David Pointcheval

From MaRDI portal
(Redirected from Person:378262)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Efficient universally-verifiable electronic voting with everlasting privacy2025-01-10Paper
Attribute-based signatures with advanced delegation, and tracing2024-11-12Paper
Verifiable decentralized multi-client functional encryption for inner product2024-09-13Paper
Covercrypt: an efficient early-abort KEM for hidden access policies with traceability from the DDH and LWE2024-06-05Paper
Decentralized Evaluation of Quadratic Polynomials on Encrypted Data2024-03-14Paper
Tracing a linear subspace: application to linearly-homomorphic group signatures
Lecture Notes in Computer Science
2023-11-24Paper
GeT a CAKE: \underline{Ge}neric \underline{T}ransformations from \underline{K}ey encaspulation mechanisms to password \underline{A}uthenticated \underline{K}ey \underline{E}xchanges2023-11-10Paper
Optimal security notion for decentralized multi-client functional encryption2023-11-10Paper
Multi-client functional encryption with fine-grained access control
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
MyOPE: malicious security for oblivious polynomial evaluation
Lecture Notes in Computer Science
2023-07-25Paper
Traceable constant-size multi-authority credentials
Lecture Notes in Computer Science
2023-07-25Paper
Key-policy ABE with switchable attributes
Lecture Notes in Computer Science
2023-07-25Paper
Traceable constant-size multi-authority credentials
Information and Computation
2023-07-17Paper
Asymmetric Cryptography2023-03-29Paper
Multi-client inner-product functional encryption in the random-oracle model2022-12-16Paper
Dynamic decentralized functional encryption2022-11-09Paper
Homomorphic-policy attribute-based key encapsulation mechanisms
Lecture Notes in Computer Science
2022-11-02Paper
Robust password-protected secret sharing2022-08-19Paper
Boosting verifiable computation on encrypted data2021-12-01Paper
Linearly-homomorphic signatures and scalable mix-nets2021-12-01Paper
Traceable inner product functional encryption2020-08-05Paper
Divisible e-cash from constrained pseudo-random functions2020-05-20Paper
Unbounded inner-product functional encryption with succinct keys2020-01-30Paper
Reassessing security of randomizable signatures2020-01-21Paper
On the tightness of forward-secure signature reductions
Journal of Cryptology
2019-01-29Paper
Decentralized multi-client functional encryption for inner product2019-01-23Paper
On the leakage of corrupted garbled circuits2018-11-07Paper
Privacy-preserving plaintext-equality of low-entropy inputs2018-08-10Paper
Fuzzy password-authenticated key exchange2018-07-17Paper
A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
Theoretical Computer Science
2018-04-04Paper
Cut down the tree to achieve constant complexity in divisible e-cash
Lecture Notes in Computer Science
2017-06-13Paper
Removing erasures with explainable hash proof systems
Lecture Notes in Computer Science
2017-06-13Paper
Encryption switching protocols
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
The whole is less than the sum of its parts: constructing more efficient lattice-based AKEs
Lecture Notes in Computer Science
2016-10-21Paper
Legally Fair Contract Signing Without Keystones
Applied Cryptography and Network Security
2016-10-04Paper
Short randomizable signatures
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Robust pseudo-random number generators with input secure against side-channel attacks
Applied Cryptography and Network Security
2016-03-10Paper
Scalable Divisible E-cash
Applied Cryptography and Network Security
2016-03-10Paper
Practical multi-candidate election system
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
2016-03-04Paper
Implicit zero-knowledge arguments and applications to the malicious setting
Lecture Notes in Computer Science
2015-12-10Paper
Disjunctions for Hash Proof Systems: New Constructions and Applications
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Public-key encryption indistinguishable under plaintext-checkable attacks
Lecture Notes in Computer Science
2015-08-27Paper
Divisible e-cash made practical
Lecture Notes in Computer Science
2015-08-27Paper
Simple functional encryption schemes for inner products
Lecture Notes in Computer Science
2015-08-27Paper
Forward secure non-interactive key exchange
Lecture Notes in Computer Science
2014-10-14Paper
Dynamic fully anonymous short group signatures
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Security proofs for signature schemes
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Analysis and improvement of Lindell's UC-secure commitment schemes
Applied Cryptography and Network Security
2014-01-24Paper
SPHF-friendly non-interactive commitments
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Black-box Trace\&Revoke codes
Algorithmica
2013-11-11Paper
New techniques for SPHFs and efficient one-round PAKE protocols
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Tighter Reductions for Forward-Secure Signature Schemes
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Decentralized dynamic broadcast encryption
Lecture Notes in Computer Science
2012-09-25Paper
Compact Round-Optimal Partially-Blind Signatures
Lecture Notes in Computer Science
2012-09-25Paper
Message-based traitor tracing with optimal ciphertext rate
Progress in Cryptology – LATINCRYPT 2012
2012-09-21Paper
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
Information Security and Privacy
2012-09-07Paper
Password-based authenticated key exchange
Public Key Cryptography – PKC 2012
2012-07-20Paper
Round-optimal privacy-preserving protocols with smooth projective hash functions
Theory of Cryptography
2012-06-15Paper
Traceable Signature with Stepping Capabilities
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Autotomic signatures
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Security notions for broadcast encryption
Applied Cryptography and Network Security
2011-06-28Paper
Parallel signcryption
Practical Signcryption
2011-05-18Paper
Signatures on randomizable ciphertexts
Public Key Cryptography – PKC 2011
2011-03-15Paper
Contributory password-authenticated group key exchange with join capability
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Mediated traceable anonymous encryption
Lecture Notes in Computer Science
2010-08-31Paper
On some incompatible properties of voting schemes
Towards Trustworthy Elections
2010-06-17Paper
Strong cryptography from weak secrets. Building efficient PKE and IBE from distributed passwords
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Flexible group key exchange with on-demand computation of subgroup keys
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
Lecture Notes in Computer Science
2010-01-05Paper
Chosen-ciphertext security without redundancy
Lecture Notes in Computer Science
2010-01-05Paper
Smooth Projective Hashing for Conditionally Extractable Commitments
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures
Pairing-Based Cryptography – Pairing 2009
2009-08-18Paper
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
New Anonymity Notions for Identity-Based Encryption
Formal to Practical Security
2009-06-09Paper
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
Formal to Practical Security
2009-06-09Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Optimal Randomness Extraction from a Diffie-Hellman Element
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Distributed Public-Key Cryptography from Weak Secrets
Public Key Cryptography – PKC 2009
2009-03-24Paper
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
Information Security and Privacy
2009-03-06Paper
Dynamic Threshold Public-Key Encryption
Lecture Notes in Computer Science
2009-02-10Paper
About the Security of MTI/C0 and MQV
Lecture Notes in Computer Science
2008-11-27Paper
A New Key Exchange Protocol Based on MQV Assuming Public Computations
Lecture Notes in Computer Science
2008-11-27Paper
New Anonymity Notions for Identity-Based Encryption
Lecture Notes in Computer Science
2008-11-20Paper
Anonymous Proxy Signatures
Lecture Notes in Computer Science
2008-11-20Paper
Public Traceability in Traitor Tracing Schemes
Lecture Notes in Computer Science
2008-05-06Paper
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Extended Private Information Retrieval and Its Application in Biometrics Authentications
Cryptology and Network Security
2008-04-15Paper
A Simple Threshold Authenticated Key Exchange from Short Secrets
Lecture Notes in Computer Science
2008-03-18Paper
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
Pairing-Based Cryptography – Pairing 2007
2007-11-29Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Optimal Asymmetric Encryption and Signature Paddings
Applied Cryptography and Network Security
2007-09-24Paper
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes
Automata, Languages and Programming
2007-09-11Paper
Automated Security Proofs with Sequences of Games
Lecture Notes in Computer Science
2007-09-04Paper
Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication
Journal of Cryptology
2007-05-24Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2006-10-10Paper
Provable security for public key schemes2006-09-25Paper
Authenticated key exchange secure against dictionary attacks2006-03-01Paper
Financial Cryptography and Data Security
Lecture Notes in Computer Science
2005-12-22Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Contemporary cryptology.
Advanced Courses in Mathematics -- CRM Barcelona
2005-08-30Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper
OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding2005-08-12Paper
RSA-OAEP is secure under the RSA assumption
Journal of Cryptology
2004-09-27Paper
scientific article; zbMATH DE number 2088323 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 2088330 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 2088331 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 2086715 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 2085419 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 2081087 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2081072 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2081075 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2079933 (Why is no real title available?)2004-08-03Paper
scientific article; zbMATH DE number 2043337 (Why is no real title available?)2004-02-16Paper
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
Journal of Cryptology
2003-08-27Paper
scientific article; zbMATH DE number 1951620 (Why is no real title available?)2003-07-21Paper
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1942415 (Why is no real title available?)2003-06-30Paper
scientific article; zbMATH DE number 1942422 (Why is no real title available?)2003-06-30Paper
A new NP-complete problem and public-key identification
Designs, Codes and Cryptography
2003-04-03Paper
scientific article; zbMATH DE number 1786488 (Why is no real title available?)2003-03-31Paper
scientific article; zbMATH DE number 1759331 (Why is no real title available?)2003-03-07Paper
scientific article; zbMATH DE number 1842496 (Why is no real title available?)2002-12-08Paper
scientific article; zbMATH DE number 1759639 (Why is no real title available?)2002-11-24Paper
scientific article; zbMATH DE number 1617922 (Why is no real title available?)2002-09-19Paper
scientific article; zbMATH DE number 1617925 (Why is no real title available?)2002-09-01Paper
scientific article; zbMATH DE number 1759358 (Why is no real title available?)2002-06-25Paper
scientific article; zbMATH DE number 1618043 (Why is no real title available?)2002-05-05Paper
scientific article; zbMATH DE number 1504547 (Why is no real title available?)2002-01-27Paper
scientific article; zbMATH DE number 1670847 (Why is no real title available?)2001-12-09Paper
scientific article; zbMATH DE number 1676653 (Why is no real title available?)2001-11-25Paper
scientific article; zbMATH DE number 1440053 (Why is no real title available?)2000-08-28Paper
Security arguments for digital signatures and blind signatures
Journal of Cryptology
2000-08-08Paper
scientific article; zbMATH DE number 1440054 (Why is no real title available?)2000-05-07Paper
scientific article; zbMATH DE number 1440063 (Why is no real title available?)2000-05-07Paper
scientific article; zbMATH DE number 1304075 (Why is no real title available?)2000-04-09Paper
scientific article; zbMATH DE number 1303137 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1302836 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1304109 (Why is no real title available?)1999-06-17Paper


Research outcomes over time


This page was built for person: David Pointcheval