Fabien Laguillaumie

From MaRDI portal
Person:417985

Available identifiers

zbMath Open laguillaumie.fabienMaRDI QIDQ417985

List of research outcomes





PublicationDate of PublicationType
Efficient succinct zero-knowledge arguments in the CL framework2025-01-17Paper
An improved threshold homomorphic cryptosystem based on class groups2025-01-10Paper
Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)2023-08-16Paper
I want to ride my \texttt{BICYCL} : \texttt{BICYCL} implements cryptography in class groups2023-07-05Paper
Blind Functional Encryption2022-12-21Paper
Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security2022-11-17Paper
A tighter proof for CCA secure inner product functional encryption: genericity meets efficiency2022-04-19Paper
Bandwidth-efficient threshold EC-DSA2021-12-01Paper
Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions2021-02-01Paper
Two-party ECDSA from hash proof systems and efficient instantiations2020-03-09Paper
Practical fully secure unrestricted inner product functional encryption modulo \(p\)2019-01-23Paper
Verifiable message-locked encryption2018-10-26Paper
Encryption switching protocols revisited: switching modulo \(p\)2017-11-03Paper
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory2017-07-12Paper
Implementing Candidate Graded Encoding Schemes from Ideal Lattices2016-03-23Paper
Linearly Homomorphic Encryption from $$\mathsf {DDH}$$2016-03-02Paper
Proxy Re-Encryption Scheme Supporting a Selection of Delegatees2014-06-24Paper
Lattice-Based Group Signatures with Logarithmic Signature Size2013-12-10Paper
Relations between semantic security and anonymity in identity-based encryption2013-03-28Paper
Homomorphic Encryption for Multiplications and Pairing Evaluation2012-09-25Paper
Short Attribute-Based Signatures for Threshold Predicates2012-06-08Paper
Plaintext-Checkable Encryption2012-06-08Paper
Attribute-based encryption schemes with constant-size ciphertexts2012-05-14Paper
A Variant of Miller’s Formula and Algorithm2010-11-26Paper
Time-selective convertible undeniable signatures with short conversion receipts2010-07-20Paper
Constant Size Ciphertexts in Threshold Attribute-Based Encryption2010-05-28Paper
Multi-designated verifiers signatures: anonymity without encryption2010-01-29Paper
Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses2009-12-15Paper
On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis2009-05-12Paper
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions2008-11-27Paper
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures2008-06-24Paper
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption2008-06-17Paper
Trapdoor Sanitizable Signatures and Their Application to Content Protection2008-06-13Paper
Universally Convertible Directed Signatures2008-03-18Paper
Short Undeniable Signatures Without Random Oracles: The Missing Link2008-03-17Paper
Security in Communication Networks2006-10-10Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Information and Communications Security2005-08-19Paper
Universal forgery on Sekhar's signature scheme with message recovery2005-02-28Paper

Research outcomes over time

This page was built for person: Fabien Laguillaumie