Michel Abdalla

Orcid: 0000-0002-2447-4329

According to our database1, Michel Abdalla authored at least 90 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Practical dynamic group signatures without knowledge extractors.
Des. Codes Cryptogr., March, 2023

2022
Password-Authenticated Key Exchange from Group Actions.
IACR Cryptol. ePrint Arch., 2022

2021
Practical dynamic group signature with efficient concurrent joins and batch verifications.
J. Inf. Secur. Appl., 2021

Private Stream Aggregation from Labeled Secret Sharing Schemes.
IACR Cryptol. ePrint Arch., 2021

2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product.
IACR Cryptol. ePrint Arch., 2021

Security Analysis of CPace.
IACR Cryptol. ePrint Arch., 2021

Security Characterization of J-PAKE and its Variants.
IACR Cryptol. ePrint Arch., 2021

Algebraic Adversaries in the Universal Composability Framework.
IACR Cryptol. ePrint Arch., 2021

2020
Corrigendum: Public-key encryption indistinguishable under plaintext-checkable attacks.
IET Inf. Secur., 2020

Functional Encryption for Attribute-Weighted Sums from k-Lin.
IACR Cryptol. ePrint Arch., 2020

Inner-Product Functional Encryption with Fine-Grained Access Control.
IACR Cryptol. ePrint Arch., 2020

Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model.
IACR Cryptol. ePrint Arch., 2020

Universally Composable Relaxed Password Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2020

Security Analysis of Olvid's SAS-based Trust Establishment Protocol.
IACR Cryptol. ePrint Arch., 2020

2019
On the Tightness of Forward-Secure Signature Reductions.
J. Cryptol., 2019

New technique for chosen-ciphertext security based on non-interactive zero-knowledge.
Inf. Sci., 2019

Decentralizing Inner-Product Functional Encryption.
IACR Cryptol. ePrint Arch., 2019

From Single-Input to Multi-Client Inner-Product Functional Encryption.
IACR Cryptol. ePrint Arch., 2019

Perfect Forward Security of SPAKE2.
IACR Cryptol. ePrint Arch., 2019

2018
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.
J. Cryptol., 2018

Robust Encryption.
J. Cryptol., 2018

2017
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings.
IACR Cryptol. ePrint Arch., 2017

Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps.
IACR Cryptol. ePrint Arch., 2017

Multi-input Inner-Product Functional Encryption from Pairings.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

2016
Tightly Secure Signatures From Lossy Identification Schemes.
J. Cryptol., 2016

Public-key encryption indistinguishable under plaintext-checkable attacks.
IET Inf. Secur., 2016

Multi-Input Inner-Product Functional Encryption from Pairings.
IACR Cryptol. ePrint Arch., 2016

Robust Password-Protected Secret Sharing.
IACR Cryptol. ePrint Arch., 2016

Better Security for Functional Encryption for Inner Product Evaluations.
IACR Cryptol. ePrint Arch., 2016

Secure architectures of future emerging cryptography <i>SAFEcrypto</i>.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

2015
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2015

Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security.
IACR Cryptol. ePrint Arch., 2015

An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security.
IACR Cryptol. ePrint Arch., 2015

Tighter Reductions for Forward-Secure Signature Schemes.
IACR Cryptol. ePrint Arch., 2015

Leakage-Resilient Symmetric Encryption via Re-keying.
IACR Cryptol. ePrint Arch., 2015

Simple Functional Encryption Schemes for Inner Products.
IACR Cryptol. ePrint Arch., 2015

Security of the J-PAKE Password-Authenticated Key Exchange Protocol.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions.
J. Cryptol., 2014

SPOKE: Simple Password-Only Key Exchange in the Standard Model.
IACR Cryptol. ePrint Arch., 2014

Disjunctions for Hash Proof Systems: New Constructions and Applications.
IACR Cryptol. ePrint Arch., 2014

Removing Erasures with Explainable Hash Proof Systems.
IACR Cryptol. ePrint Arch., 2014

Password-Based Authenticated Key Exchange: An Overview.
Proceedings of the Provable Security - 8th International Conference, 2014

Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools.
Proceedings of the Information Security Practice and Experience, 2014

2013
SPHF-Friendly Non-Interactive Commitments.
IACR Cryptol. ePrint Arch., 2013

2012
Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption.
IEEE Trans. Inf. Forensics Secur., 2012

From Selective to Full Security: Semi-Generic Transformations in the Standard Model.
IACR Cryptol. ePrint Arch., 2012

Leakage-Resilient Spatial Encryption.
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012

Lattice-Based Hierarchical Inner Product Encryption.
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012

Somewhat homomorphic encryption scheme for arithmetic operations on large integers.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2012

2011
Wildcarded Identity-Based Encryption.
J. Cryptol., 2011

Contributory Password-Authenticated Group Key Exchange with Join Capability.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Reducing The Need For Trusted Parties In Cryptography. (Limiter le besoin de tiers de confiance en cryptographie).
, 2011

2010
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys.
Proceedings of the Progress in Cryptology, 2010

2009
Distributed Public-Key Cryptography from Weak Secrets.
Proceedings of the Public Key Cryptography, 2009

Verifiable Random Functions from Identity-Based Key Encapsulation.
Proceedings of the Advances in Cryptology, 2009

Smooth Projective Hashing for Conditionally Extractable Commitments.
Proceedings of the Advances in Cryptology, 2009

Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness.
Proceedings of the Progress in Cryptology, 2009

2008
From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security.
IEEE Trans. Inf. Theory, 2008

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
J. Cryptol., 2008

Generalised key delegation for hierarchical identity-based encryption.
IET Inf. Secur., 2008

Securing wireless sensor networks against aggregator compromises.
IEEE Commun. Mag., 2008

Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework.
Proceedings of the Topics in Cryptology, 2008

Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol.
Int. J. Secur. Networks, 2007

A Study of Blind Message Authentication Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Generalized Key Delegation for Hierarchical Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2007

(Password) Authenticated Key Establishment: From 2-Party to Group.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

Identity-Based Traitor Tracing.
Proceedings of the Public Key Cryptography, 2007

2006
Identity-Based Encryption Gone Wild.
IACR Cryptol. ePrint Arch., 2006

Share and Disperse: How to Resist Against Aggregator Compromises in Sensor Networks
CoRR, 2006

Password-Based Group Key Exchange in a Constant Number of Rounds.
Proceedings of the Public Key Cryptography, 2006

On the (Im)possibility of Blind Message Authentication Codes.
Proceedings of the Topics in Cryptology, 2006

Resisting against aggregator compromises in sensor networks.
Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, 2006

Provably secure password-based authentication in TLS.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

A Scalable Password-Based Group Key Exchange Protocol in the Standard Model.
Proceedings of the Advances in Cryptology, 2006

2005
One-Time Verifier-Based Encrypted Key Exchange.
Proceedings of the Public Key Cryptography, 2005

Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication.
Proceedings of the Financial Cryptography and Data Security, 2005

Simple Password-Based Encrypted Key Exchange Protocols.
Proceedings of the Topics in Cryptology, 2005

A Simple Threshold Authenticated Key Exchange from Short Secrets.
Proceedings of the Advances in Cryptology, 2005

2004
Password-Based Authenticated Key Exchange in the Three-Party Setting.
IACR Cryptol. ePrint Arch., 2004

On the Minimal Assumptions of Group Signature Schemes.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

2002
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security.
IACR Cryptol. ePrint Arch., 2002

2001
Forward-Secure Threshold Signature Schemes.
Proceedings of the Topics in Cryptology, 2001

The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES.
Proceedings of the Topics in Cryptology, 2001

2000
Key management for restricted multicast using broadcast encryption.
IEEE/ACM Trans. Netw., 2000

A New Forward-Secure Digital Signature Scheme.
IACR Cryptol. ePrint Arch., 2000

Forward Security in Threshold Signature Schemes.
IACR Cryptol. ePrint Arch., 2000

Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques.
Proceedings of the Advances in Cryptology, 2000

1999
DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem.
IACR Cryptol. ePrint Arch., 1999

Towards Making Broadcast Encryption Practical.
Proceedings of the Financial Cryptography, 1999


  Loading...