My Publications

You can find my list of publications also on dblp and GoogleScholar.


  1. 2023 | 📄 | PAPR: Publicly Auditable Privacy Revocation for Anonymous Credentials
  2. 2022 | 📄 | Bifrost: Secure, Scalable and Efficient File Sharing System Using Dual Deduplication
  3. 2022 | 📄 | Secure Cloud Storage with Joint Deduplication and Erasure Protection
  4. 2022 | 📄 | CatNap: Practical and actively secure proximity testing with a napping party based on generic MPC techniques
  5. 2022 | 📄 | Outsourcing MPC Precomputation for Location Privacy
  6. 2022 | 📄 🎦 | Progressive And Efficient Verification For Digital Signatures
  7. 2022 | 📄 🎦 | Count Me In! Extendability for Threshold Ring Signatures
  8. 2021 | 📄 🎦 | LOVE a Pairing
  9. 2021 | 📄 | Yggdrasil: Privacy-aware Dual Deduplication in Multi Client Settings
  10. 2020 | 📄 🎦 | Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party
  11. 2020 | 📄 🎦 | Secure Generalized Deduplication via Multi-Key Revealing Encryption
  12. 2019 | 📄 | TOPPool: time-aware optimized privacy-preserving ridesharing
  13. 2019 | 📄 | The simplest multi-key linearly homomorphic signature scheme
  14. 2019 | 📄 | SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting
  15. 2019 | 📄 🎦 | Multi-key homomorphic authenticators
  16. 2018 | 📄 | HIKE: Walking the Privacy Trail
  17. 2018 | 📄 🎦 | Matrioska: A Compiler for Multi-Key Homomorphic Signatures
  18. 2018 | 📄 | HB+DB: Distance bounding meets human based authentication
  19. 2017 | 📄 | Anonymous Single-Round Server-Aided Verification
  20. 2017 | 📄 | Revisiting Yasuda et al.’s Biometric Authentication Protocol: Are you Private Enough?
  21. 2017 | 📄 | Two-hop Distance-Bounding Protocols: Keep your Friends Close
  22. 2017 | 📄 | Privacy-preserving biometric authentication: challenges and directions
  23. 2016 | 📄 🎦 | Multi-key homomorphic authenticators
  24. 2015 | 📄 | Using distance-bounding protocols to securely verify the proximity of two-hop neighbours
  25. 2015 | 📄 | HB+DB, Mitigating Man-in-the-Middle Attacks Against HB+ with Distance Bounding
  26. 2014 | 📄 | On the Leakage of Information in Biometric Authentication.