David Pointcheval

From MaRDI portal
Person:378262

Available identifiers

zbMath Open pointcheval.davidDBLPp/DPointchevalWikidataQ23876388 ScholiaQ23876388MaRDI QIDQ378262

List of research outcomes





PublicationDate of PublicationType
Efficient universally-verifiable electronic voting with everlasting privacy2025-01-10Paper
Attribute-based signatures with advanced delegation, and tracing2024-11-12Paper
Verifiable decentralized multi-client functional encryption for inner product2024-09-13Paper
Covercrypt: an efficient early-abort KEM for hidden access policies with traceability from the DDH and LWE2024-06-05Paper
Decentralized Evaluation of Quadratic Polynomials on Encrypted Data2024-03-14Paper
Tracing a linear subspace: application to linearly-homomorphic group signatures2023-11-24Paper
GeT a CAKE: \underline{Ge}neric \underline{T}ransformations from \underline{K}ey encaspulation mechanisms to password \underline{A}uthenticated \underline{K}ey \underline{E}xchanges2023-11-10Paper
Optimal security notion for decentralized multi-client functional encryption2023-11-10Paper
Multi-client functional encryption with fine-grained access control2023-08-25Paper
MyOPE: malicious security for oblivious polynomial evaluation2023-07-25Paper
Traceable constant-size multi-authority credentials2023-07-25Paper
Key-policy ABE with switchable attributes2023-07-25Paper
Traceable constant-size multi-authority credentials2023-07-17Paper
Asymmetric Cryptography2023-03-29Paper
Multi-client inner-product functional encryption in the random-oracle model2022-12-16Paper
Dynamic decentralized functional encryption2022-11-09Paper
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms2022-11-02Paper
Robust password-protected secret sharing2022-08-19Paper
Boosting verifiable computation on encrypted data2021-12-01Paper
Linearly-homomorphic signatures and scalable mix-nets2021-12-01Paper
Traceable inner product functional encryption2020-08-05Paper
Divisible e-cash from constrained pseudo-random functions2020-05-20Paper
Unbounded inner-product functional encryption with succinct keys2020-01-30Paper
Reassessing security of randomizable signatures2020-01-21Paper
On the tightness of forward-secure signature reductions2019-01-29Paper
Decentralized multi-client functional encryption for inner product2019-01-23Paper
On the leakage of corrupted garbled circuits2018-11-07Paper
Privacy-preserving plaintext-equality of low-entropy inputs2018-08-10Paper
Fuzzy password-authenticated key exchange2018-07-17Paper
A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption2018-04-04Paper
Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash2017-06-13Paper
Removing Erasures with Explainable Hash Proof Systems2017-06-13Paper
Encryption Switching Protocols2016-11-30Paper
The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs2016-10-21Paper
Legally Fair Contract Signing Without Keystones2016-10-04Paper
Short Randomizable Signatures2016-04-08Paper
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks2016-03-10Paper
Scalable Divisible E-cash2016-03-10Paper
Practical multi-candidate election system2016-03-04Paper
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting2015-12-10Paper
Disjunctions for Hash Proof Systems: New Constructions and Applications2015-09-30Paper
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks2015-08-27Paper
Divisible E-Cash Made Practical2015-08-27Paper
Simple Functional Encryption Schemes for Inner Products2015-08-27Paper
Forward Secure Non-Interactive Key Exchange2014-10-14Paper
Dynamic Fully Anonymous Short Group Signatures2014-08-21Paper
Security Proofs for Signature Schemes2014-08-20Paper
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting2014-03-25Paper
Analysis and Improvement of Lindell’s UC-Secure Commitment Schemes2014-01-24Paper
SPHF-Friendly Non-interactive Commitments2013-12-10Paper
Black-box Trace\&Revoke codes2013-11-11Paper
New Techniques for SPHFs and Efficient One-Round PAKE Protocols2013-09-02Paper
Tighter Reductions for Forward-Secure Signature Schemes2013-04-19Paper
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages2013-04-19Paper
Decentralized Dynamic Broadcast Encryption2012-09-25Paper
Compact Round-Optimal Partially-Blind Signatures2012-09-25Paper
Message-Based Traitor Tracing with Optimal Ciphertext Rate2012-09-21Paper
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts2012-09-07Paper
Password-Based Authenticated Key Exchange2012-07-20Paper
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions2012-06-15Paper
Traceable Signature with Stepping Capabilities2012-06-08Paper
Autotomic Signatures2012-06-08Paper
Security Notions for Broadcast Encryption2011-06-28Paper
Parallel Signcryption2011-05-18Paper
Signatures on Randomizable Ciphertexts2011-03-15Paper
Contributory Password-Authenticated Group Key Exchange with Join Capability2011-02-11Paper
Mediated Traceable Anonymous Encryption2010-08-31Paper
On Some Incompatible Properties of Voting Schemes2010-06-17Paper
Strong Cryptography from Weak Secrets2010-05-04Paper
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys2010-05-04Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Smooth Projective Hashing for Conditionally Extractable Commitments2009-10-20Paper
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures2009-08-18Paper
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness2009-07-07Paper
New Anonymity Notions for Identity-Based Encryption2009-06-09Paper
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures2009-06-09Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Optimal Randomness Extraction from a Diffie-Hellman Element2009-05-12Paper
Distributed Public-Key Cryptography from Weak Secrets2009-03-24Paper
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication2009-03-06Paper
Dynamic Threshold Public-Key Encryption2009-02-10Paper
About the Security of MTI/C0 and MQV2008-11-27Paper
A New Key Exchange Protocol Based on MQV Assuming Public Computations2008-11-27Paper
New Anonymity Notions for Identity-Based Encryption2008-11-20Paper
Anonymous Proxy Signatures2008-11-20Paper
Public Traceability in Traitor Tracing Schemes2008-05-06Paper
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework2008-04-24Paper
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model2008-04-24Paper
Extended Private Information Retrieval and Its Application in Biometrics Authentications2008-04-15Paper
A Simple Threshold Authenticated Key Exchange from Short Secrets2008-03-18Paper
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys2007-11-29Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Optimal Asymmetric Encryption and Signature Paddings2007-09-24Paper
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes2007-09-11Paper
Automated Security Proofs with Sequences of Games2007-09-04Paper
Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication2007-05-24Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Security in Communication Networks2006-10-10Paper
Selected Areas in Cryptography2006-10-10Paper
https://portal.mardi4nfdi.de/entity/Q54890612006-09-25Paper
https://portal.mardi4nfdi.de/entity/Q33749052006-03-01Paper
Financial Cryptography and Data Security2005-12-22Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Contemporary cryptology.2005-08-30Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Cryptographic Hardware and Embedded Systems - CHES 20042005-08-23Paper
OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding2005-08-12Paper
RSA-OAEP is secure under the RSA assumption2004-09-27Paper
https://portal.mardi4nfdi.de/entity/Q47395162004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47395242004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47395252004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47372542004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q30439242004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44742002004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44741812004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44741842004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44720792004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44507702004-02-16Paper
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme2003-08-27Paper
https://portal.mardi4nfdi.de/entity/Q44138712003-07-21Paper
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q44091122003-06-30Paper
https://portal.mardi4nfdi.de/entity/Q44091202003-06-30Paper
A new NP-complete problem and public-key identification2003-04-03Paper
https://portal.mardi4nfdi.de/entity/Q45477802003-03-31Paper
https://portal.mardi4nfdi.de/entity/Q45362692003-03-07Paper
https://portal.mardi4nfdi.de/entity/Q47837302002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q45366322002-11-24Paper
https://portal.mardi4nfdi.de/entity/Q27244312002-09-19Paper
https://portal.mardi4nfdi.de/entity/Q27244352002-09-01Paper
https://portal.mardi4nfdi.de/entity/Q45362992002-06-25Paper
https://portal.mardi4nfdi.de/entity/Q27245852002-05-05Paper
https://portal.mardi4nfdi.de/entity/Q45024962002-01-27Paper
https://portal.mardi4nfdi.de/entity/Q27541692001-12-09Paper
https://portal.mardi4nfdi.de/entity/Q27572552001-11-25Paper
https://portal.mardi4nfdi.de/entity/Q49500392000-08-28Paper
Security arguments for digital signatures and blind signatures2000-08-08Paper
https://portal.mardi4nfdi.de/entity/Q49500402000-05-07Paper
https://portal.mardi4nfdi.de/entity/Q49500512000-05-07Paper
https://portal.mardi4nfdi.de/entity/Q42507652000-04-09Paper
https://portal.mardi4nfdi.de/entity/Q42496531999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42493181999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42508071999-06-17Paper

Research outcomes over time

This page was built for person: David Pointcheval