| year | title | booktitle | pages |
|---|
| 1 | 2012 | Dual Form Signatures: An Approach for Proving Security from Static Assumptions | asiacrypt | 25-42 |
| 2 | 2012 | Computing on Authenticated Data | tcc | 1-20 |
| 3 | 2012 | Identity-Based (Lossy) Trapdoor Functions and Applications | eurocrypt | 228-245 |
| 4 | 2012 | Standard Security Does Not Imply Security against Selective-Opening | eurocrypt | 645-662 |
| 5 | 2012 | Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security | eurocrypt | 663-681 |
| 6 | 2012 | Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption | crypto | 199-217 |
| 7 | 2012 | Functional Encryption for Regular Languages | crypto | 218-235 |
| 8 | 2012 | New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques | crypto | 180-198 |
| 9 | 2011 | Bi-Deniable Public-Key Encryption | crypto | 521 |
| 10 | 2011 | Unbounded HIBE and Attribute-Based Encryption | eurocrypt | 547 |
| 11 | 2011 | Decentralizing Attribute-Based Encryption | eurocrypt | 568 |
| 12 | 2011 | Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization | pkc | 53 |
| 13 | 2011 | Achieving Leakage Resilience Through Dual System Encryption | tcc | 70 |
| 14 | 2011 | Identity-Based Encryption Secure Against Selective Opening Attack | tcc | 235 |
| 15 | 2011 | Functional Encryption: Definitions and Challenges | tcc | 253 |
| 16 | 2010 | On the Insecurity of Parallel Repetition for Leakage Resilience | eprint | online |
| 17 | 2010 | Identity-Based Encryption Secure under Selective Opening Attack | eprint | online |
| 18 | 2010 | Achieving Leakage Resilience Through Dual System Encryption | eprint | online |
| 19 | 2010 | New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts | tcc | 455-479 |
| 20 | 2010 | Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption | eurocrypt | 62-91 |
| 21 | 2010 | Constructing Verifiable Random Functions with Large Input Spaces | eurocrypt | 656-672 |
| 22 | 2010 | Decentralizing Attribute-Based Encryption | eprint | online |
| 23 | 2010 | Constructing Verifiable Random Functions with Large Input Spaces | eprint | online |
| 24 | 2010 | Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption | eprint | online |
| 25 | 2009 | Signing a Linear Subspace: Signature Schemes for Network Coding | pkc | 68-87 |
| 26 | 2009 | Realizing Hash-and-Sign Signatures under Standard Assumptions | eprint | online |
| 27 | 2009 | Short and Stateless Signatures from the RSA Assumption | crypto | 654-670 |
| 28 | 2009 | Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions | crypto | 619-636 |
| 29 | 2009 | Predicate Privacy in Encryption Systems | tcc | 457-473 |
| 30 | 2009 | Realizing Hash-and-Sign Signatures under Standard Assumptions | eurocrypt | 333-350 |
| 31 | 2009 | Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) | eurocrypt | 171-188 |
| 32 | 2008 | Adaptive Security in Broadcast Encryption Systems | eprint | online |
| 33 | 2008 | Delegating Capabilities in Predicate Encryption Systems | eprint | online |
| 34 | 2008 | Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization | eprint | online |
| 35 | 2008 | A Framework for Efficient and Composable Oblivious Transfer | crypto | 554-571 |
| 36 | 2008 | Revocation Systems with Very Small Private Keys | eprint | online |
| 37 | 2008 | Compact Signatures for Network Coding | eprint | online |
| 38 | 2008 | Compact Proofs of Retrievability | eprint | online |
| 39 | 2008 | Compact Proofs of Retrievability | asiacrypt | 90-107 |
| 40 | 2008 | Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products | eurocrypt | 146-162 |
| 41 | 2008 | Signing a Linear Subspace: Signature Schemes for Network Coding | eprint | online |
| 42 | 2007 | Attribute-Based Encryption with Non-Monotonic Access Structures | eprint | online |
| 43 | 2007 | Conjunctive, Subset, and Range Queries on Encrypted Data | tcc | 535-554 |
| 44 | 2007 | A Framework for Efficient and Composable Oblivious Transfer | eprint | online |
| 45 | 2007 | Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products | eprint | online |
| 46 | 2007 | Efficient Ring Signatures Without Random Oracles | pkc | 166-180 |
| 47 | 2007 | Full-Domain Subgroup Hiding and Constant-Size Group Signatures | pkc  | 1-15 |
| 48 | 2007 | Lossy Trapdoor Functions and Their Applications | eprint | online |
| 49 | 2006 | Conjunctive, Subset, and Range Queries on Encrypted Data | eprint | online |
| 50 | 2006 | Efficient Ring Signatures without Random Oracles | eprint | online |
| 51 | 2006 | Sequential Aggregate Signatures and Multisignatures Without Random Oracles | eurocrypt | online |
| 52 | 2006 | Forward-Secure Signatures with Untrusted Update | eprint | online |
| 53 | 2006 | A Fully Collusion Resistant Broadcast, Trace, and Revoke System | eprint | online |
| 54 | 2006 | Fully Collusion Resistant Traitor Tracing | eprint | online |
| 55 | 2006 | Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data | eprint | online |
| 56 | 2006 | Strongly Unforgeable Signatures Based on Computational Diffie-Hellman | pkc | online |
| 57 | 2006 | Compact Group Signatures Without Random Oracles | eurocrypt | online |
| 58 | 2006 | Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) | eprint | online |
| 59 | 2006 | Sequential Aggregate Signatures and Multisignatures without Random Oracles | eprint | online |
| 60 | 2006 | Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) | crypto | online |
| 61 | 2006 | Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys | eurocrypt | online |
| 62 | 2005 | Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys | crypto | online |
| 63 | 2005 | Efficient Identity-Based Encryption Without Random Oracles | eurocrypt | online |
| 64 | 2005 | Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys | eprint | online |
| 65 | 2005 | Direct Chosen Ciphertext Security from Identity-Based Techniques | eprint | online |
| 66 | 2005 | Compact Group Signatures Without Random Oracles | eprint | online |
| 67 | 2005 | Fuzzy Identity-Based Encryption | eurocrypt | online |
| 68 | 2004 | Fuzzy Identity Based Encryption | eprint | online |
| 69 | 2004 | Efficient Identity-Based Encryption Without Random Oracles | eprint | online |