| Publication | Date of Publication | Type |
|---|
| Succinct vector, polynomial, and functional commitments from lattices | 2023-12-12 | Paper |
| Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin | 2023-12-12 | Paper |
| One-One Constrained Pseudorandom Functions. | 2023-11-02 | Paper |
| Witness encryption and null-iO from evasive LWE | 2023-08-25 | Paper |
| Multi-authority ABE from lattices without random oracles | 2023-08-14 | Paper |
| Succinct LWE sampling, random polynomials, and obfuscation | 2023-04-13 | Paper |
| ABE for DFA from LWE against bounded collusions, revisited | 2023-04-13 | Paper |
| Time-space tradeoffs and short collisions in Merkle-Damgård hash functions | 2022-11-09 | Paper |
| Functional encryption for attribute-weighted sums from \(k\)-Lin | 2022-11-09 | Paper |
| Optimal broadcast encryption and CP-ABE from evasive lattice assumptions | 2022-08-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5090982 | 2022-07-21 | Paper |
| Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin | 2022-05-18 | Paper |
| Information-theoretic 2-round MPC without round collapsing: adaptive security, and more | 2022-03-23 | Paper |
| Candidate obfuscation via oblivious LWE sampling | 2021-12-08 | Paper |
| Adaptively secure ABE for DFA from \(k\)-Lin and more | 2021-12-01 | Paper |
| New constructions of statistical NIZKs: dual-mode DV-NIZKs and more | 2021-12-01 | Paper |
| Functional encryption for quadratic functions from \(k\)-lin, revisited | 2021-12-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5140842 | 2020-12-17 | Paper |
| Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin | 2020-06-15 | Paper |
| Matrix PRFs: constructions, attacks, and applications to obfuscation | 2020-04-30 | Paper |
| ABE for DFA from \(k\)-lin | 2020-03-09 | Paper |
| Compact adaptively secure ABE for \(\mathrm{NC}^1\) from \(k\)-lin | 2020-02-04 | Paper |
| Obfuscating simple functionalities from knowledge assumptions | 2020-01-28 | Paper |
| Improved inner-product encryption with adaptive security and full attribute-hiding | 2019-01-23 | Paper |
| Traitor-tracing from LWE made simple and attribute-based | 2018-12-06 | Paper |
| Tight adaptively secure broadcast encryption with short ciphertexts and keys | 2018-10-17 | Paper |
| On the Inner Product Predicate and a Generalization of Matching Vector Families | 2018-10-04 | Paper |
| GGH15 beyond permutation branching programs: proofs, attacks, and candidates | 2018-09-26 | Paper |
| Attribute-Based Encryption for Circuits | 2018-08-02 | Paper |
| Unbounded ABE via bilinear entropy expansion, revisited | 2018-07-09 | Paper |
| Towards breaking the exponential barrier for general secret sharing | 2018-07-09 | Paper |
| A black-box construction of non-malleable encryption from semantically secure encryption | 2018-04-26 | Paper |
| Improved, black-box, non-malleable encryption from semantic security | 2018-04-06 | Paper |
| Attribute-hiding predicate encryption in bilinear groups, revisited | 2018-01-19 | Paper |
| Private constrained PRFs (and more) from LWE | 2018-01-19 | Paper |
| Conditional disclosure of secrets via non-linear reconstruction | 2017-11-03 | Paper |
| Multi-input Inner-Product Functional Encryption from Pairings | 2017-06-13 | Paper |
| Targeted Homomorphic Attribute-Based Encryption | 2016-12-22 | Paper |
| FHE Circuit Privacy Almost for Free | 2016-10-27 | Paper |
| Leakage-resilient cryptography from minimal assumptions | 2016-09-21 | Paper |
| Tightly CCA-Secure Encryption Without Pairings | 2016-09-09 | Paper |
| Obfuscating Conjunctions under Entropic Ring LWE | 2016-04-15 | Paper |
| KDM-Security via Homomorphic Smooth Projective Hashing | 2016-04-13 | Paper |
| Déjà Q: Encore! Un Petit IBE | 2016-04-08 | Paper |
| Security Against Related Randomness Attacks via Reconstructive Extractors | 2016-01-12 | Paper |
| Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting | 2015-12-10 | Paper |
| Structure-Preserving Signatures from Standard Assumptions, Revisited | 2015-12-10 | Paper |
| Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption | 2015-12-10 | Paper |
| Predicate Encryption for Circuits from LWE | 2015-12-10 | Paper |
| Quasi-Adaptive NIZK for Linear Subspaces Revisited | 2015-09-30 | Paper |
| Improved Dual System ABE in Prime-Order Groups via Predicate Encodings | 2015-09-30 | Paper |
| Predicate Encryption for Multi-dimensional Range Queries from Lattices | 2015-08-27 | Paper |
| Selfish caching in distributed systems | 2015-08-03 | Paper |
| Inaccessible entropy | 2015-02-04 | Paper |
| Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula | 2014-10-14 | Paper |
| Shorter identity-based encryption via asymmetric pairings | 2014-09-04 | Paper |
| Attribute-based encryption for circuits | 2014-08-07 | Paper |
| Doubly spatial encryption from DBDH | 2014-07-07 | Paper |
| Partial Garbling Schemes and Their Applications | 2014-07-01 | Paper |
| On the Complexity of UC Commitments | 2014-05-27 | Paper |
| Dual System Encryption via Predicate Encodings | 2014-02-18 | Paper |
| Fully, (Almost) Tightly Secure IBE and Dual System Groups | 2013-09-17 | Paper |
| Functional Encryption: New Perspectives and Lower Bounds | 2013-09-17 | Paper |
| On the Security of the TLS Protocol: A Systematic Analysis | 2013-09-02 | Paper |
| Leakage-Resilient Cryptography from Minimal Assumptions | 2013-05-31 | Paper |
| Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction | 2013-05-31 | Paper |
| Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS | 2013-04-19 | Paper |
| Shorter IBE and Signatures via Asymmetric Pairings | 2013-04-04 | Paper |
| Lossy trapdoor functions from homomorphic reproducible encryption | 2012-10-23 | Paper |
| Functional Encryption with Bounded Collusions via Multi-party Computation | 2012-09-25 | Paper |
| Public Key Encryption against Related Key Attacks | 2012-07-20 | Paper |
| Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices | 2012-07-20 | Paper |
| Efficient Password Authenticated Key Exchange via Oblivious Transfer | 2012-07-20 | Paper |
| Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More | 2012-06-29 | Paper |
| Threshold and Revocation Cryptosystems via Extractable Hash Proofs | 2011-05-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3002813 | 2011-05-24 | Paper |
| On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations | 2010-08-31 | Paper |
| Efficient Chosen-Ciphertext Security via Extractable Hash Proofs | 2010-08-24 | Paper |
| On obfuscating point functions | 2010-08-16 | Paper |
| Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks | 2010-06-01 | Paper |
| Universal One-Way Hash Functions via Inaccessible Entropy | 2010-06-01 | Paper |
| Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions | 2010-06-01 | Paper |
| Improved Non-committing Encryption with Applications to Adaptively Secure Protocols | 2009-12-15 | Paper |
| Zero Knowledge in the Random Oracle Model, Revisited | 2009-12-15 | Paper |
| Amplifying Collision Resistance: A Complexity-Theoretic Treatment | 2009-03-10 | Paper |
| Simple, Black-Box Constructions of Adaptively Secure Protocols | 2009-03-03 | Paper |
| Black-Box Constructions of Two-Party Protocols from One-Way Functions | 2009-03-03 | Paper |
| Optimal Cryptographic Hardness of Learning Monotone Functions | 2008-08-28 | Paper |
| Pebbling and Proofs of Work | 2008-03-17 | Paper |
| Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One | 2008-03-05 | Paper |
| Lower Bounds for Non-interactive Zero-Knowledge | 2007-08-30 | Paper |
| One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments | 2007-08-30 | Paper |
| Theory of Cryptography | 2007-02-12 | Paper |
| Automata, Languages and Programming | 2006-01-10 | Paper |
| Theory of Cryptography | 2005-12-07 | Paper |
| Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques | 2005-08-25 | Paper |