| Publication | Date of Publication | Type |
|---|
| Maliciously circuit-private multi-key FHE and MPC based on LWE | 2023-04-28 | Paper |
| Achieving pairing-free aggregate signatures using pre-communication between signers | 2023-03-21 | Paper |
| Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition | 2022-12-22 | Paper |
| On Private Information Retrieval Supporting Range Queries | 2022-12-22 | Paper |
| Generic constructions for fully secure revocable attribute-based encryption | 2022-08-25 | Paper |
| Constant-round client-aided secure comparison protocol | 2022-08-25 | Paper |
| Generic transformation from broadcast encryption to round-optimal deniable ring authentication | 2022-03-21 | Paper |
| Impossibility on tamper-resilient cryptography with uniqueness properties | 2021-12-21 | Paper |
| Generic hardness of inversion on ring and its relation to self-bilinear map | 2020-04-21 | Paper |
| Improved security evaluation techniques for imperfect randomness from arbitrary distributions | 2020-01-28 | Paper |
| Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions | 2019-10-18 | Paper |
| Attribute-based signatures for unbounded languages from standard assumptions | 2019-01-23 | Paper |
| A privacy-enhanced access log management mechanism in SSO systems from nominative signatures | 2018-11-26 | Paper |
| Token-based multi-input functional encryption | 2018-11-07 | Paper |
| Formal treatment of verifiable privacy-preserving data-aggregation protocols | 2018-11-07 | Paper |
| Group signature with deniability: how to disavow a signature | 2018-10-26 | Paper |
| On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data | 2018-10-24 | Paper |
| Secure multi-party computation using polarizing cards | 2018-10-24 | Paper |
| Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions | 2018-10-17 | Paper |
| Fully anonymous group signature with verifier-local revocation | 2018-10-17 | Paper |
| Memory lower bounds of reductions revisited | 2018-07-09 | Paper |
| Chosen ciphertext secure keyed-homomorphic public-key cryptosystems | 2018-07-03 | Paper |
| Fast lattice basis reduction suitable for massive parallelization and its application to the shortest vector problem | 2018-05-16 | Paper |
| A public-key encryption scheme based on non-linear indeterminate equations | 2018-04-26 | Paper |
| Secure grouping protocol using a deck of cards | 2018-03-16 | Paper |
| Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications | 2018-01-05 | Paper |
| Towards user-friendly cryptography | 2017-10-23 | Paper |
| On the Security of Pseudorandomized Information-Theoretically Secure Schemes | 2017-06-08 | Paper |
| How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones | 2017-01-06 | Paper |
| Size-Hiding Computation for Multiple Parties | 2017-01-06 | Paper |
| Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness | 2017-01-06 | Paper |
| New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security | 2016-12-19 | Paper |
| Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli | 2016-10-27 | Paper |
| Attribute-Based Encryption for Range Attributes | 2016-10-21 | Paper |
| Signatures Resilient to Uninvertible Leakage | 2016-10-21 | Paper |
| Fuzzy Signatures: Relaxing Requirements and a New Construction | 2016-10-04 | Paper |
| Attribute Based Encryption with Direct Efficiency Tradeoff | 2016-10-04 | Paper |
| Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information | 2016-09-02 | Paper |
| An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption | 2016-06-10 | Paper |
| A Framework for Identity-Based Encryption with Almost Tight Security | 2016-06-10 | Paper |
| Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs | 2016-06-10 | Paper |
| On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks | 2016-05-19 | Paper |
| Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency | 2016-05-02 | Paper |
| Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security | 2016-04-13 | Paper |
| On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions | 2016-04-13 | Paper |
| Attribute-Based Signatures for Circuits from Bilinear Map | 2016-04-13 | Paper |
| A Signature Scheme with a Fuzzy Private Key | 2016-03-10 | Paper |
| Completeness of Single-Bit Projection-KDM Security for Public Key Encryption | 2016-03-02 | Paper |
| Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption | 2016-03-02 | Paper |
| Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model | 2016-01-27 | Paper |
| Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards | 2016-01-27 | Paper |
| Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions | 2015-10-20 | Paper |
| Compact Public Key Encryption with Minimum Ideal Property of Hash Functions | 2015-09-29 | Paper |
| A Short Fail-Stop Signature Scheme from Factoring | 2015-09-29 | Paper |
| Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks | 2015-09-11 | Paper |
| Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms | 2015-07-06 | Paper |
| More Constructions of Re-splittable Threshold Public Key Encryption | 2015-05-27 | Paper |
| Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues | 2014-10-14 | Paper |
| Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption | 2014-09-15 | Paper |
| Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption | 2014-08-21 | Paper |
| Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications | 2014-08-07 | Paper |
| All-but-One Dual Projective Hashing and Its Applications | 2014-07-07 | Paper |
| A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List | 2014-07-07 | Paper |
| Chosen Ciphertext Security via UCE | 2014-03-25 | Paper |
| A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption | 2014-03-25 | Paper |
| Chosen Ciphertext Security via Point Obfuscation | 2014-02-18 | Paper |
| Ciphertext Policy Multi-dimensional Range Encryption | 2013-06-04 | Paper |
| Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption | 2013-04-19 | Paper |
| Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited | 2013-04-19 | Paper |
| Group Signatures with Message-Dependent Opening | 2013-04-04 | Paper |
| Time-Specific Encryption from Forward-Secure Encryption | 2012-09-25 | Paper |
| On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups | 2012-09-25 | Paper |
| Space Efficient Signature Schemes from the RSA Assumption | 2012-07-20 | Paper |
| Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication | 2012-07-20 | Paper |
| Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms | 2012-07-20 | Paper |
| Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve | 2012-07-20 | Paper |
| On the Security of Dynamic Group Signatures: Preventing Signature Hijacking | 2012-07-20 | Paper |
| Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More | 2012-06-08 | Paper |
| Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption | 2012-06-08 | Paper |
| Towards Restricting Plaintext Space in Public Key Encryption | 2011-11-10 | Paper |
| Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks | 2011-06-28 | Paper |
| Applications of Signcryption | 2011-05-18 | Paper |
| Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption | 2011-03-15 | Paper |
| On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010 | 2011-03-15 | Paper |
| Efficient Broadcast Encryption with Personalized Messages | 2010-10-12 | Paper |
| Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption | 2010-10-12 | Paper |
| On the Security of Pseudorandomized Information-Theoretically Secure Schemes | 2010-09-29 | Paper |
| An Improvement of Pseudorandomization against Unbounded Attack Algorithms – The Case of Fingerprint Codes | 2010-09-29 | Paper |
| Generic Constructions of Parallel Key-Insulated Encryption | 2010-09-10 | Paper |
| Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness | 2010-03-16 | Paper |
| Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations | 2010-02-09 | Paper |
| The Role of Arbiters in Asymmetric Authentication Schemes | 2010-02-09 | Paper |
| Unconditionally Secure Chaffing-and-Winnowing for Multiple Use | 2009-12-03 | Paper |
| On the Theoretical Gap between Group Signatures with and without Unlinkability | 2009-07-07 | Paper |
| Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
| An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations | 2009-04-29 | Paper |
| Introduction to the Special Issue on Information Theoretic Security | 2009-02-24 | Paper |
| Orthogonality between Key Privacy and Data Privacy, Revisited | 2009-02-10 | Paper |
| Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption | 2009-02-10 | Paper |
| A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low | 2009-01-22 | Paper |
| Efficient Identity-Based Encryption with Tight Security Reduction | 2009-01-09 | Paper |
| Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk) | 2009-01-09 | Paper |
| Relations Among Notions of Security for Identity Based Encryption Schemes | 2008-09-18 | Paper |
| An Efficient Strong Key-Insulated Signature Scheme and Its Application | 2008-06-12 | Paper |
| A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function | 2008-06-10 | Paper |
| Formal Security Treatments for Signatures from Identity-Based Encryption | 2008-06-10 | Paper |
| Bounded CCA2-Secure Encryption | 2008-05-15 | Paper |
| Trade-Off Traitor Tracing | 2008-04-11 | Paper |
| Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application | 2008-03-18 | Paper |
| Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT | 2007-09-07 | Paper |
| Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service | 2007-09-07 | Paper |
| Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
| Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2007-02-12 | Paper |
| Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2007-02-12 | Paper |
| Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2007-02-12 | Paper |
| Information Security and Privacy | 2005-09-07 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4737262 | 2004-08-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3043927 | 2004-08-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4472418 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450768 | 2004-02-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4428331 | 2003-09-15 | Paper |
| Unconditionally Secure Anonymous Encryption and Group Authentication | 2003-07-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4408444 | 2003-06-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724598 | 2002-11-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724458 | 2002-09-01 | Paper |
| A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks | 2002-08-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4945391 | 2002-04-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2707409 | 2002-03-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4502513 | 2002-01-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4945044 | 2000-09-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3839179 | 1998-08-13 | Paper |