selected publications
selected publications in reversed chronological order
-
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection
In Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings (Shweta Agrawal, and Dongdai Lin, eds), Springer, Lecture Notes in Computer Science, vol. 13792, pp. 371–402 (2022).
open access doi -
Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND
SIAM J. Discret. Math. 35, 1, pp. 465-484 (2021).
open access doi -
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
Algorithmica 83, 1, pp. 72-115 (2021).
open access doi -
Private Multiplication over Finite Fields
In Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III (Jonathan Katz, and Hovav Shacham, eds), Springer, Lecture Notes in Computer Science, vol. 10403, pp. 397–426 (2017).
open access doi video -
Randomness Complexity of Private Circuits for Multiplication
In Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II (Marc Fischlin, and Jean-Sébastien Coron, eds), Springer, Lecture Notes in Computer Science, vol. 9666, pp. 616–648 (2016).
open access doi video -
Security analysis of pseudo-random number generators with input: /dev/random is not robust
In 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS’13, Berlin, Germany, November 4-8, 2013 (Ahmad-Reza Sadeghi, Virgil D. Gligor, and Moti Yung, eds), ACM, pp. 647–658 (2013).
open access doi -
New Techniques for SPHFs and Efficient One-Round PAKE Protocols
In Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I (Ran Canetti, and Juan A. Garay, eds), Springer, Lecture Notes in Computer Science, vol. 8042, pp. 449–475 (2013).
open access doi -
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions
In Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings (Ronald Cramer, ed), Springer, Lecture Notes in Computer Science, vol. 7194, pp. 94–111 (2012).
open access doi -
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
In Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings (Dong Hoon Lee, and Xiaoyun Wang, eds), Springer, Lecture Notes in Computer Science, vol. 7073, pp. 70–88 (2011).
open access doi -
Signatures on Randomizable Ciphertexts
In Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings (Dario Catalano, Nelly Fazio, Rosario Gennaro, and Antonio Nicolosi, eds), Springer, Lecture Notes in Computer Science, vol. 6571, pp. 403–422 (2011).
open access doi -
Multi-use unidirectional proxy re-signatures
In Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008 (Peng Ning, Paul F. Syverson, and Somesh Jha, eds), ACM, pp. 511–520 (2008).
open access doi -
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
In Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings (Ronald Cramer, ed), Springer, Lecture Notes in Computer Science, vol. 4939, pp. 360–379 (2008).
open access doi
winner of PKC Test-of-Time Award -
New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures
In Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II (Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener, eds), Springer, Lecture Notes in Computer Science, vol. 4052, pp. 58–69 (2006).
open access doi -
Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
In Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings (Bimal K. Roy, ed), Springer, Lecture Notes in Computer Science, vol. 3788, pp. 1–20 (2005).
open access doi
winner of the Best Paper Award
winner of IACR Test-of-Time Award