage Resilience through Dual System Encryption | 2011-05-19 | Paper |
| Identity-Based Encryption Secure against Selective Opening Attack | 2011-05-19 | Paper |
| Functional Encryption: Definitions and Challenges | 2011-05-19 | Paper |
| Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization | 2011-03-15 | Paper |
| Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions | 2010-07-06 | Paper |
| Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption | 2010-06-01 | Paper |
| Constructing Verifiable Random Functions with Large Input Spaces | 2010-06-01 | Paper |
| New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts | 2010-02-24 | Paper |
| Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions | 2009-10-20 | Paper |
| Short and Stateless Signatures from the RSA Assumption | 2009-10-20 | Paper |
| Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) | 2009-05-12 | Paper |
| Realizing Hash-and-Sign Signatures under Standard Assumptions | 2009-05-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3615885 | 2009-03-24 | Paper |
| Signing a Linear Subspace: Signature Schemes for Network Coding | 2009-03-24 | Paper |
| Predicate Privacy in Encryption Systems | 2009-03-03 | Paper |
| A Framework for Efficient and Composable Oblivious Transfer | 2009-02-10 | Paper |
| Compact Proofs of Retrievability | 2009-02-10 | Paper |
| Lossy trapdoor functions and their applications | 2009-01-05 | Paper |
| Privacy in Encrypted Content Distribution Using Private Broadcast Encryption | 2008-09-09 | Paper |
| Delegating Capabilities in Predicate Encryption Systems | 2008-08-19 | Paper |
| Efficient Identity-Based Encryption Without Random Oracles | 2008-05-06 | Paper |
| Fuzzy Identity-Based Encryption | 2008-05-06 | Paper |
| Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products | 2008-04-15 | Paper |
| Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys | 2008-03-17 | Paper |
| Compact Group Signatures Without Random Oracles | 2007-09-24 | Paper |
| Sequential Aggregate Signatures and Multisignatures Without Random Oracles | 2007-09-24 | Paper |
| Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys | 2007-09-24 | Paper |
| Full-Domain Subgroup Hiding and Constant-Size Group Signatures | 2007-09-04 | Paper |
| Efficient Ring Signatures Without Random Oracles | 2007-09-04 | Paper |
| Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) | 2007-09-04 | Paper |
| Conjunctive, Subset, and Range Queries on Encrypted Data | 2007-08-30 | Paper |
| Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |