| Publication | Date of Publication | Type |
|---|
| Multi-client oblivious RAM with poly-logarithmic communication | 2023-03-21 | Paper |
| Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE | 2022-11-09 | Paper |
| Non-malleable functions and their applications | 2022-04-04 | Paper |
| Access control encryption from group encryption | 2022-03-21 | Paper |
| Real Hidden Identity-Based Signatures | 2021-03-17 | Paper |
| Fast-to-finalize Nakamoto-like consensus | 2020-05-27 | Paper |
| Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog | 2020-01-28 | Paper |
| Structure-preserving certificateless encryption and its application | 2020-01-28 | Paper |
| Multi-key homomorphic signatures unforgeable under insider corruption | 2019-01-23 | Paper |
| Another look at anonymous communication. Security and modular constructions | 2017-10-23 | Paper |
| Privacy-Preserving Public Auditing for Secure Cloud Storage | 2017-07-12 | Paper |
| Secure Cloud Storage Meets with Secure Network Coding | 2017-05-16 | Paper |
| Towards Proofs of Ownership Beyond Bounded Leakage | 2017-01-06 | Paper |
| Combiners for Chosen-Ciphertext Security | 2016-09-02 | Paper |
| Cryptography for Parallel RAM from Indistinguishability Obfuscation | 2016-04-15 | Paper |
| Non-Malleable Functions and Their Applications | 2016-04-13 | Paper |
| Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model | 2016-01-27 | Paper |
| Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement | 2015-12-02 | Paper |
| Security of Direct Anonymous Authentication Using TPM 2.0 Signature | 2015-11-25 | Paper |
| Trapdoors for Ideal Lattices with Applications | 2015-11-25 | Paper |
| Practical (fully) distributed signatures provably secure in the standard model | 2015-07-24 | Paper |
| Post-challenge leakage in public-key encryption | 2015-02-24 | Paper |
| Escrowed Linkability of Ring Signatures and Its Applications | 2014-08-21 | Paper |
| All-but-One Dual Projective Hashing and Its Applications | 2014-07-07 | Paper |
| Practical Dual-Receiver Encryption | 2014-03-28 | Paper |
| Practical Distributed Signatures in the Standard Model | 2014-03-28 | Paper |
| PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation | 2013-10-23 | Paper |
| Towards Anonymous Ciphertext Indistinguishability with Identity Leakage | 2013-10-23 | Paper |
| Zero-knowledge argument for simultaneous discrete logarithms | 2012-11-21 | Paper |
| Identity-Based Encryption Resilient to Continual Auxiliary Leakage | 2012-06-29 | Paper |
| Dynamic Secure Cloud Storage with Provenance | 2012-06-08 | Paper |
| Efficient Secure Two-Party Exponentiation | 2011-02-11 | Paper |
| Non-interactive Confirmer Signatures | 2011-02-11 | Paper |
| Zero-Knowledge Argument for Simultaneous Discrete Logarithms | 2010-07-20 | Paper |
| Efficient Unidirectional Proxy Re-Encryption | 2010-05-04 | Paper |
| Real Traceable Signatures | 2009-12-09 | Paper |
| Conditional Proxy Broadcast Re-Encryption | 2009-06-25 | Paper |
| Identity Based Ring Signature: Why, How and What Next | 2009-04-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3615884 | 2009-03-24 | Paper |
| Removing Escrow from Identity-Based Encryption | 2009-03-24 | Paper |
| Security Mediated Certificateless Signatures | 2009-03-10 | Paper |
| Timed-Release Encryption Revisited | 2009-01-27 | Paper |
| General Certificateless Encryption and Timed-Release Encryption | 2008-11-20 | Paper |
| Proxy Re-signatures in the Standard Model | 2008-11-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3518418 | 2008-08-07 | Paper |
| Batch Pairing Delegation | 2008-07-25 | Paper |
| Strongly-Secure Identity-Based Key Agreement and Anonymous Extension | 2008-06-24 | Paper |
| Token-Controlled Public Key Encryption in the Standard Model | 2008-06-24 | Paper |
| Identity Based Threshold Ring Signature | 2008-03-17 | Paper |
| Short E-Cash | 2008-03-17 | Paper |
| Efficient Identity Based Ring Signature | 2007-09-24 | Paper |
| Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
| Information Security and Cryptology | 2006-11-14 | Paper |
| Information and Communications Security | 2006-10-24 | Paper |
| Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
| Information Security and Privacy | 2006-06-22 | Paper |
| Information Security and Privacy | 2006-06-22 | Paper |
| Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
| Forward-secure multisignature and blind signature schemes | 2005-11-04 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |