Xavier Boyen

According to our database1, Xavier Boyen authored at least 103 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
LACT+: Practical Post-Quantum Scalable Confidential Transactions.
Cryptogr., June, 2023

An asset-backed decentralised finance instrument for food supply chains - A case study from the livestock export industry.
Comput. Ind., May, 2023

ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption.
IEEE Trans. Dependable Secur. Comput., 2023

Identity-Based Matchmaking Encryption with Enhanced Privacy - A Generic Construction with Practical Instantiations.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Practical UC-Secure Zero-Knowledge Smart Contracts.
IACR Cryptol. ePrint Arch., 2022

Aggregable Confidential Transactions for Efficient Quantum-Safe Cryptocurrencies.
IEEE Access, 2022

Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers?
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications.
IEEE Trans. Veh. Technol., 2021

On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side!
IEEE Trans. Inf. Forensics Secur., 2021

CCA-security from adaptive all-but-one lossy trapdoor functions.
Theor. Comput. Sci., 2021

Efficient public-key encryption with equality test from lattices.
Theor. Comput. Sci., 2021

Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting.
IACR Cryptol. ePrint Arch., 2021

Authentication strategies in vehicular communications: a taxonomy and framework.
EURASIP J. Wirel. Commun. Netw., 2021

Associative Blockchain for Decentralized PKI Transparency.
Cryptogr., 2021

The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration.
Cryptogr., 2021

Integrating On-chain and Off-chain Governance for Supply Chain Transparency and Integrity.
CoRR, 2021

Towards Verifiable Remote Voting with Paper Assurance.
CoRR, 2021

From premise to practice of social consensus: How to agree on common knowledge in blockchain-enabled supply chains.
Comput. Networks, 2021

Origami Store: UC-Secure Foldable Datachains for the Quantum Era.
IEEE Access, 2021

Secure Hybrid Encryption in the Standard Model from Hard Learning Problems.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach.
Proceedings of the Financial Cryptography and Data Security, 2021

Anonymous Lattice Identity-Based Encryption with Traceable Identities.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing.
IACR Cryptol. ePrint Arch., 2020

A Simple and Efficient CCA-Secure Lattice KEM in the Standard Model.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Compact Multi-Party Confidential Transactions.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

2019
Signcryption schemes with insider security in an ideal permutation model.
J. Math. Cryptol., 2019

Direct CCA-Secure KEM and Deterministic PKE from Plain LWE.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

A Survey of Anonymity of Cryptocurrencies.
Proceedings of the Australasian Computer Science Week Multiconference, 2019

2018
Forward-Secure Linkable Ring Signatures from Bilinear Maps.
Cryptogr., 2018

Graphchain: a Blockchain-Free Scalable Decentralised Ledger.
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018

Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption on Lattices.
Proceedings of the Applied Cryptography and Network Security, 2018

Forward-Secure Linkable Ring Signatures.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
All-But-Many Lossy Trapdoor Functions from Lattices and Applications.
IACR Cryptol. ePrint Arch., 2017

Key Recovery: Inert and Public.
IACR Cryptol. ePrint Arch., 2017

Bitcoin Unchained.
ERCIM News, 2017

2016
Unconditionally Anonymous Ring and Mesh Signatures.
J. Cryptol., 2016

Proxy Re-Encryption Schemes with Key Privacy from LWE.
IACR Cryptol. ePrint Arch., 2016

Towards Tightly Secure Short Signature and IBE.
IACR Cryptol. ePrint Arch., 2016

Blockchain-Free Cryptocurrencies. A Rational Framework for Truly Decentralised Fast Transactions.
IACR Cryptol. ePrint Arch., 2016

Truly Multi-authority 'Prêt-à-Voter'.
Proceedings of the Electronic Voting - First International Joint Conference, 2016

The Case For Human Primacy in Cryptography - (Summary from the Keynote Lecture).
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Towards Tightly Secure Lattice Short Signature and Id-Based Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

VOTOR: conceptually simple remote voting against tiny tyrants.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Attribute-Based Encryption for Finite Automata from LWE.
Proceedings of the Provable Security, 2015

Being Thrifty on a $100K Wage: Austerity in Family Finances.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

2014
Sealing the Leak on Classical NTRU signatures.
IACR Cryptol. ePrint Arch., 2014

Adaptively Secure Fully Homomorphic Signatures Based on Lattices.
IACR Cryptol. ePrint Arch., 2014

2013
Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting.
IACR Cryptol. ePrint Arch., 2013

Key-Private Proxy Re-encryption under LWE.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

Expressive Cryptography: Lattice Perspectives.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Attribute-Based Functional Encryption on Lattices.
IACR Cryptol. ePrint Arch., 2012

Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Bitter to Better - How to Make Bitcoin a Better Currency.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Efficient Selective Identity-Based Encryption Without Random Oracles.
J. Cryptol., 2011

Fuzzy Identity Based Encryption from Lattices.
IACR Cryptol. ePrint Arch., 2011

Expressive Encryption Systems from Lattices - (Abstract from the Invited Lecture).
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Identity-Based Signcryption.
Proceedings of the Practical Signcryption, 2010

Preventing Pollution Attacks in Multi-Source Network Coding.
IACR Cryptol. ePrint Arch., 2010

Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More.
Proceedings of the Public Key Cryptography, 2010

Efficient Lattice (H)IBE in the Standard Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Kamouflage: Loss-Resistant Password Management.
Proceedings of the Computer Security, 2010

Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE.
Proceedings of the Advances in Cryptology, 2010

Strong Cryptography from Weak Secrets.
Proceedings of the Progress in Cryptology, 2010

Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Generalized IBE in the Exponent-Inversion Framework.
Proceedings of the Identity-Based Cryptography, 2009

Flexible IBE and Beyond in the Commutative-Blinding Framework.
Proceedings of the Identity-Based Cryptography, 2009

Distributed Public-Key Cryptography from Weak Secrets.
Proceedings of the Public Key Cryptography, 2009

Hidden credential retrieval from a reusable password.
Proceedings of the 2009 ACM Symposium on Information, 2009

HPAKE : Password Authentication Secure against Cross-Site User Impersonation.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups.
J. Cryptol., 2008

A tapestry of identity-based encryption: practical frameworks compared.
Int. J. Appl. Cryptogr., 2008

Expressive Subgroup Signatures.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

The Uber-Assumption Family.
Proceedings of the Pairing-Based Cryptography, 2008

New Paradigms for Password Security.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Identity-Based Cryptography Standard (IBCS) #1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems.
RFC, December, 2007

Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants.
IACR Cryptol. ePrint Arch., 2007

Halting Password Puzzles: Hard-to-break Encryption from Human-memorable Keys.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Full-Domain Subgroup Hiding and Constant-Size Group Signatures.
Proceedings of the Public Key Cryptography, 2007

General <i>Ad Hoc</i> Encryption from Exponent Inversion IBE.
Proceedings of the Advances in Cryptology, 2007

Mesh Signatures.
Proceedings of the Advances in Cryptology, 2007

Miniature CCA2 PK Encryption: Tight Security Without Redundancy.
Proceedings of the Advances in Cryptology, 2007

2006
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles).
IACR Cryptol. ePrint Arch., 2006

Forward-Secure Signatures with Untrusted Update.
IACR Cryptol. ePrint Arch., 2006

A Promenade through the New Cryptography of Bilinear Pairings.
Proceedings of the 2006 IEEE Information Theory Workshop, 2006

Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles.
Proceedings of the Topics in Cryptology, 2006

On the Impossibility of Efficiently Combining Collision Resistant Hash Functions.
Proceedings of the Advances in Cryptology, 2006

2005
Compact Group Signatures Without Random Oracles.
IACR Cryptol. ePrint Arch., 2005

Direct Chosen Ciphertext Security from Identity-Based Techniques.
IACR Cryptol. ePrint Arch., 2005

Hierarchical Identity Based Encryption with Constant Size Ciphertext.
IACR Cryptol. ePrint Arch., 2005

Secure Remote Authentication Using Biometric Data.
Proceedings of the Advances in Cryptology, 2005

2004
Reusable Cryptographic Fuzzy Extractors.
IACR Cryptol. ePrint Arch., 2004

Short Group Signatures.
IACR Cryptol. ePrint Arch., 2004

Secure Identity Based Encryption Without Random Oracles.
IACR Cryptol. ePrint Arch., 2004

Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles.
IACR Cryptol. ePrint Arch., 2004

Short Signatures Without Random Oracles.
IACR Cryptol. ePrint Arch., 2004

2003
Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography.
IACR Cryptol. ePrint Arch., 2003

2002
Inference and learning in complex stochastic processes.
PhD thesis, 2002

1999
Automatic induction of fuzzy decision trees and its application to power system security assessment.
Fuzzy Sets Syst., 1999

Discovering the Hidden Structure of Complex Dynamic Systems.
Proceedings of the UAI '99: Proceedings of the Fifteenth Conference on Uncertainty in Artificial Intelligence, Stockholm, Sweden, July 30, 1999

Exploiting the Architecture of Dynamic Systems.
Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, 1999

1998
Tractable Inference for Complex Stochastic Processes.
Proceedings of the UAI '98: Proceedings of the Fourteenth Conference on Uncertainty in Artificial Intelligence, 1998

Approximate Learning of Dynamic Models.
Proceedings of the Advances in Neural Information Processing Systems 11, [NIPS Conference, Denver, Colorado, USA, November 30, 1998


  Loading...