Olivier Blazy

Orcid: 0000-0001-6205-8249

According to our database1, Olivier Blazy authored at least 74 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Threshold Reporting Protocol for Traceability in Anonymous Social Networks.
IACR Cryptol. ePrint Arch., 2025

Quantum-resistant secret handshakes with dynamic joining, leaving, and banishment: GCD revisited.
IACR Cryptol. ePrint Arch., 2025

Bivariate Proximity Test-Based Asynchronous Verifiable Secret Sharing.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2025, 2025

2024
A Public Key Identity-Based Revocation Scheme: - Fully Attribute-Hiding and Function Private.
Proceedings of the Topics in Cryptology - CT-RSA 2024, 2024

Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2024, 2024

2023
Anonymous attribute-based designated verifier signature.
J. Ambient Intell. Humaniz. Comput., October, 2023

How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment.
Proceedings of the 32nd USENIX Security Symposium, 2023

Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

Efficient Implementation of a Post-Quantum Anonymous Credential Protocol.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Ouroboros: An Efficient and Provably Secure KEM Family.
IEEE Trans. Inf. Theory, 2022

Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone.
CoRR, 2022

MARSHAL: messaging with asynchronous ratchets and signatures for faster HeALing.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

(Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard.
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022

Identity-Based Encryption in DDH Hard Groups.
Proceedings of the Progress in Cryptology, 2022

2021
Hardware security without secure hardware: How to decrypt with a password and a server.
Theor. Comput. Sci., 2021

Generic Plaintext Equality and Inequality Proofs (Extended Version).
IACR Cryptol. ePrint Arch., 2021

A Gapless Code-Based Hash Proof System based on RQC and its Applications.
IACR Cryptol. ePrint Arch., 2021

An IoT Attribute-Based Security Framework for Topic-Based Publish/Subscribe Systems.
IEEE Access, 2021

Zero-Knowledge Reparation of the Véron and AGS Code-based Identification Schemes.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Generic Plaintext Equality and Inequality Proofs.
Proceedings of the Financial Cryptography and Data Security, 2021

How to (Legally) Keep Secrets from Mobile Operators.
Proceedings of the Computer Security - ESORICS 2021, 2021

A Correction to a Code-Based Blind Signature Scheme.
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021

A Rank Metric Code-Based Group Signature Scheme.
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021

An Anonymous Trace-and-Revoke Broadcast Encryption Scheme.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

Secure Decision Forest Evaluation.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications.
Peer-to-Peer Netw. Appl., 2020

Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE).
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis of a rank-based signature with short public keys.
Des. Codes Cryptogr., 2020

CCA-Secure ABE Using Tag and Pair Encoding.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Skipping the q in Group Signatures.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Round-optimal Constant-size Blind Signatures.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

CROOT: Code-based Round-Optimal Oblivious Transfer.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Public-Key Generation with Verifiable Randomness.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Durandal: A Rank Metric Based Signature Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Downgradable Identity-Based Encryption and Applications.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Anonymous Identity Based Encryption with Traceable Identities.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Hash Proof Systems over Lattices Revisited.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Spreading Alerts Quietly: New Insights from Theory and Practice.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Non-Interactive Key Exchange from Identity-Based Encryption.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A code-based blind signature.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Almost Optimal Oblivious Transfer from QA-NIZK.
Proceedings of the Applied Cryptography and Network Security, 2017

Efficient ID-based Designated Verifier Signature.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Efficient Encryption from Random Quasi-Cyclic Codes.
IACR Cryptol. ePrint Arch., 2016

Adaptive Oblivious Transfer and Generalizations.
IACR Cryptol. ePrint Arch., 2016

A Code-Based Group Signature Scheme.
IACR Cryptol. ePrint Arch., 2016

A Practical Group Signature Scheme Based on Rank Metric.
Proceedings of the Arithmetic of Finite Fields - 6th International Workshop, 2016

Two Secure Anonymous Proxy-based Data Storages.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Anonymizable Ring Signature Without Pairing.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Adaptive Oblivious Transfer and Generalization.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Structure-Preserving Smooth Projective Hashing.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Group Signatures Without q-Assumptions.
IACR Cryptol. ePrint Arch., 2015

Tightly-Secure Signatures from Chameleon Hash Functions.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Non-Interactive Zero-Knowledge Proofs of Non-Membership.
Proceedings of the Topics in Cryptology, 2015

Generic Construction of UC-Secure Oblivious Transfer.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
(Hierarchical) Identity-Based Encryption from Affine Message Authentication.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Short blind signatures.
J. Comput. Secur., 2013

New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2013

Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

New Techniques for SPHFs and Efficient One-Round PAKE Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

SPHF-Friendly Non-interactive Commitments.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

Analysis and Improvement of Lindell's UC-Secure Commitment Schemes.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Preuves de connaissances interactives et non-interactives. ((Non-)Interactive Proofs of Knowledge).
PhD thesis, 2012

Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.
IACR Cryptol. ePrint Arch., 2012

Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Compact Round-Optimal Partially-Blind Signatures.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Traceable Signature with Stepping Capabilities.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Signatures on Randomizable Ciphertexts.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Achieving Optimal Anonymity in Transferable E-Cash with a Judge.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
Batch Groth-Sahai.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010


  Loading...