Fabien Laguillaumie

From MaRDI portal
Person:417985


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Efficient succinct zero-knowledge arguments in the CL framework
Journal of Cryptology
2025-01-17Paper
An improved threshold homomorphic cryptosystem based on class groups
 
2025-01-10Paper
Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)
Advances in Cryptology – ASIACRYPT 2022
2023-08-16Paper
I want to ride my \texttt{BICYCL} : \texttt{BICYCL} implements cryptography in class groups
Journal of Cryptology
2023-07-05Paper
Blind Functional Encryption
1511.68112
2022-12-21Paper
Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security
Theoretical Computer Science
2022-11-17Paper
A tighter proof for CCA secure inner product functional encryption: genericity meets efficiency
Theoretical Computer Science
2022-04-19Paper
Bandwidth-efficient threshold EC-DSA
 
2021-12-01Paper
Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions
Algorithmica
2021-02-01Paper
Two-party ECDSA from hash proof systems and efficient instantiations
 
2020-03-09Paper
Practical fully secure unrestricted inner product functional encryption modulo \(p\)
 
2019-01-23Paper
Verifiable message-locked encryption
 
2018-10-26Paper
Encryption switching protocols revisited: switching modulo \(p\)
 
2017-11-03Paper
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
IEEE Transactions on Information Theory
2017-07-12Paper
Implementing candidate graded encoding schemes from ideal lattices
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Linearly homomorphic encryption from \(\mathsf {DDH}\)
Lecture Notes in Computer Science
2016-03-02Paper
Proxy re-encryption scheme supporting a selection of delegatees
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
Lattice-based group signatures with logarithmic signature size
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Relations between semantic security and anonymity in identity-based encryption
Information Processing Letters
2013-03-28Paper
Homomorphic encryption for multiplications and pairing evaluation
Lecture Notes in Computer Science
2012-09-25Paper
Short attribute-based signatures for threshold predicates
Lecture Notes in Computer Science
2012-06-08Paper
Plaintext-checkable encryption
Lecture Notes in Computer Science
2012-06-08Paper
Attribute-based encryption schemes with constant-size ciphertexts
Theoretical Computer Science
2012-05-14Paper
A variant of Miller's formula and algorithm
Lecture Notes in Computer Science
2010-11-26Paper
Time-selective convertible undeniable signatures with short conversion receipts
Information Sciences
2010-07-20Paper
Constant size ciphertexts in threshold attribute-based encryption
Public Key Cryptography – PKC 2010
2010-05-28Paper
Multi-designated verifiers signatures: anonymity without encryption
Information Processing Letters
2010-01-29Paper
Factoring \(pq ^{2}\) with quadratic forms: Nice cryptanalyses
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions
Lecture Notes in Computer Science
2008-11-27Paper
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures
Lecture Notes in Computer Science
2008-06-24Paper
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption
Lecture Notes in Computer Science
2008-06-17Paper
Trapdoor Sanitizable Signatures and Their Application to Content Protection
Applied Cryptography and Network Security
2008-06-13Paper
Universally Convertible Directed Signatures
Lecture Notes in Computer Science
2008-03-18Paper
Short Undeniable Signatures Without Random Oracles: The Missing Link
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Universal forgery on Sekhar's signature scheme with message recovery
International Journal of Computer Mathematics
2005-02-28Paper


Research outcomes over time


This page was built for person: Fabien Laguillaumie