Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA.
Comput. J., 2024
O-Ring and K-Star: Efficient Multi-party Private Set Intersection.
Proceedings of the 33rd USENIX Security Symposium, 2024
Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA.
IACR Cryptol. ePrint Arch., 2023
DIDO: Data Provenance from Restricted TLS 1.3 Websites.
IACR Cryptol. ePrint Arch., 2023
Attribute-based Anonymous Credential: Optimization for Single-Use and Multi-Use.
IACR Cryptol. ePrint Arch., 2022
Multi-signatures for ECDSA and Its Applications in Blockchain.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022