Wildcarded Identity-Based Encryption.
J. Cryptol., 2011
Signcryption Schemes Based on the RSA Problem.
Proceedings of the Practical Signcryption, 2010
Obfuscation for Cryptographic Purposes.
J. Cryptol., 2010
Generic Constructions of Identity-Based and Certificateless KEMs.
J. Cryptol., 2008
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
J. Cryptol., 2008
Identity-Based Traitor Tracing.
Proceedings of the Public Key Cryptography, 2007
Identity-Based Encryption Gone Wild.
IACR Cryptol. ePrint Arch., 2006
An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction.
IACR Cryptol. ePrint Arch., 2005
Signcryption with Non-interactive Non-repudiation.
Des. Codes Cryptogr., 2005
A General Construction for Simultaneous Signing and Encrypting.
Proceedings of the Cryptography and Coding, 2005
The Physically Observable Security of Signature Schemes.
Proceedings of the Cryptography and Coding, 2005
On the security of signature schemes and signcryption schemes.
PhD thesis, 2004
Secure Computation of the Mean and Related Statistics.
IACR Cryptol. ePrint Arch., 2004
Improved Identity-Based Signcryption.
IACR Cryptol. ePrint Arch., 2004
Escrow-Free Encryption Supporting Cryptographic Workflow.
IACR Cryptol. ePrint Arch., 2004
A General Construction of IND-CCA2 Secure Public Key Encryption.
Proceedings of the Cryptography and Coding, 2003
Two Birds One Stone: Signcryption Using RSA.
Proceedings of the Topics in Cryptology, 2003
Public key signatures in the multi-user setting.
Inf. Process. Lett., 2002
Identity-Based Signcryption.
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Selected Areas in Cryptography, 2002
Flaws in Applying Proof Methodologies to Signature Schemes.
Proceedings of the Advances in Cryptology, 2002