Duong Hieu Phan

Affiliations:
  • University of Limoges, France
  • Ecole Normale Supérieure, Paris, France


According to our database1, Duong Hieu Phan authored at least 52 papers between 2003 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Zero-Knowledge Proofs for Committed Symmetric Boolean Functions.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

An Anonymous Trace-and-Revoke Broadcast Encryption Scheme.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Catalic: Delegated PSI Cardinality with Applications to Contact Tracing.
IACR Cryptol. ePrint Arch., 2020

A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes.
IACR Cryptol. ePrint Arch., 2020

Dynamic Decentralized Functional Encryption.
IACR Cryptol. ePrint Arch., 2020

Advances in security research in the Asiacrypt region.
Commun. ACM, 2020

2019
Linearly-Homomorphic Signatures and Scalable Mix-Nets.
IACR Cryptol. ePrint Arch., 2019

Traceable Inner Product Functional Encryption.
IACR Cryptol. ePrint Arch., 2019

Anonymous Identity Based Encryption with Traceable Identities.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption.
Theor. Comput. Sci., 2018

Attribute-based broadcast encryption scheme for lightweight devices.
IET Inf. Secur., 2018

Decentralized Evaluation of Quadratic Polynomials on Encrypted Data.
IACR Cryptol. ePrint Arch., 2018

Multi-Client Functional Encryption with Repetition for Inner Product.
IACR Cryptol. ePrint Arch., 2018

Downgradable Identity-based Encryption and Applications.
IACR Cryptol. ePrint Arch., 2018

2017
Identity-based Encryption from Codes with Rank Metric.
IACR Cryptol. ePrint Arch., 2017

Decentralized Multi-Client Functional Encryption for Inner Product.
IACR Cryptol. ePrint Arch., 2017

Efficient Public Trace and Revoke from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2017

Cryptography during the French and American Wars in Vietnam.
Cryptologia, 2017

Hardness of k-LWE and Applications in Traitor Tracing.
Algorithmica, 2017

Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms.
IACR Cryptol. ePrint Arch., 2016

A New Technique for Compacting Secret Key in Attribute-Based Broadcast Encryption.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2014
Some Advances in Broadcast Encryption and Traitor Tracing.
, 2014

2013
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts.
Int. J. Inf. Sec., 2013

Black-Box Trace&Revoke Codes.
Algorithmica, 2013

Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model.
Proceedings of the Progress in Cryptology, 2013

Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model.
Proceedings of the Progress in Cryptology, 2013

2012
Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption.
IEEE Trans. Inf. Forensics Secur., 2012

Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography.
IACR Cryptol. ePrint Arch., 2012

Multi-Channel Broadcast Encryption.
IACR Cryptol. ePrint Arch., 2012

Decentralized Dynamic Broadcast Encryption.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Message-Based Traitor Tracing with Optimal Ciphertext Rate.
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012

2011
Adaptively Secure Broadcast Encryption with Forward Secrecy.
IACR Cryptol. ePrint Arch., 2011

Identity-Based Trace and Revoke Schemes.
Proceedings of the Provable Security - 5th International Conference, 2011

Security Notions for Broadcast Encryption.
Proceedings of the Applied Cryptography and Network Security, 2011

2009
Traitors Collaborating in Public: Pirates 2.0.
Proceedings of the Advances in Cryptology, 2009

2008
A CCA Secure Hybrid Damgård's ElGamal Encryption.
Proceedings of the Provable Security, Second International Conference, 2008

Efficient Traitor Tracing from Collusion Secure Codes.
Proceedings of the Information Theoretic Security, Third International Conference, 2008

Hybrid Damgård Is CCA1-Secure under the DDH Assumption.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Identity-Based Traitor Tracing.
Proceedings of the Public Key Cryptography, 2007

Traitor Tracing with Optimal Transmission Rate.
Proceedings of the Information Security, 10th International Conference, 2007

2006
Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate.
Proceedings of the Progressin Cryptology, 2006

Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

2005
Sécurité et efficacité des schémas cryptographiques. (Security and Efficiency of Cryptographic Schemes).
PhD thesis, 2005

Public Traceability in Traitor Tracing Schemes.
Proceedings of the Advances in Cryptology, 2005

Optimal Asymmetric Encryption and Signature Paddings.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
On the Security Notions for Public-Key Encryption Schemes.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations).
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding.
Proceedings of the Advances in Cryptology, 2004

2003
Some Preliminary Results on the Stableness of Extended F-rule Systems.
J. Adv. Comput. Intell. Intell. Informatics, 2003

Une comparaison entre deux méthodes de preuve de sécurité.
Proceedings of the Actes de la Première Conférence Internationale RIVF'03 Rencontres en Informatique Vietnam-France, 2003

Chosen-Ciphertext Security without Redundancy.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003


  Loading...