Xavier Boyen

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Zero-history confidential chains with zero-knowledge contracts: a new normal for decentralized ledgers?
Computer Security – ESORICS 2022
2023-07-21Paper
Anonymous Lattice Identity-Based Encryption with Traceable Identities2023-04-13Paper
Compact Multi-Party Confidential Transactions2023-03-22Paper
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing
1511.94061
2022-12-22Paper
A simple and efficient CCA-secure lattice KEM in the standard model2022-12-16Paper
The complex shape of anonymity in cryptocurrencies: case studies from a systematic approach2022-06-17Paper
Secure hybrid encryption in the standard model from hard learning problems2022-03-22Paper
Efficient public-key encryption with equality test from lattices
Theoretical Computer Science
2021-10-21Paper
CCA-security from adaptive all-but-one lossy trapdoor functions
Theoretical Computer Science
2021-08-27Paper
Direct CCA-secure KEM and deterministic PKE from plain LWE2020-02-25Paper
Signcryption schemes with insider security in an ideal permutation model
Journal of Mathematical Cryptology
2019-07-08Paper
Forward-secure linkable ring signatures2018-09-26Paper
Almost tight multi-instance multi-ciphertext identity-based encryption on lattices2018-08-10Paper
All-but-many lossy trapdoor functions from lattices and applications2017-10-27Paper
Key recovery: inert and public2017-10-23Paper
Towards tightly secure lattice short signature and id-based encryption
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Unconditionally anonymous ring and mesh signatures
Journal of Cryptology
2016-10-13Paper
Turing machines with shortcuts: efficient attribute-based encryption for bounded functions
Applied Cryptography and Network Security
2016-10-04Paper
Attribute-based encryption for finite automata from LWE
Provable Security
2016-01-27Paper
Sealing the leak on classical NTRU signatures
Post-Quantum Cryptography
2015-01-14Paper
Key-private proxy re-encryption under LWE
Lecture Notes in Computer Science
2014-01-14Paper
Expressive Cryptography: Lattice Perspectives
Information Security and Privacy
2013-06-28Paper
Adapting Lyubashevsky's signature schemes to the ring signature setting
Progress in Cryptology – AFRICACRYPT 2013
2013-06-07Paper
Attribute-based functional encryption on lattices
Theory of Cryptography
2013-03-18Paper
Functional encryption for threshold functions (or fuzzy IBE) from lattices
Public Key Cryptography – PKC 2012
2012-07-20Paper
Expressive Encryption Systems from Lattices
Cryptology and Network Security
2012-07-20Paper
Efficient selective identity-based encryption without random oracles
Journal of Cryptology
2012-01-13Paper
Identity-Based Signcryption
Practical Signcryption
2011-05-18Paper
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Shrinking the keys of discrete-log-type lossy trapdoor functions
Applied Cryptography and Network Security
2010-07-06Paper
Efficient lattice (H)IBE in the standard model
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Lattice mixing and vanishing trapdoors: a framework for fully secure short signatures and more
Public Key Cryptography – PKC 2010
2010-05-28Paper
Preventing pollution attacks in multi-source network coding
Public Key Cryptography – PKC 2010
2010-05-28Paper
Strong cryptography from weak secrets. Building efficient PKE and IBE from distributed passwords
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
HPAKE : Password Authentication Secure against Cross-Site User Impersonation
Cryptology and Network Security
2009-11-26Paper
Distributed Public-Key Cryptography from Weak Secrets
Public Key Cryptography – PKC 2009
2009-03-24Paper
Generalized IBE in the exponent-inversion framework2009-03-24Paper
scientific article; zbMATH DE number 5532062 (Why is no real title available?)2009-03-24Paper
The Uber-Assumption Family
Pairing-Based Cryptography – Pairing 2008
2009-02-10Paper
A tapestry of identity-based encryption: practical frameworks compared
International Journal of Applied Cryptography
2009-01-15Paper
Expressive Subgroup Signatures
Lecture Notes in Computer Science
2008-11-20Paper
New Paradigms for Password Security
Information Security and Privacy
2008-07-08Paper
Miniature CCA2 PK Encryption: Tight Security Without Redundancy
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Short signatures without random oracles and the SDH assumption in bilinear groups
Journal of Cryptology
2008-05-06Paper
Hierarchical Identity Based Encryption with Constant Size Ciphertext
Lecture Notes in Computer Science
2008-05-06Paper
Mesh Signatures
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
General Ad Hoc Encryption from Exponent Inversion IBE
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Compact Group Signatures Without Random Oracles
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
Lecture Notes in Computer Science
2007-09-04Paper
Full-Domain Subgroup Hiding and Constant-Size Group Signatures
Public Key Cryptography – PKC 2007
2007-09-04Paper
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
Lecture Notes in Computer Science
2007-09-04Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper


Research outcomes over time


This page was built for person: Xavier Boyen