Bibliography
Major publications by the team in recent years
-
1M. Abdalla, D. Catalano, D. Fiore.
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions, in: Journal of Cryptology, 2014, vol. 27, no 3, pp. 544-593. -
2M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, M. Ohkubo.
Structure-Preserving Signatures and Commitments to Group Elements, in: Journal of Cryptology, 2016, vol. 29, no 2, pp. 363–421. -
3F. Benhamouda, O. Blazy, C. Chevalier, D. Pointcheval, D. Vergnaud.
New Techniques for SPHFs and Efficient One-Round PAKE Protocols, in: Advances in Cryptology – Proceedings of CRYPTO '13 (1), R. Canetti, J. A. Garay (editors), Lecture Notes in Computer Science, Springer, 2013, vol. 8042, pp. 449-475. -
4P. Chaidos, V. Cortier, G. Fuchsbauer, D. Galindo.
BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme, in: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16), E. R. Weippl, S. Katzenbeisser, C. Kruegel, A. C. Myers, S. Halevi (editors), ACM Press, 2016, pp. 1614–1625. -
5I. Dinur, O. Dunkelman, N. Keller, A. Shamir.
New Attacks on Feistel Structures with Improved Memory Complexities, in: Advances in Cryptology – Proceedings of CRYPTO '15 (1), R. Gennaro, M. Robshaw (editors), Lecture Notes in Computer Science, Springer, 2015, vol. 9215, pp. 433-454. -
6Y. Dodis, D. Pointcheval, S. Ruhault, D. Vergnaud, D. Wichs.
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust, in: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '13), Berlin, Germany, V. D. Gligor, M. Yung (editors), ACM Press, 2013, pp. 647–658. -
7R. Gay, D. Hofheinz, E. Kiltz, H. Wee.
Tightly CCA-Secure Encryption Without Pairings, in: Advances in Cryptology – Proceedings of Eurocrypt '16 (2), M. Fischlin, J.-S. Coron (editors), Lecture Notes in Computer Science, Springer, 2016, vol. 9665, pp. 1–27. -
8S. Gorbunov, V. Vaikuntanathan, H. Wee.
Predicate Encryption for Circuits from LWE, in: Advances in Cryptology – Proceedings of CRYPTO '15 (2), R. Gennaro, M. Robshaw (editors), Lecture Notes in Computer Science, Springer, 2015, vol. 9216, pp. 503-523. -
9V. Lyubashevsky, C. Peikert, O. Regev.
On Ideal Lattices and Learning with Errors over Rings, in: Journal of the ACM, 2013, vol. 60, no 6, pp. 43:1–43:35. -
10W. Quach, H. Wee, D. Wichs.
Laconic Function Evaluation and Applications, in: 59th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2018), M. Thorup (editor), IEEE, 2018.
Doctoral Dissertations and Habilitation Theses
-
11P.-A. Dupont.
Advanced password-authenticated key exchanges, PSL Research University, August 2018.
https://hal.inria.fr/tel-01868828 -
12D. Goudarzi.
Secure Implementation of Block Ciphers against Physical Attacks, ENS Paris - Ecole Normale Supérieure de Paris, September 2018.
https://hal.inria.fr/tel-01896103 -
13M. Minelli.
Fully Homomorphic Encryption for Machine Learning, PSL University, October 2018.
https://hal.archives-ouvertes.fr/tel-01918263 -
14Q. Santos.
Cryptography for Pragmatic Distributed Trust and the Role of Blockchain, PSL Research University ; École Normale Supérieure, December 2018.
https://hal.archives-ouvertes.fr/tel-01966109
Articles in International Peer-Reviewed Journals
-
15M. Abdalla, M. Bellare, G. Neven.
Robust Encryption, in: Journal of Cryptology, April 2018, vol. 31, no 2, pp. 307-350. [ DOI : 10.1007/s00145-017-9258-8 ]
https://hal.archives-ouvertes.fr/hal-01538113 -
16M. Abdalla, F. Benhamouda, A. Passelègue, K. Paterson.
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier, in: Journal of Cryptology, October 2018, vol. 31, no 4, pp. 917-964. [ DOI : 10.1007/s00145-017-9274-8 ]
https://hal.inria.fr/hal-01723012 -
17M. Abdalla, F. Benhamouda, D. Pointcheval.
On the Tightness of Forward-Secure Signature Reductions, in: Journal of Cryptology, February 2018, pp. 1-67. [ DOI : 10.1007/s00145-018-9283-2 ]
https://hal.inria.fr/hal-01722996 -
18S. Canard, D. H. Phan, D. Pointcheval, V. C. Trinh.
A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, in: Theoretical Computer Science, May 2018, vol. 723, pp. 51 - 72. [ DOI : 10.1016/j.tcs.2018.02.036 ]
https://hal.inria.fr/hal-01903749 -
19G. Fuchsbauer, C. Hanser, D. Slamanig.
Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials, in: Journal of Cryptology, 2018. [ DOI : 10.1007/s00145-018-9281-4 ]
https://hal.inria.fr/hal-01870052
International Conferences with Proceedings
-
20M. Abdalla, D. Catalano, D. Fiore, R. Gay, B. Ursu.
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings, in: Advances in Cryptology – CRYPTO 2018, Santa Barbara, United States, H. Shacham, A. Boldyreva (editors), Lecture Notes in Computer Science, August 2018, vol. 10991. [ DOI : 10.1007/978-3-319-96884-1_20 ]
https://hal.archives-ouvertes.fr/hal-01900273 -
21M. Barbosa, P. Farshim.
Indifferentiable Authenticated Encryption, in: Advances in Cryptology – CRYPTO 2018, Santa Barbara, United States, H. Shacham, A. Boldyreva (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2018, vol. 10991. [ DOI : 10.1007/978-3-319-96884-1_7 ]
https://hal.inria.fr/hal-01904141 -
22G. Barthe, S. Belaïd, T. Espitau, P.-A. Fouque, B. Grégoire, M. Rossi, M. Tibouchi.
Masking the GLP Lattice-Based Signature Scheme at Any Order, in: Eurocrypt 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, J. B. Nielse, V. Rijme (editors), Lecture Notes in Computer Science, Springer, April 2018, vol. 10821, pp. 354-384. [ DOI : 10.1007/978-3-319-78375-8_12 ]
https://hal.inria.fr/hal-01900708 -
23B. Bauer, P. Farshim, S. Mazaheri.
Combiners for Backdoored Random Oracles, in: Advances in Cryptology – CRYPTO 2018, Santa Barbara, United States, H. Shacham, A. Boldyreva (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2018, vol. 10992. [ DOI : 10.1007/978-3-319-96881-0_10 ]
https://hal.inria.fr/hal-01866724 -
24B. Bauer, L. Isenmann.
Discrete Morse theory for the collapsibility of supremum sections, in: ICGT: International Colloquium on Graph Theory and combinatorics, Lyon, France, July 2018, https://arxiv.org/abs/1803.09577.
https://hal.archives-ouvertes.fr/hal-01867246 -
25S. Canard, D. Pointcheval, Q. Santos, J. Traoré.
Practical Strategy-Resistant Privacy-Preserving Elections, in: ESORICS 2018, Barcelona, Spain, Computer Security. ESORICS 2018, Springer, September 2018, vol. Lecture Notes in Computer Science, no 11099. [ DOI : 10.1007/978-3-319-98989-1_17 ]
https://hal.inria.fr/hal-01903777 -
26S. Canard, D. Pointcheval, Q. Santos, J. Traoré.
Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs, in: ACNS 2018 - 16th International Conference on Applied Cryptography and Network Security, Leuven, Belgium, a. Preneel, F. Vercautere (editors), Applied Cryptography and Network Security. ACNS 2018, Springer, July 2018, vol. Lecture Notes in Computer Science, no 10892. [ DOI : 10.1007/978-3-319-93387-0_14 ]
https://hal.inria.fr/hal-01903746 -
27J. Chen, J. Gong, L. Kowalczyk, H. Wee.
Unbounded ABE via Bilinear Entropy Expansion, Revisited, in: EUROCRYPT 2018 - Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, J. B. Nielse, V. Rijme (editors), LNCS - Lecture Notes in Computer Science, Springer, April 2018, vol. 10820, pp. 503-534. [ DOI : 10.1007/978-3-319-78381-9_19 ]
https://hal.inria.fr/hal-01899901 -
28J. Chen, J. Gong, H. Wee.
Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding, in: ASIACRYPT 2018 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, December 2018.
https://hal.inria.fr/hal-01900153 -
29Y. Chen, V. Vaikuntanathan, B. Waters, H. Wee, D. Wichs.
Traitor-Tracing from LWE Made Simple and Attribute-Based, in: TCC 2018 - Theory of Cryptography Conference, Goa, India, November 2018.
https://hal.inria.fr/hal-01900152 -
30Y. Chen, V. Vaikuntanathan, H. Wee.
GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates, in: CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, United States, H. Shacham, A. Boldyreva (editors), LNCS - Lecture Notes in Computer Science, Spinger, August 2018, vol. 10991.
https://hal.inria.fr/hal-01899903 -
31J. Chotard, E. Dufour Sans, R. Gay, D. Pointcheval, D. H. Phan.
Decentralized Multi-Client Functional Encryption for Inner Product, in: ASIACRYPT '18 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, Advances in Cryptology - ASIACRYPT '18, Springer, December 2018, vol. Lecture Notes in Computer Science, no 11273. [ DOI : 10.1007/978-3-030-03329-3_24 ]
https://hal.archives-ouvertes.fr/hal-01668020 -
32G. Couteau, A. Dupin, P. Méaux, M. Rossi, Y. Rotella.
On the Concrete Security of Goldreich’s Pseudorandom Generator, in: ASIACRYPT 2018 - 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, LNCS - Lecture Notes in Computer Science, Springer, December 2018, vol. 11273, pp. 96-124. [ DOI : 10.1007/978-3-030-03329-3_4 ]
https://hal.inria.fr/hal-01944772 -
33A. Dupin, D. Pointcheval, C. Bidan.
On the Leakage of Corrupted Garbled Circuits, in: ProvSec 2018 - 12th International Conference on Provable Security, Jeju, South Korea, J. Baek, W. Susilo, J. Kim (editors), Provable Security. ProvSec 2018, Springer, October 2018, vol. Lecture Notes in Computer Science, no 11192. [ DOI : 10.1007/978-3-030-01446-9_1 ]
https://hal.inria.fr/hal-01903806 -
34P.-A. Dupont, J. Hesse, D. Pointcheval, L. Reyzin, S. Yakoubov.
Fuzzy Password-Authenticated Key Exchange, in: EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic, Tel Aviv, Israel, J. B. Nielse, V. Rijme (editors), Advances in Cryptology – EUROCRYPT 2018, Springer, April 2018, vol. Lecture Notes in Computer Science, no 10822. [ DOI : 10.1007/978-3-319-78372-7_13 ]
https://hal.inria.fr/hal-01903733 -
35P. Farshim, J. Hesse, D. Hofheinz, E. Larraia.
Graded Encoding Schemes from Obfuscation, in: PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio De Janeiro, Brazil, M. Abdalla, R. Dahab (editors), LNCS - Lecture Notes in Computer Science, Springer, March 2018, vol. 10769. [ DOI : 10.1007/978-3-319-76581-5_13 ]
https://hal.inria.fr/hal-01904151 -
36G. Fuchsbauer.
Subversion-Zero-Knowledge SNARKs, in: PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Jaineiro, Brazil, M. Abdalla, R. Dahab (editors), LNCS - Lecture Notes in Computer Science, Springer, March 2018, vol. 10769, pp. 315-347. [ DOI : 10.1007/978-3-319-76578-5_11 ]
https://hal.inria.fr/hal-01869978 -
37G. Fuchsbauer, R. Gay.
Weakly Secure Equivalence-Class Signatures from Standard Assumptions, in: PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Jaineiro, Brazil, M. Abdalla, R. Dahab (editors), Springer, March 2018, pp. 153-183. [ DOI : 10.1007/978-3-319-76581-5_6 ]
https://hal.inria.fr/hal-01869971 -
38G. Fuchsbauer, E. Kiltz, J. Loss.
The Algebraic Group Model and its Applications, in: CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, United States, H. Shacham, A. Boldyreva (editors), LNCS - Lecture Notes in Computer Science, Springer, August 2018, vol. 10992, pp. 33-62. [ DOI : 10.1007/978-3-319-96881-0_2 ]
https://hal.inria.fr/hal-01870015 -
39G. Fuchsbauer, M. Orrù.
Non-interactive Zaps of Knowledge, in: ACNS 2018 - 16th International Conference on Applied Cryptography and Network Security, Leuven, Belgium, a. Preneel, F. Vercautere (editors), Springer, July 2018, vol. LNCS - Lecture notes in computer science, no 10892, pp. 44-62. [ DOI : 10.1007/978-3-319-93387-0_3 ]
https://hal.inria.fr/hal-01870005 -
40R. Gay, D. Hofheinz, L. Kohl, J. Pan.
More Efficient (Almost) Tightly Secure Structure-Preserving Signatures, in: EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, J. B. Nielse, V. Rijme (editors), Springer, April 2018. [ DOI : 10.1007/978-3-319-78375-8_8 ]
https://hal.archives-ouvertes.fr/hal-01900268 -
41R. Gay, L. Kowalczyk, H. Wee.
Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys, in: SCN 2018: Security and Cryptography for Networks, Amalfi, Italy, September 2018.
https://hal.inria.fr/hal-01900275 -
42R. Gennaro, M. Minelli, A. Nitulescu, M. Orrù.
Lattice-Based zk-SNARKs from Square Span Programs, in: ACM CCS 2018, Toronto, Canada, October 2018.
https://hal.archives-ouvertes.fr/hal-01743360 -
43P. Grubbs, M.-S. Lacharité, B. Minaud, K. G. Paterson.
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks, in: IEEE Symposium on Security and Privacy (S&P) 2019, San Francisco, United States, May 2019.
https://hal.inria.fr/hal-01974962 -
44L. Khati, D. Vergnaud.
Analysis and Improvement of an Authentication Scheme in Incremental Cryptography, in: Selected Areas in Cryptography - SAC 2018, Calgary, Canada, C. Cid, M. J. Jacobson Jr. (editors), Lecture Notes in Computer Science, Springer, August 2018, vol. 11349, pp. 50-70. [ DOI : 10.1007/978-3-030-10970-7_3 ]
https://hal.inria.fr/hal-01893905 -
45T. Liu, V. Vaikuntanathan, H. Wee.
Towards Breaking the Exponential Barrier for General Secret Sharing, in: EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, J. B. Nielse, V. Rijme (editors), LNCS - Lecture Notes in Computer Science, Springer, April 2018, vol. 10820.
https://hal.inria.fr/hal-01899902 -
46S. Park, A. Kwon, G. Fuchsbauer, P. Gaži, J. Alwen, K. Pietrzak.
SpaceMint: A Cryptocurrency Based on Proofs of Space, in: Financial Cryptography and Data Security 2018, Curaçao, Curaçao, February 2018.
https://hal.inria.fr/hal-01869990 -
47D. Pointcheval, O. Sanders.
Reassessing Security of Randomizable Signatures, in: CT-RSA 2018 - The Cryptographers' Track at the RSA Conference 2018, San Francisco, United States, Topics in Cryptology – CT-RSA 2018, Springer, April 2018, vol. Lecture Notes in Computer Science, no 10808. [ DOI : 10.1007/978-3-319-76953-0_17 ]
https://hal.inria.fr/hal-01903717 -
48W. Quach, H. Wee, D. Wichs.
Laconic Function Evaluation and Applications, in: FOCS 2018 - 59th Annual IEEE Symposium on Foundations of Computer Science, Paris, France, October 2018.
https://hal.inria.fr/hal-01899904