David Pointcheval

From MaRDI portal
Person:378262

Available identifiers

zbMath Open pointcheval.davidWikidataQ23876388 ScholiaQ23876388MaRDI QIDQ378262

List of research outcomes

PublicationDate of PublicationType
Tracing a linear subspace: application to linearly-homomorphic group signatures2023-11-24Paper
Multi-client functional encryption with fine-grained access control2023-08-25Paper
Key-policy ABE with switchable attributes2023-07-25Paper
Traceable constant-size multi-authority credentials2023-07-25Paper
MyOPE: malicious security for oblivious polynomial evaluation2023-07-25Paper
Traceable constant-size multi-authority credentials2023-07-17Paper
Asymmetric Cryptography2023-03-29Paper
Multi-client inner-product functional encryption in the random-oracle model2022-12-16Paper
Dynamic decentralized functional encryption2022-11-09Paper
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms2022-11-02Paper
Robust password-protected secret sharing2022-08-19Paper
Boosting verifiable computation on encrypted data2021-12-01Paper
Linearly-homomorphic signatures and scalable mix-nets2021-12-01Paper
Traceable inner product functional encryption2020-08-05Paper
Divisible e-cash from constrained pseudo-random functions2020-05-20Paper
Unbounded inner-product functional encryption with succinct keys2020-01-30Paper
Reassessing security of randomizable signatures2020-01-21Paper
On the tightness of forward-secure signature reductions2019-01-29Paper
Decentralized multi-client functional encryption for inner product2019-01-23Paper
On the leakage of corrupted garbled circuits2018-11-07Paper
Privacy-preserving plaintext-equality of low-entropy inputs2018-08-10Paper
Fuzzy password-authenticated key exchange2018-07-17Paper
A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption2018-04-04Paper
Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash2017-06-13Paper
Removing Erasures with Explainable Hash Proof Systems2017-06-13Paper
The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs2016-10-21Paper
Legally Fair Contract Signing Without Keystones2016-10-04Paper
Short Randomizable Signatures2016-04-08Paper
Scalable Divisible E-cash2016-03-10Paper
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks2016-03-10Paper
Practical multi-candidate election system2016-03-04Paper
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting2015-12-10Paper
Disjunctions for Hash Proof Systems: New Constructions and Applications2015-09-30Paper
Divisible E-Cash Made Practical2015-08-27Paper
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks2015-08-27Paper
Simple Functional Encryption Schemes for Inner Products2015-08-27Paper
Forward Secure Non-Interactive Key Exchange2014-10-14Paper
Dynamic Fully Anonymous Short Group Signatures2014-08-21Paper
Security Proofs for Signature Schemes2014-08-20Paper
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting2014-03-25Paper
Analysis and Improvement of Lindell’s UC-Secure Commitment Schemes2014-01-24Paper
SPHF-Friendly Non-interactive Commitments2013-12-10Paper
Black-box Trace\&Revoke codes2013-11-11Paper
New Techniques for SPHFs and Efficient One-Round PAKE Protocols2013-09-02Paper
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages2013-04-19Paper
Tighter Reductions for Forward-Secure Signature Schemes2013-04-19Paper
Compact Round-Optimal Partially-Blind Signatures2012-09-25Paper
Decentralized Dynamic Broadcast Encryption2012-09-25Paper
Message-Based Traitor Tracing with Optimal Ciphertext Rate2012-09-21Paper
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts2012-09-07Paper
Password-Based Authenticated Key Exchange2012-07-20Paper
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions2012-06-15Paper
Traceable Signature with Stepping Capabilities2012-06-08Paper
Autotomic Signatures2012-06-08Paper
Security Notions for Broadcast Encryption2011-06-28Paper
Parallel Signcryption2011-05-18Paper
Signatures on Randomizable Ciphertexts2011-03-15Paper
Contributory Password-Authenticated Group Key Exchange with Join Capability2011-02-11Paper
Mediated Traceable Anonymous Encryption2010-08-31Paper
On Some Incompatible Properties of Voting Schemes2010-06-17Paper
Strong Cryptography from Weak Secrets2010-05-04Paper
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys2010-05-04Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Smooth Projective Hashing for Conditionally Extractable Commitments2009-10-20Paper
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures2009-08-18Paper
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness2009-07-07Paper
New Anonymity Notions for Identity-Based Encryption2009-06-09Paper
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures2009-06-09Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Optimal Randomness Extraction from a Diffie-Hellman Element2009-05-12Paper
Distributed Public-Key Cryptography from Weak Secrets2009-03-24Paper
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication2009-03-06Paper
Dynamic Threshold Public-Key Encryption2009-02-10Paper
About the Security of MTI/C0 and MQV2008-11-27Paper
A New Key Exchange Protocol Based on MQV Assuming Public Computations2008-11-27Paper
New Anonymity Notions for Identity-Based Encryption2008-11-20Paper
Anonymous Proxy Signatures2008-11-20Paper
Public Traceability in Traitor Tracing Schemes2008-05-06Paper
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework2008-04-24Paper
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model2008-04-24Paper
Extended Private Information Retrieval and Its Application in Biometrics Authentications2008-04-15Paper
A Simple Threshold Authenticated Key Exchange from Short Secrets2008-03-18Paper
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys2007-11-29Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Optimal Asymmetric Encryption and Signature Paddings2007-09-24Paper
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes2007-09-11Paper
Automated Security Proofs with Sequences of Games2007-09-04Paper
Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication2007-05-24Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Security in Communication Networks2006-10-10Paper
Selected Areas in Cryptography2006-10-10Paper
https://portal.mardi4nfdi.de/entity/Q54890612006-09-25Paper
https://portal.mardi4nfdi.de/entity/Q33749052006-03-01Paper
Financial Cryptography and Data Security2005-12-22Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Contemporary cryptology.2005-08-30Paper
Cryptographic Hardware and Embedded Systems - CHES 20042005-08-23Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding2005-08-12Paper
RSA-OAEP is secure under the RSA assumption2004-09-27Paper
https://portal.mardi4nfdi.de/entity/Q47395162004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47395242004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47395252004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47372542004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q30439242004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44741812004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44741842004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44742002004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44720792004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44507702004-02-16Paper
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme2003-08-27Paper
https://portal.mardi4nfdi.de/entity/Q44138712003-07-21Paper
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q44091122003-06-30Paper
https://portal.mardi4nfdi.de/entity/Q44091202003-06-30Paper
A new NP-complete problem and public-key identification2003-04-03Paper
https://portal.mardi4nfdi.de/entity/Q45477802003-03-31Paper
https://portal.mardi4nfdi.de/entity/Q45362692003-03-07Paper
https://portal.mardi4nfdi.de/entity/Q47837302002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q45366322002-11-24Paper
https://portal.mardi4nfdi.de/entity/Q27244312002-09-19Paper
https://portal.mardi4nfdi.de/entity/Q27244352002-09-01Paper
https://portal.mardi4nfdi.de/entity/Q45362992002-06-25Paper
https://portal.mardi4nfdi.de/entity/Q27245852002-05-05Paper
https://portal.mardi4nfdi.de/entity/Q45024962002-01-27Paper
https://portal.mardi4nfdi.de/entity/Q27541692001-12-09Paper
https://portal.mardi4nfdi.de/entity/Q27572552001-11-25Paper
https://portal.mardi4nfdi.de/entity/Q49500392000-08-28Paper
Security arguments for digital signatures and blind signatures2000-08-08Paper
https://portal.mardi4nfdi.de/entity/Q49500402000-05-07Paper
https://portal.mardi4nfdi.de/entity/Q49500512000-05-07Paper
https://portal.mardi4nfdi.de/entity/Q42507652000-04-09Paper
https://portal.mardi4nfdi.de/entity/Q42493181999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42496531999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42508071999-06-17Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: David Pointcheval