My Publications
You can find my list of publications also on dblp and GoogleScholar.
- 2025 | π | That's AmorE: Amortized Eο¬ciency for Pairing Delegation
- 2025 | π | Universally Composable Interactive and Ordered Multi-Signatures
- 2024 | π | Multi Designated Verifier Ring Signatures
- 2024 | π | Updatable Privacy-Preserving Blueprints
- 2024 | π | CaSCaDE: (Time-Based) Cryptography from Space Communications DElay
- 2024 | π | Progressive and Efficient Verification for Digital Signatures: Extensions and Experimental Results
- 2024 | π | Metadata Privacy Beyond Tunneling for Instant Messaging
- 2023 | π | PAPR: Publicly Auditable Privacy Revocation for Anonymous Credentials
- 2022 | π | Bifrost: Secure, Scalable and Efficient File Sharing System Using Dual Deduplication
- 2022 | π | Secure Cloud Storage with Joint Deduplication and Erasure Protection
- 2022 | π | CatNap: Practical and actively secure proximity testing with a napping party based on generic MPC techniques
- 2022 | π | Outsourcing MPC Precomputation for Location Privacy
- 2022 | π π¦ | Progressive And Efficient Verification For Digital Signatures
- 2022 | π π¦ | Count Me In! Extendability for Threshold Ring Signatures
- 2021 | π π¦ | LOVE a Pairing
- 2021 | π | Yggdrasil: Privacy-aware Dual Deduplication in Multi Client Settings
- 2020 | π π¦ | Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party
- 2020 | π π¦ | Secure Generalized Deduplication via Multi-Key Revealing Encryption
- 2019 | π | TOPPool: time-aware optimized privacy-preserving ridesharing
- 2019 | π | The simplest multi-key linearly homomorphic signature scheme
- 2019 | π | SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting
- 2019 | π π¦ | Multi-key homomorphic authenticators
- 2018 | π | HIKE: Walking the Privacy Trail
- 2018 | π π¦ | Matrioska: A Compiler for Multi-Key Homomorphic Signatures
- 2018 | π | HB+DB: Distance bounding meets human based authentication
- 2017 | π | Anonymous Single-Round Server-Aided Verification
- 2017 | π | Revisiting Yasuda et al.βs Biometric Authentication Protocol: Are you Private Enough?
- 2017 | π | Two-hop Distance-Bounding Protocols: Keep your Friends Close
- 2017 | π | Privacy-preserving biometric authentication: challenges and directions
- 2016 | π π¦ | Multi-key homomorphic authenticators
- 2015 | π | Using distance-bounding protocols to securely verify the proximity of two-hop neighbours
- 2015 | π | HB+DB, Mitigating Man-in-the-Middle Attacks Against HB+ with Distance Bounding
- 2014 | π | On the Leakage of Information in Biometric Authentication.