Skip to Main content Skip to Navigation


...
hal-01848134v1  Conference papers
Benoît LibertThomas PetersChen Qian. Logarithmic-Size Ring Signatures With Tight Security from the DDH Assumption
ESORICS 2018 - 23rd European Symposium on Research in Computer Security, Sep 2018, Barcelone, Spain. pp.288-308, ⟨10.1007/978-3-319-98989-1_15⟩
...
hal-01621022v1  Conference papers
Benoît LibertThomas PetersChen Qian. Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts
PKC 2017 - Public Key Cryptography, Mar 2017, Amsterdam, Netherlands. pp.247 - 276, ⟨10.1007/BFb0054113⟩
...
hal-01225363v1  Conference papers
Benoît LibertThomas PetersMarc JoyeMoti Yung. Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications
Advances in Cryptology - Asiacrypt 2015, IACR, Nov 2015, Auckland, New Zealand
...
hal-01225344v1  Conference papers
Benoît LibertMarc JoyeMoti YungThomas Peters. Secure Efficient History-Hiding Append-Only Signatures in the Standard Model
Public Key Cryptography 2015 (PKC 2015), Mar 2015, Washington DC, United States. ⟨10.1007/978-3-662-46447-2_20⟩
hal-01243278v1  Conference papers
Geoffroy CouteauThomas PetersDavid Pointcheval. Secure Distributed Computation on Private Inputs
8th International Symposium on Foundations & Practice of Security, Oct 2015, Clermont-Ferrand, France
hal-01471901v1  Conference papers
Geoffroy CouteauThomas PetersDavid Pointcheval. Removing the Strong RSA Assumption from Arguments over the Integers
EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2017, Paris, France. ⟨10.1007/978-3-319-56614-6_11⟩
hal-01407341v1  Conference papers
Geoffroy CouteauThomas PetersDavid Pointcheval. Encryption Switching Protocols
Crypto 2016 - 36th Annual International Cryptology Conference, Aug 2016, Santa Barbara, United States. ⟨10.1007/978-3-662-53018-4_12⟩
hal-01245235v1  Reports
Geoffroy CouteauThomas PetersDavid Pointcheval. Secure Distributed Computation on Private Inputs
[Research Report] Cryptology ePrint Archive: Report 2015/1196, IACR Cryptology ePrint Archive. 2015