Identity-based encryption from the Weil pairing ,
Non-interactive zero-knowledge and its applications (extended abstract), 20th Annual ACM Symposium on Theory of Computing, pp.103-112, 1988. ,
Adaptive proofs of knowledge in the random oracle model, Public-Key Cryptography -PKC 2015 -18th IACR International Conference on Practice and Theory in Public-Key Cryptography Proceedings, pp.629-649, 2015. ,
The Uber-Assumption Family, PAIRING 2008: 2nd International Conference on Pairing-based Cryptography, pp.39-56, 2008. ,
DOI : 10.1007/978-3-540-85538-5_3
Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993. ,
DOI : 10.1145/168588.168596
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
Multiple non-interactive zero knowledge proofs based on a single random string (extended abstract), 31st Annual Symposium on Foundations of Computer Science, pp.308-317, 1990. ,
How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Advances in Cryptology ? CRYPTO'86, pp.186-194, 1987. ,
DOI : 10.1007/3-540-47721-7_12
Multi-input Functional Encryption, Advances in Cryptology -EUROCRYPT 2014 -33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings, pp.578-602, 2014. ,
DOI : 10.1007/978-3-642-55220-5_32
Two-Round Secure MPC from Indistinguishability Obfuscation, Theory of Cryptography -11th Theory of Cryptography Conference. Proceedings, pp.74-94, 2014. ,
DOI : 10.1007/978-3-642-54242-8_4
Foundations of Cryptography: Basic Applications, 2004. ,
Anonymous voting by two-round public discussion, IET Information Security, vol.4, issue.2, pp.62-67, 2010. ,
DOI : 10.1049/iet-ifs.2008.0127
Simulation-Based Secure Functional Encryption in the Random Oracle Model, Progress in Cryptology -LATINCRYPT 2015 -4th International Conference on Cryptology and Information Security in Latin America Proceedings, pp.21-39, 2015. ,
DOI : 10.1007/978-3-319-22174-8_2
A one round protocol for tripartite Diffie-Hellman, Journal of Cryptology, vol.17, issue.4, pp.263-276, 2004. ,
A fair and robust voting system by broadcast, 5th International Conference on Electronic Voting 2012 Co-organized by the Council of Europe, Gesellschaft für Informatik and E-Voting.CC, pp.285-299, 2012. ,
Input-indistinguishable computation, 47th Annual Symposium on Foundations of Computer Science, pp.367-378, 2006. ,
Near-optimal time-space tradeoff for element distinctness, 29th Annual Symposium on Foundations of Computer Science, pp.91-97, 1988. ,