Filtros de búsqueda

Lista de obras de David Pointcheval

A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes

A New Identification Scheme Based on the Perceptrons Problem

A New Key Exchange Protocol Based on MQV Assuming Public Computations

A Scalable Password-Based Group Key Exchange Protocol in the Standard Model

article

A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications

article by Emmanuel Bresson et al published 2003 in Lecture Notes in Computer Science

A Simple Threshold Authenticated Key Exchange from Short Secrets

article by Michel Abdalla et al published 2005 in Lecture Notes in Computer Science

A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption

A security solution for IEEE 802.11's ad hoc mode: password-authentication and group Diffie Hellman key exchange

About the Security of MTI/C0 and MQV

Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts

Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts

An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication

An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication

Analysis and Improvement of Lindell’s UC-Secure Commitment Schemes

Analysis and Improvements of NTRU Encryption Paddings

article published in 2002

Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures

article published in 2009

Anonymous Proxy Signatures

Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange

Automated Security Proofs with Sequences of Games

Autotomic Signatures

Black-Box Trace&Revoke Codes

Chosen-Ciphertext Security for Any One-Way Cryptosystem

Chosen-Ciphertext Security without Redundancy

Compact Round-Optimal Partially-Blind Signatures

Computational Alternatives to Random Number Generators

Contemporary Cryptology

Contributory Password-Authenticated Group Key Exchange with Join Capability

Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash

Decentralized Dynamic Broadcast Encryption

Design Validations for Discrete Logarithm Based Signature Schemes

article by Ernest Brickell et al published 2000 in Lecture Notes in Computer Science

Disjunctions for Hash Proof Systems: New Constructions and Applications

Distributed Trustees and revocability: A framework for internet payment

Divisible E-Cash Made Practical

Divisible e-cash made practical

Dynamic Fully Anonymous Short Group Signatures

Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions

article by Emmanuel Bresson et al published 2002 in Lecture Notes in Computer Science

Dynamic Threshold Public-Key Encryption

Editorial: Group-oriented cryptographic protocols

Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting

Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries

Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages

scholarly article by Fabrice Benhamouda et al published 2013 in Lecture Notes in Computer Science

Encoding-Free ElGamal Encryption Without Random Oracles

Encryption Switching Protocols

article published in 2016

Extended Notions of Security for Multicast Public Key Cryptosystems

article published in 2000

Flexible Group Key Exchange with On-demand Computation of Subgroup Keys

Forward Secure Non-Interactive Key Exchange

Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys

Functional Encryption with Oblivious Helper

Fuzzy Password-Authenticated Key Exchange

GEM: A Generic Chosen-Ciphertext Secure Encryption Method

Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks

HMAC is a randomness extractor and applications to TLS

Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes

Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms

How to Disembed a Program?

Human Computing for Handling Strong Corruptions in Authenticated Key Exchange

scholarly article published August 2017

IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange

Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting

Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication

article published in 2005

Key-Privacy in Public-Key Encryption

Legally Fair Contract Signing Without Keystones

MUTUAL AUTHENTICATION AND GROUP KEY AGREEMENT FOR LOW-POWER MOBILE DEVICES

Mediated Traceable Anonymous Encryption

Message-Based Traitor Tracing with Optimal Ciphertext Rate

Monotone Signatures

Multi-channel broadcast encryption

Multi-factor Authenticated Key Exchange

Mutual Authentication for Low-Power Mobile Devices

Mutual authentication and group key agreement for low-power mobile devices

NUMBER THEORY AND PUBLIC-KEY CRYPTOGRAPHY

scholarly article published June 2001

New Anonymity Notions for Identity-Based Encryption

New Anonymity Notions for Identity-Based Encryption

New Public Key Cryptosystems Based on the Dependent-RSA Problems

New Security Results on Encrypted Key Exchange

New Techniques for SPHFs and Efficient One-Round PAKE Protocols

New blind signatures equivalent to factorization (extended abstract)

On the Security Notions for Public-Key Encryption Schemes

article published in 2005

On the Tightness of Forward-Secure Signature Reductions

One-Time Verifier-Based Encrypted Key Exchange

Optimal Asymmetric Encryption and Signature Paddings

article published in 2005

Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages

article published in 2002

Optimal Randomness Extraction from a Diffie-Hellman Element

Parallel Authentication and Public-Key Encryption

Parallel Signcryption

Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness

Password-Based Authenticated Key Exchange

Password-Based Authenticated Key Exchange in the Three-Party Setting

article by Michel Abdalla et al published 2005 in Lecture Notes in Computer Science

Password-Based Group Key Exchange in a Constant Number of Rounds

Password-based authenticated key exchange in the three-party setting

scholarly article published 2006

Practical Security in Public-Key Cryptography

scholarly article by David Pointcheval published 2002 in Lecture Notes in Computer Science

Practical multi-candidate election system

Provable Security for Public Key Schemes

Provably Authenticated Group Diffie-Hellman Key Exchange — The Dynamic Case

Provably authenticated group Diffie-Hellman key exchange

Provably authenticated group Diffie-Hellman key exchange

article published in 2001

Provably secure authenticated group Diffie-Hellman key exchange

Provably secure blind signature schemes

Provably secure password-based authentication in TLS

Public Traceability in Traitor Tracing Schemes

Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks

Public-key encryption indistinguishable under plaintext-checkable attacks

REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform

article

RSA-OAEP Is Secure under the RSA Assumption

Reassessing Security of Randomizable Signatures

Relations among notions of security for public-key encryption schemes

Removing Erasures with Explainable Hash Proof Systems

Removing the Strong RSA Assumption from Arguments over the Integers

Robust Password-Protected Secret Sharing

Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks

Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions

SPHF-Friendly Non-interactive Commitments

Scalable Divisible E-cash

Secure Distributed Computation on Private Inputs

Secure Mobile Gambling

Security Arguments for Digital Signatures and Blind Signatures

Security Notions for Broadcast Encryption

Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman

scholarly article published 21 April 2008

Security Proofs for Signature Schemes

Security analysis of pseudo-random number generators with input

Security proofs for an efficient password-based key exchange

Security proofs for an efficient password-based key exchange

Self-Scrambling Anonymizers

Short Randomizable Signatures

Short blind signatures

Signatures on Randomizable Ciphertexts

Simple Functional Encryption Schemes for Inner Products

article by Michel Abdalla et al published 2015 in Lecture Notes in Computer Science

Simple Password-Based Encrypted Key Exchange Protocols

article by Michel Abdalla & David Pointcheval published 2005 in Lecture Notes in Computer Science

Smooth Projective Hashing for Conditionally Extractable Commitments

Strengthened security for blind signatures

Strong Cryptography from Weak Secrets

scholarly article by Xavier Boyen et al published 2010 in Lecture Notes in Computer Science

Strong password-based authentication in TLS using the three-party group Diffie Hellman protocol

article by Michel Abdalla et al published 2007 in International Journal of Security and Networks

The Composite Discrete Logarithm and Secure Authentication

The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes

The Group Diffie-Hellman Problems

The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme

article published in 2003

The Power of RSA Inversion Oracles and the Security of Chaum’s RSA-Based Blind Signature Scheme

The Twist-AUgmented Technique for Key Exchange

Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks

Tighter Reductions for Forward-Secure Signature Schemes

Topical Collection on Computing on Encrypted Data

artículo científico publicado en 2023

Traceable Signature with Stepping Capabilities

Transferable Constant-Size Fair E-Cash

Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication

Twin signatures

scholarly article published 2001

Twin signatures

scholarly article published 2001

VTBPEKE

Verified security of redundancy-free encryption from Rabin and RSA