Fabrice Benhamouda

Orcid: 0000-0002-8300-1820

Affiliations:
  • Amazon AWS, New York, USA
  • IBM Research, Yorktown Heights, NY, USA (former)
  • École Normale Supérieure, Paris, France (PhD 2016)
  • PSL Research University, Paris, France (PhD 2016)


According to our database1, Fabrice Benhamouda authored at least 61 papers between 2012 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Blockcipher-Based Key Derivation without PRP/PRF Switching.
IACR Cryptol. ePrint Arch., 2025

Gold OPRF: Post-Quantum Oblivious Power-Residue PRF.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Encrypted Matrix-Vector Products from Secret Dual Codes.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
SPRINT: High-Throughput Robust Distributed Schnorr Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2023
Analyzing the Real-World Security of the Algorand Blockchain.
IACR Cryptol. ePrint Arch., 2023

Weighted Secret Sharing from Wiretap Channels.
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023

Anonymous Counting Tokens.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Publicly verifiable anonymous tokens with private metadata bit.
IACR Cryptol. ePrint Arch., 2022

Threshold Cryptography as a Service (in the Multiserver and YOSO Models).
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning.
Proc. Priv. Enhancing Technol., 2021

Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC.
IACR Cryptol. ePrint Arch., 2021

Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

On the (in)security of ROS.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Multiparty Reusable Non-interactive Secure Computation from LWE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Corrigendum: Public-key encryption indistinguishable under plaintext-checkable attacks.
IET Inf. Secur., 2020

On the (in)security of ROS.
IACR Cryptol. ePrint Arch., 2020

Multiparty Reusable Non-Interactive Secure Computation.
IACR Cryptol. ePrint Arch., 2020

Can a Blockchain Keep a Secret?
IACR Cryptol. ePrint Arch., 2020

Mr NISC: Multiparty Reusable Non-Interactive Secure Computation.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Can a Public Blockchain Keep a Secret?
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

2019
Decentralizing Inner-Product Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Initial Public Offering (IPO) on Permissioned Blockchain Using Secure Multiparty Computation.
Proceedings of the IEEE International Conference on Blockchain, 2019

Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

From Single-Input to Multi-client Inner-Product Functional Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
How to Profile Privacy-Conscious Users in Recommender Systems.
CoRR, 2018

Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Hash Proof Systems over Lattices Revisited.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

On the Local Leakage Resilience of Linear Secret Sharing Schemes.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Efficient Cryptosystems From 2<sup>k</sup>-th Power Residue Symbols.
J. Cryptol., 2017

k-Round MPC from k-Round OT via Garbled Interactive Circuits.
IACR Cryptol. ePrint Arch., 2017

On the Tightness of Forward-Secure Signature Reductions.
IACR Cryptol. ePrint Arch., 2017

Optimization of Bootstrapping in Circuits.
Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, 2017

CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Removing Erasures with Explainable Hash Proof Systems.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Non-interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms.
Proceedings of the Computer Security - ESORICS 2017, 2017

Robust Non-interactive Multiparty Computation Against Constant-Size Collusion.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Private Multiplication over Finite Fields.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Diverse modules and zero-knowledge.
PhD thesis, 2016

A New Framework for Privacy-Preserving Aggregation of Time-Series Data.
ACM Trans. Inf. Syst. Secur., 2016

Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Randomness Complexity of Private Circuits for Multiplication.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

2015
Security of the J-PAKE Password-Authenticated Key Exchange Protocol.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Disjunctions for Hash Proof Systems: New Constructions and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings.
Proceedings of the Computer Security - ESORICS 2015, 2015

Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
SPOKE: Simple Password-Only Key Exchange in the Standard Model.
IACR Cryptol. ePrint Arch., 2014

Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Trapdoor Smooth Projective Hash Functions.
IACR Cryptol. ePrint Arch., 2013

New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2013

Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions.
IACR Cryptol. ePrint Arch., 2013

Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Tighter Reductions for Forward-Secure Signature Schemes.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

New Techniques for SPHFs and Efficient One-Round PAKE Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

SPHF-Friendly Non-interactive Commitments.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
From Rational Number Reconstruction to Set Reconciliation and File Synchronization.
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012


  Loading...