Xavier Boyen

From MaRDI portal
Revision as of 12:18, 6 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:321306

Available identifiers

zbMath Open boyen.xavierMaRDI QIDQ321306

List of research outcomes





PublicationDate of PublicationType
Zero-history confidential chains with zero-knowledge contracts: a new normal for decentralized ledgers?2023-07-21Paper
Anonymous Lattice Identity-Based Encryption with Traceable Identities2023-04-13Paper
Compact Multi-Party Confidential Transactions2023-03-22Paper
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing2022-12-22Paper
A simple and efficient CCA-secure lattice KEM in the standard model2022-12-16Paper
The complex shape of anonymity in cryptocurrencies: case studies from a systematic approach2022-06-17Paper
Secure hybrid encryption in the standard model from hard learning problems2022-03-22Paper
Efficient public-key encryption with equality test from lattices2021-10-21Paper
CCA-security from adaptive all-but-one lossy trapdoor functions2021-08-27Paper
Direct CCA-secure KEM and deterministic PKE from plain LWE2020-02-25Paper
Signcryption schemes with insider security in an ideal permutation model2019-07-08Paper
Forward-secure linkable ring signatures2018-09-26Paper
Almost tight multi-instance multi-ciphertext identity-based encryption on lattices2018-08-10Paper
All-but-many lossy trapdoor functions from lattices and applications2017-10-27Paper
Key recovery: inert and public2017-10-23Paper
Towards Tightly Secure Lattice Short Signature and Id-Based Encryption2017-01-06Paper
Unconditionally anonymous ring and mesh signatures2016-10-13Paper
Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions2016-10-04Paper
Attribute-Based Encryption for Finite Automata from LWE2016-01-27Paper
Sealing the Leak on Classical NTRU Signatures2015-01-14Paper
Key-Private Proxy Re-encryption under LWE2014-01-14Paper
Expressive Cryptography: Lattice Perspectives2013-06-28Paper
Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting2013-06-07Paper
Attribute-Based Functional Encryption on Lattices2013-03-18Paper
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices2012-07-20Paper
Expressive Encryption Systems from Lattices2012-07-20Paper
Efficient selective identity-based encryption without random oracles2012-01-13Paper
Identity-Based Signcryption2011-05-18Paper
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE2010-08-24Paper
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions2010-07-06Paper
Efficient Lattice (H)IBE in the Standard Model2010-06-01Paper
Preventing Pollution Attacks in Multi-source Network Coding2010-05-28Paper
Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More2010-05-28Paper
Strong Cryptography from Weak Secrets2010-05-04Paper
HPAKE : Password Authentication Secure against Cross-Site User Impersonation2009-11-26Paper
https://portal.mardi4nfdi.de/entity/Q36158792009-03-24Paper
https://portal.mardi4nfdi.de/entity/Q36158802009-03-24Paper
Distributed Public-Key Cryptography from Weak Secrets2009-03-24Paper
The Uber-Assumption Family2009-02-10Paper
A tapestry of identity-based encryption: practical frameworks compared2009-01-15Paper
Expressive Subgroup Signatures2008-11-20Paper
New Paradigms for Password Security2008-07-08Paper
Miniature CCA2 PK Encryption: Tight Security Without Redundancy2008-05-15Paper
Short signatures without random oracles and the SDH assumption in bilinear groups2008-05-06Paper
Hierarchical Identity Based Encryption with Constant Size Ciphertext2008-05-06Paper
Mesh Signatures2007-11-29Paper
General Ad Hoc Encryption from Exponent Inversion IBE2007-11-29Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Compact Group Signatures Without Random Oracles2007-09-24Paper
Full-Domain Subgroup Hiding and Constant-Size Group Signatures2007-09-04Paper
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)2007-09-04Paper
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions2007-09-04Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper

Research outcomes over time

This page was built for person: Xavier Boyen