| Publication | Date of Publication | Type |
|---|
| Obfuscation of pseudo-deterministic quantum circuits | 2024-05-08 | Paper |
| Public key encryption with secure key leasing | 2024-01-16 | Paper |
| From the hardness of detecting superpositions to cryptography: quantum public key encryption and commitments | 2024-01-16 | Paper |
| Classically verifiable NIZK for QMA with preprocessing | 2023-08-21 | Paper |
| Bounded functional encryption for Turing machines: adaptive security from general assumptions | 2023-08-14 | Paper |
| NIZK from SNARGs | 2023-07-05 | Paper |
| Post-quantum simulatable extraction with minimal assumptions: black-box and constant-round | 2023-06-30 | Paper |
| Certified everlasting zero-knowledge proof for QMA | 2023-06-12 | Paper |
| Quantum commitments and signatures without one-way functions | 2023-06-12 | Paper |
| Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication | 2023-05-12 | Paper |
| Secure software leasing from standard assumptions | 2023-03-31 | Paper |
| Adaptively secure inner product encryption from LWE | 2023-03-29 | Paper |
| Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-wayness | 2023-03-21 | Paper |
| Adaptively secure constrained pseudorandom functions in the standard model | 2022-11-09 | Paper |
| A black-box approach to post-quantum zero-knowledge in constant rounds | 2022-03-31 | Paper |
| Classical verification of quantum computations with efficient verifier | 2022-03-23 | Paper |
| Round-optimal blind signatures in the plain model from classical and quantum standard assumptions | 2021-12-08 | Paper |
| Classical vs quantum random oracles | 2021-12-08 | Paper |
| Compact NIZKs from standard assumptions on bilinear maps | 2021-12-01 | Paper |
| NIZK from SNARG | 2021-12-01 | Paper |
| Compact designated verifier NIZKs from the CDH assumption without pairings | 2021-11-24 | Paper |
| Tighter security proofs for GPV-IBE in the quantum random oracle model | 2021-04-07 | Paper |
| Quantum random oracle model with auxiliary input | 2020-05-20 | Paper |
| Generic hardness of inversion on ring and its relation to self-bilinear map | 2020-04-21 | Paper |
| Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously | 2020-03-09 | Paper |
| Exploring constructions of compact NIZKs from various assumptions | 2020-03-09 | Paper |
| (Tightly) QCCA-secure key-encapsulation mechanism in the quantum random oracle model | 2020-02-25 | Paper |
| Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions | 2020-02-06 | Paper |
| Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio | 2020-01-28 | Paper |
| Adaptively single-key secure constrained PRFs for \(\text{NC}^1\) | 2020-01-28 | Paper |
| On the analytical solution for the Pütter-Bertalanffy growth equation | 2019-05-14 | Paper |
| Tighter security proofs for GPV-IBE in the quantum random oracle model | 2019-01-23 | Paper |
| Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups | 2018-09-26 | Paper |
| Tightly-secure key-encapsulation mechanism in the quantum random oracle model | 2018-07-17 | Paper |
| Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications | 2018-01-05 | Paper |
| Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli | 2016-10-27 | Paper |
| Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information | 2016-09-02 | Paper |
| A Short Fail-Stop Signature Scheme from Factoring | 2015-09-29 | Paper |
| Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues | 2014-10-14 | Paper |
| Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications | 2014-08-07 | Paper |