| Publication | Date of Publication | Type |
|---|
| Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting | 2024-03-28 | Paper |
| Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework | 2023-06-28 | Paper |
| Key-oblivious encryption from isogenies with application to accountable tracing signatures | 2023-05-12 | Paper |
| Short attribute-based signatures for arbitrary Turing machines from standard assumptions | 2023-04-28 | Paper |
| Fully secure unbounded zero inner product encryption with short ciphertexts and keys | 2023-04-13 | Paper |
| Identification scheme and forward-secure signature in identity-based setting from isogenies | 2023-04-13 | Paper |
| Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF | 2023-04-13 | Paper |
| CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption | 2023-04-13 | Paper |
| Chosen-Ciphertext Secure Multi-identity and Multi-attribute Pure FHE | 2023-03-22 | Paper |
| Semi-adaptively secure offline witness encryption from puncturable witness PRF | 2023-03-21 | Paper |
| Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature Compression | 2022-11-09 | Paper |
| Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption | 2022-10-14 | Paper |
| Attribute-based access control for inner product functional encryption from LWE | 2022-06-15 | Paper |
| Group signature from lattices preserving forward security in dynamic setting | 2020-11-07 | Paper |
| Secure key encapsulation mechanism with compact ciphertext and public key from generalized Srivastava code | 2020-07-08 | Paper |
| Offline witness encryption from witness PRF and randomized encoding in CRS model | 2020-05-27 | Paper |
| Bandwidth-efficient attribute-based key-insulated signatures with message recovery | 2020-01-06 | Paper |
| Efficient adaptively secure Public-Key Trace and revoke from subset cover using Déjà Q framework | 2019-10-31 | Paper |
| Construction for a nominative signature scheme from lattice with enhanced security | 2019-10-14 | Paper |
| Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation | 2019-08-20 | Paper |
| Fully secure online/offline predicate and attribute-based encryption | 2018-12-07 | Paper |
| Provable secure constructions for broadcast encryption with personalized messages | 2018-11-07 | Paper |
| How to meet big data when private set intersection realizes constant communication complexity | 2018-10-26 | Paper |
| Secure and efficient private set intersection cardinality using Bloom filter | 2018-10-18 | Paper |
| General circuit realizing compact revocable attribute-based encryption from multilinear maps | 2018-10-18 | Paper |
| Recipient revocable broadcast encryption schemes without random oracles | 2018-06-15 | Paper |
| Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation | 2017-06-13 | Paper |
| Adaptively Secure Broadcast Encryption with Dealership | 2017-05-19 | Paper |
| New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness | 2017-05-19 | Paper |
| Provably Secure Fair Mutual Private Set Intersection Cardinality Utilizing Bloom Filter | 2017-05-05 | Paper |
| Computational friendly attribute-based encryptions with short ciphertext | 2017-02-27 | Paper |
| Strongly full-hiding inner product encryption | 2017-02-22 | Paper |
| Secure and Efficient Construction of Broadcast Encryption with Dealership | 2017-01-06 | Paper |
| Efficient Adaptive Oblivious Transfer Without q-type Assumptions in UC Framework | 2016-12-19 | Paper |
| Attribute Based Key-Insulated Signatures with Message Recovery | 2016-12-19 | Paper |
| Attribute-based key-insulated signature for boolean formula | 2016-07-19 | Paper |
| Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order | 2016-06-22 | Paper |
| Functional Encryption for Inner Product with Full Function Privacy | 2016-04-13 | Paper |
| Functional Signcryption: Notion, Construction, and Applications | 2016-01-27 | Paper |
| Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries | 2016-01-27 | Paper |
| Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps | 2016-01-12 | Paper |
| Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control | 2015-11-25 | Paper |
| Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups | 2015-11-03 | Paper |
| A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function | 2015-09-11 | Paper |
| Issuer-Free Adaptive Oblivious Transfer with Access Policy | 2015-09-11 | Paper |
| Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext | 2014-09-29 | Paper |
| Unconditionally-secure key pre-distribution for triangular grid based wireless sensor network | 2014-08-05 | Paper |
| Key pre-distribution in a non-uniform rectangular grid for wireless sensor networks | 2014-08-05 | Paper |
| Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption | 2014-07-24 | Paper |
| Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model | 2014-07-24 | Paper |
| Expressive Attribute Based Signcryption with Constant-Size Ciphertext | 2014-06-24 | Paper |
| Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network | 2014-03-11 | Paper |
| Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext | 2013-10-23 | Paper |
| Secure and Efficient Group Key Agreements for Cluster Based Networks | 2009-05-12 | Paper |
| Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains | 2009-03-10 | Paper |
| Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting | 2009-02-24 | Paper |
| Progress in Cryptology - INDOCRYPT 2003 | 2007-11-29 | Paper |
| Information Security | 2006-10-20 | Paper |
| Information Security and Privacy | 2006-06-22 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |