Skip to Main content Skip to Navigation
Help


...
hal-01402517v1  Reports
Jérémy ChotardDuong Hieu PhanDavid Pointcheval. Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms
[Research Report] Cryptology ePrint Archive: Report 2016/1089, IACR Cryptology ePrint Archive. 2016
hal-01668020v1  Conference papers
Jérémy ChotardEdouard Dufour SansRomain GayDavid PointchevalDuong Hieu Phan. Decentralized Multi-Client Functional Encryption for Inner Product
ASIACRYPT '18 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2018, Brisbane, Australia. ⟨10.1007/978-3-030-03329-3_24⟩
hal-01109954v1  Conference papers
Duong Hieu PhanDavid PointchevalMario Strefler. Security Notions for Broadcast Encryption
ACNS 2011 - 9th International Conference Applied Cryptography and Network Security, Jun 2011, Nerja, Spain. pp.377-394, ⟨10.1007/978-3-642-21554-4_22⟩
hal-01110494v1  Conference papers
Duong Hieu PhanViet Cuong Trinh. Identity-Based Trace and Revoke Schemes
ProvSec 2011 - 5th International Conference Provable Security, Oct 2011, Xi'an, China. pp.204-221, ⟨10.1007/978-3-642-24316-5_15⟩
...
hal-01589463v1  Conference papers
Philippe GaboritAdrien HautevilleDuong Hieu PhanJean-Pierre Tillich. Identity-based Encryption from Codes with Rank Metric
Crypto 2017 - Advances in Cryptology, Aug 2017, Santa-Barbara, United States. pp.194--224, ⟨10.1007/978-3-319-63697-9_7⟩
hal-01643498v1  Conference papers
Shweta AgrawalSanjay BhattacherjeeDuong Hieu PhanDamien StehléShota Yamada. Efficient Public Trace and Revoke from Standard Assumptions
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS'2017, Oct 2017, Dallas, United States
hal-02345627v1  Conference papers
Chloé HébantDuong Hieu PhanDavid Pointcheval. Decentralized Evaluation of Quadratic Polynomials on Encrypted Data
ISC 2019 - International Conference on Information Security, Sep 2019, New York, United States. pp.87-106, ⟨10.1007/978-3-030-30215-3_5⟩
hal-01091300v1  Conference papers
San LingDuong Hieu PhanDamien StehléRon Steinfeld. Hardness of k-LWE and Applications in Traitor Tracing
CRYPTO, 2014, Santa Barbara, CA, United States
hal-00764852v1  Conference papers
Duong Hieu PhanDavid PointchevalSiamak F. ShahandashtiMario Strefler. Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts
ACISP 2012 - 17th Australasian Conference Information Security and Privacy, Jul 2012, Wollongong, Australia. pp.308-321, ⟨10.1007/978-3-642-31448-3_23⟩
hal-00864356v1  Conference papers
Duong Hieu PhanDavid PointchevalViet Cuong Trinh. Multi-channel broadcast encryption.
ASIA CCS '13 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, May 2013, Hangzhou, China. pp.277-286, ⟨10.1145/2484313.2484348⟩
hal-00764842v1  Conference papers
Duong Hieu PhanDavid PointchevalMario Strefler. Message-Based Traitor Tracing with Optimal Ciphertext Rate
LATINCRYPT 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Oct 2012, Santiago, Chile. pp.56-77, ⟨10.1007/978-3-642-33481-8_4⟩
hal-00764847v1  Conference papers
Duong Hieu PhanDavid PointchevalMario Strefler. Decentralized Dynamic Broadcast Encryption
SCN 2012 - 8th International Conference Security and Cryptography for Networks, Sep 2012, Amalfi, Italy. pp.166-183, ⟨10.1007/978-3-642-32928-9_10⟩
hal-00918522v1  Journal articles
Michel AbdallaAngelo de CaroDuong Hieu Phan. Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2012, 7 (6), pp.1695-1706. ⟨10.1109/TIFS.2012.2213594⟩
hal-00763979v1  Journal articles
Hung Q. NgoDuong Hieu PhanDavid Pointcheval. Black-Box Trace&Revoke Codes
Algorithmica, Springer Verlag, 2013, 67 (3), pp.418-448. ⟨10.1007/s00453-012-9702-y⟩