Benoît Libert

According to our database1, Benoît Libert authored at least 125 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption.
Theor. Comput. Sci., 2019

Simulation-Sound Proofs for LWE and Applications to KDM-CCA2 Security.
IACR Cryptology ePrint Archive, 2019

Lossy Algebraic Filters with Short Tags.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Zero-Knowledge Elementary Databases with More Expressive Queries.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

2018
Adaptively Secure Distributed PRFs from LWE.
IACR Cryptology ePrint Archive, 2018

Lattice-Based Zero-Knowledge Arguments for Integer Relations.
IACR Cryptology ePrint Archive, 2018

Adaptively Secure Distributed PRFs from \mathsf LWE.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Compact IBBE and Fuzzy IBE from Simple Assumptions.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Logarithmic-Size Ring Signatures with Tight Security from the DDH Assumption.
Proceedings of the Computer Security, 2018

Lattice-Based Zero-Knowledge Arguments for Integer Relations.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Efficient Cryptosystems From 2k-th Power Residue Symbols.
J. Cryptology, 2017

All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE.
IACR Cryptology ePrint Archive, 2017

Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash.
IACR Cryptology ePrint Archive, 2017

Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

Adaptive Oblivious Transfer with Access Control from Lattice Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
A New Framework for Privacy-Preserving Aggregation of Time-Series Data.
ACM Trans. Inf. Syst. Secur., 2016

Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares.
Theor. Comput. Sci., 2016

Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions.
IACR Cryptology ePrint Archive, 2016

Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.
IACR Cryptology ePrint Archive, 2016

Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.
IACR Cryptology ePrint Archive, 2016

Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions.
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016

Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Fully Secure Functional Encryption for Inner Products, from Standard Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Practical "Signatures with Efficient Protocols" from Simple Assumptions.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

A Lattice-Based Group Signature Scheme with Message-Dependent Opening.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions.
IACR Cryptology ePrint Archive, 2015

Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions.
IACR Cryptology ePrint Archive, 2015

Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications.
IACR Cryptology ePrint Archive, 2015

Linearly homomorphic structure-preserving signatures and their applications.
Des. Codes Cryptogr., 2015

Secure Efficient History-Hiding Append-Only Signatures in the Standard Model.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

Applications of Structure-Preserving Cryptography and Pairing-Based NIZK Proofs.
, 2015

2014
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security.
IACR Cryptology ePrint Archive, 2014

Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014

Traceable Group Encryption.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Group Signatures with Message-Dependent Opening in the Standard Model.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Adaptively secure non-interactive threshold cryptosystems.
Theor. Comput. Sci., 2013

Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.
IACR Cryptology ePrint Archive, 2013

Linearly Homomorphic Structure-Preserving Signatures and Their Applications.
IACR Cryptology ePrint Archive, 2013

Lattice-Based Group Signatures with Logarithmic Signature Size.
IACR Cryptology ePrint Archive, 2013

Efficient Cryptosystems From 2k-th Power Residue Symbols.
IACR Cryptology ePrint Archive, 2013

Robust Encryption, Revisited.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data.
Proceedings of the Financial Cryptography and Data Security, 2013

Efficient Cryptosystems from 2 k -th Power Residue Symbols.
Proceedings of the Advances in Cryptology, 2013

Linearly Homomorphic Structure-Preserving Signatures and Their Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Lattice-Based Group Signatures with Logarithmic Signature Size.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Attribute-based encryption schemes with constant-size ciphertexts.
Theor. Comput. Sci., 2012

Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation.
J. Mathematical Cryptology, 2012

Group Signatures with Almost-for-free Revocation.
IACR Cryptology ePrint Archive, 2012

Scalable Group Signatures with Revocation.
IACR Cryptology ePrint Archive, 2012

Robust Encryption, Revisited.
IACR Cryptology ePrint Archive, 2012

Hierarchical Identity-Based (Lossy) Trapdoor Functions.
IACR Cryptology ePrint Archive, 2012

Hierarchical Identity-Based Lossy Trapdoor Functions
CoRR, 2012

Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Divisible E-Cash in the Standard Model.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

Scalable Group Signatures with Revocation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Short Attribute-Based Signatures for Threshold Predicates.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Group Signatures with Almost-for-Free Revocation.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Fully Forward-Secure Group Signatures.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

Computing on Authenticated Data: New Privacy Definitions and Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability With Short Ciphertexts and Private Keys.
IEEE Trans. Information Theory, 2011

Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption.
IEEE Trans. Information Theory, 2011

Efficient traceable signatures in the standard model.
Theor. Comput. Sci., 2011

Anonymous Broadcast Encryption.
IACR Cryptology ePrint Archive, 2011

Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Homomorphic Network Coding Signatures in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

Adaptively Secure Non-interactive Threshold Cryptosystems.
Proceedings of the Automata, Languages and Programming - 38th International Colloquium, 2011

Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Signcryption Schemes Based on Bilinear Maps.
Proceedings of the Practical Signcryption, 2010

Signcryption Schemes Based on the Diffie-Hellman Problem.
Proceedings of the Practical Signcryption, 2010

Key Evolution Systems in Untrusted Update Environments.
ACM Trans. Inf. Syst. Secur., 2010

Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation.
Proceedings of the Public Key Cryptography, 2010

Efficient Completely Non-malleable Public Key Encryption.
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010

Dynamic fully forward-secure group signatures.
Proceedings of the 5th ACM Symposium on Information, 2010

Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Proceedings of the Progress in Cryptology, 2010

2009
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security.
IACR Cryptology ePrint Archive, 2009

Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys.
Proceedings of the Public Key Cryptography, 2009

Efficient Traceable Signatures in the Standard Model.
Proceedings of the Pairing-Based Cryptography, 2009

Adaptive-ID Secure Revocable Identity-Based Encryption.
Proceedings of the Topics in Cryptology, 2009

Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

Group Encryption: Non-interactive Realization in the Standard Model.
Proceedings of the Advances in Cryptology, 2009

2008
Efficient Accountable Authority Identity-Based Encryption under Static Complexity Assumptions
CoRR, 2008

Multi-Use Unidirectional Proxy Re-Signatures
CoRR, 2008

Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption.
Proceedings of the Public Key Cryptography, 2008

Certificateless Encryption Schemes Strongly Secure in the Standard Model.
Proceedings of the Public Key Cryptography, 2008

Tracing Malicious Proxies in Proxy Re-encryption.
Proceedings of the Pairing-Based Cryptography, 2008

Key Evolution Systems in Untrusted Update Environments.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Multi-use unidirectional proxy re-signatures.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Certificateless Encryption Schemes Strongly Secure in the Standard Model.
IACR Cryptology ePrint Archive, 2007

Parallel Key-Insulated Public Key Encryption Without Random Oracles.
Proceedings of the Public Key Cryptography, 2007

Practical Time Capsule Signatures in the Standard Model from Bilinear Maps.
Proceedings of the Pairing-Based Cryptography, 2007

Forward-secure signatures in untrusted update environments: efficient and generic constructions.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

On Constructing Certificateless Cryptosystems from Identity Based Encryption.
Proceedings of the Public Key Cryptography, 2006

Efficient Intrusion-Resilient Signatures Without Random Oracles.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

2005
Identity-Based Cryptosystems.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Efficient and Non-interactive Timed-Release Encryption.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps.
Proceedings of the Advances in Cryptology, 2005

Identity Based Encryption Without Redundancy.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
The Exact Security of an Identity Based Signature and its Applications.
IACR Cryptology ePrint Archive, 2004

Improved Signcryption from q-Diffie-Hellman Problems.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups.
Proceedings of the Public Key Cryptography, 2004

Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA.
Proceedings of the Information Security, 7th International Conference, 2004

What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved.
Proceedings of the Public Key Infrastructure, 2004

Identity Based Undeniable Signatures.
Proceedings of the Topics in Cryptology, 2004

2003
Identity Based Undeniable Signatures.
IACR Cryptology ePrint Archive, 2003

New identity based signcryption schemes from pairings.
IACR Cryptology ePrint Archive, 2003

Efficient revocation and threshold pairing based cryptosystems.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003

A new identity based signcryption scheme from pairings.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003


  Loading...