publications
publications by type in reversed chronological order
Books edited
-
Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings
Springer, Lecture Notes in Computer Science, vol. 8469, (2014).
doi -
Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings
Lecture Notes in Computer Science, vol. 5536, (2009).
doi
International journals
-
Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions
IACR Comm. in Cryptology. 1 (to appear), 1, (2024).
open access -
Secure Multi-Party Linear Algebra with Perfect Correctness
IACR Comm. in Cryptology. 1 (to appear), 1, (2024). -
Lattice attacks on pairing-based signatures
Inf. Secur. J. A Glob. Perspect. 33, 2, pp. 138-157 (2024).
open access doi -
Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach
IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023, 4, pp. 188–210 (2023).
open access doi -
Secure storage - Confidentiality and Authentication
Comput. Sci. Rev. 44, pp. 100465 (2022).
open access doi -
Cryptanalysis of Modular Exponentiation Outsourcing Protocols
Comput. J. 65, 9, pp. 2299-2314 (2022).
open access doi -
Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server
Theor. Comput. Sci. 895, pp. 178–211 (2021).
open access doi -
Probing Security through Input-Output Separation and Revisited Quasilinear Masking
IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021, 3, pp. 599–640 (2021).
open access doi video -
Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND
SIAM J. Discret. Math. 35, 1, pp. 465-484 (2021).
open access doi -
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
Algorithmica 83, 1, pp. 72-115 (2021).
open access doi -
Speeding-Up Verification of Digital Signatures
J. Comput. Syst. Sci. 116, pp. 22-39 (2021).
open access doi -
Comment on "Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things"
IEEE Internet Things J. 7, 11, pp. 11327-11329 (2020).
open access doi -
Inferring sequences produced by elliptic curve generators using Coppersmith’s methods
Theor. Comput. Sci. 830-831, pp. 20-42 (2020).
open access doi -
Cryptanalysis of Server-Aided RSA Protocols with Private-Key Splitting
Comput. J. 62, 8, pp. 1194–1213 (2019).
open access doi -
Polynomial interpolation of the generalized Diffie-Hellman and Naor-Reingold functions
Des. Codes Cryptogr. 87, 1, pp. 75–85 (2019).
open access doi -
Polynomial interpolation of the Naor-Reingold pseudo-random function
Appl. Algebra Eng. Commun. Comput. 28, 3, pp. 237–255 (2017).
open access doi -
Comment on ’Attribute-Based Signatures for Supporting Anonymous Certification’ by N. Kaaniche and M. Laurent (ESORICS 2016)
Comput. J. 60, 12, pp. 1801–1808 (2017).
open access doi -
Security of Even-Mansour Ciphers under Key-Dependent Messages
IACR Trans. Symmetric Cryptol. 2017, 2, pp. 84–104 (2017).
open access doi -
Comment on "A strong provably secure IBE scheme without bilinear map" by M. Zheng, Y. Xiang and H. Zhou [J. Comput. Syst. Sci. 81 (2015) 125-131]
J. Comput. Syst. Sci. 82, 5, pp. 756–757 (2016).
open access doi -
Enumeration formula for (2, n)-cubes in discrete planes
Discret. Appl. Math. 160, 15, pp. 2158–2171 (2012).
open access doi -
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
IEEE Trans. Inf. Theory 57, 3, pp. 1786–1802 (2011).
open access doi -
Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability With Short Ciphertexts and Private Keys
IEEE Trans. Inf. Theory 57, 10, pp. 7189–7204 (2011).
open access doi -
Time-selective convertible undeniable signatures with short conversion receipts
Inf. Sci. 180, 12, pp. 2458–2475 (2010).
open access doi -
Mesures d’indépendance linéaire de carrés de périodes et quasi-périodes de courbes elliptiques
J. Number Theory 129, 6, pp. 1212-1233 (2009).
doi -
New Extensions of Pairing-Based Signatures into Universal (Multi) Designated Verifier Signatures
Int. J. Found. Comput. Sci. 20, 1, pp. 109–133 (2009).
open access doi -
Multi-designated verifiers signatures: anonymity without encryption
Inf. Process. Lett. 102, 2-3, pp. 127–132 (2007).
doi -
Universal forgery on Sekhar’s signature scheme with message recovery
Int. J. Comput. Math. 81, 12, pp. 1493–1495 (2004).
doi
International conferences
-
Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations
In 5th Conference on Information-Theoretic Cryptography, ITC 2024, August 14-16, 2024, Stanford, CA, USA (Divesh Aggarwal, ed), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Leibniz International Proceedings in Informatics (LIPIcs), vol. to appear, (2024).
open access -
Cryptanalysis of a Generalized Subset-Sum Pseudorandom Generator
In 48th International Symposium on Mathematical Foundations of Computer Science, MFCS 2023, August 28 to September 1, 2023, Bordeaux, France (Jérôme Leroux, Sylvain Lombardy, and David Peleg, eds), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, LIPIcs, vol. 272, pp. 23:1–23:15 (2023).
open access doi -
Quantum security of subset cover problems
In 4th Conference on Information-Theoretic Cryptography, ITC 2023, June 6-8, 2023, Aarhus, Denmark (Kai-Min Chung, ed), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Leibniz International Proceedings in Informatics (LIPIcs), vol. 267, pp. 9:1–9:17 (2023).
open access doi -
Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems
In Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I (Gene Tsudik, Mauro Conti, Kaitai Liang, and Georgios Smaragdakis, eds), Springer, Lecture Notes in Computer Science, vol. 14344, pp. 189–208 (2023).
open access doi -
Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head
In Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I (Gene Tsudik, Mauro Conti, Kaitai Liang, and Georgios Smaragdakis, eds), Springer, Lecture Notes in Computer Science, vol. 14344, pp. 435–454 (2023).
open access doi -
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection
In Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings (Shweta Agrawal, and Dongdai Lin, eds), Springer, Lecture Notes in Computer Science, vol. 13792, pp. 371–402 (2022).
open access doi -
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity
In Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part II (Mehdi Tibouchi, and Huaxiong Wang, eds), Springer, Lecture Notes in Computer Science, vol. 13091, pp. 157–188 (2021).
open access doi video -
The Key-Dependent Message Security of Key-Alternating Feistel Ciphers
In Topics in Cryptology - CT-RSA 2021 - Cryptographers’ Track at the RSA Conference 2021, Virtual Event, May 17-20, 2021, Proceedings (Kenneth G. Paterson, ed), Springer, Lecture Notes in Computer Science, vol. 12704, pp. 351–374 (2021).
open access doi -
Public-Key Generation with Verifiable Randomness
In Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I (Shiho Moriai, and Huaxiong Wang, eds), Springer, Lecture Notes in Computer Science, vol. 12491, pp. 97–127 (2020).
open access doi video -
Succinct Diophantine-Satisfiability Arguments
In Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part III (Shiho Moriai, and Huaxiong Wang, eds), Springer, Lecture Notes in Computer Science, vol. 12493, pp. 774–804 (2020).
open access doi video -
Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND
In Theory of Cryptography - 17th International Conference, TCC 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part II (Dennis Hofheinz, and Alon Rosen, eds), Springer, Lecture Notes in Computer Science, vol. 11892, pp. 386–406 (2019).
open access doi -
Analysis and Improvement of an Authentication Scheme in Incremental Cryptography
In Selected Areas in Cryptography - SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers (Carlos Cid, and Michael J. Jacobson Jr., eds), Springer, Lecture Notes in Computer Science, vol. 11349, pp. 50–70 (2019).
open access doi -
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures
In Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings (Wieland Fischer, and Naofumi Homma, eds), Springer, Lecture Notes in Computer Science, vol. 10529, pp. 154–171 (2017).
open access doi -
Private Multiplication over Finite Fields
In Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III (Jonathan Katz, and Hovav Shacham, eds), Springer, Lecture Notes in Computer Science, vol. 10403, pp. 397–426 (2017).
open access doi video -
Full Disk Encryption: Bridging Theory and Practice
In Topics in Cryptology - CT-RSA 2017 - The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings (Helena Handschuh, ed), Springer, Lecture Notes in Computer Science, vol. 10159, pp. 241–257 (2017).
open access doi -
Reusing Nonces in Schnorr Signatures - (and Keeping It Secure...)
In Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I (Simon N. Foley, Dieter Gollmann, and Einar Snekkenes, eds), Springer, Lecture Notes in Computer Science, vol. 10492, pp. 224–241 (2017).
open access doi -
Lattice Attacks on Pairing-Based Signatures
In Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings (Máire O’Neill, ed), Springer, Lecture Notes in Computer Science, vol. 10655, pp. 352–370 (2017).
open access doi -
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
In Topics in Cryptology - CT-RSA 2016 - The Cryptographers’ Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings (Kazue Sako, ed), Springer, Lecture Notes in Computer Science, vol. 9610, pp. 3–18 (2016).
open access doi -
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
In Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I (Ioannis G. Askoxylakis, Sotiris Ioannidis, Sokratis K. Katsikas, and Catherine A. Meadows, eds), Springer, Lecture Notes in Computer Science, vol. 9878, pp. 261–278 (2016).
open access doi -
Randomness Complexity of Private Circuits for Multiplication
In Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II (Marc Fischlin, and Jean-Sébastien Coron, eds), Springer, Lecture Notes in Computer Science, vol. 9666, pp. 616–648 (2016).
open access doi video -
Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness
In Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II (Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, and Bo-Yin Yang, eds), Springer, Lecture Notes in Computer Science, vol. 9615, pp. 36–66 (2016).
open access doi -
Lattice Attacks Against Elliptic-Curve Signatures with Blinded Scalar Multiplication
In Selected Areas in Cryptography - SAC 2016 - 23rd International Conference, St. John’s, NL, Canada, August 10-12, 2016, Revised Selected Papers (Roberto Avanzi, and Howard M. Heys, eds), Springer, Lecture Notes in Computer Science, vol. 10532, pp. 120–139 (2017).
open access doi -
Distribution and Polynomial Interpolation of the Dodis-Yampolskiy Pseudo-Random Function
In Arithmetic of Finite Fields - 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers (Sylvain Duquesne, and Svetla Petkova-Nikova, eds), Lecture Notes in Computer Science, vol. 10064, pp. 125–140 (2016).
open access doi -
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks
In Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers (Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, and Michalis Polychronakis, eds), Springer, Lecture Notes in Computer Science, vol. 9092, pp. 635–654 (2015).
open access doi -
Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits
In Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings (Tim Güneysu, and Helena Handschuh, eds), Springer, Lecture Notes in Computer Science, vol. 9293, pp. 287–306 (2015).
open access doi -
Non-Interactive Zero-Knowledge Proofs of Non-Membership
In Topics in Cryptology - CT-RSA 2015, The Cryptographer’s Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (Kaisa Nyberg, ed), Springer, Lecture Notes in Computer Science, vol. 9048, pp. 145–164 (2015).
open access doi -
Algorithms for Outsourcing Pairing Computation
In Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers (Marc Joye, and Amir Moradi, eds), Springer, Lecture Notes in Computer Science, vol. 8968, pp. 193–211 (2015).
open access doi -
Analysis and Improvement of Lindell’s UC-Secure Commitment Schemes
In Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings (Michael J. Jacobson Jr., Michael E. Locasto, Payman Mohassel, and Reihaneh Safavi-Naini, eds), Springer, Lecture Notes in Computer Science, vol. 7954, pp. 534–551 (2013).
open access doi -
Security analysis of pseudo-random number generators with input: /dev/random is not robust
In 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS’13, Berlin, Germany, November 4-8, 2013 (Ahmad-Reza Sadeghi, Virgil D. Gligor, and Moti Yung, eds), ACM, pp. 647–658 (2013).
open access doi -
Time/Memory/Data Tradeoffs for Variants of the RSA Problem
In Computing and Combinatorics, 19th International Conference, COCOON 2013, Hangzhou, China, June 21-23, 2013. Proceedings (Ding-Zhu Du, and Guochuan Zhang, eds), Springer, Lecture Notes in Computer Science, vol. 7936, pp. 651–662 (2013).
open access doi -
New Techniques for SPHFs and Efficient One-Round PAKE Protocols
In Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I (Ran Canetti, and Juan A. Garay, eds), Springer, Lecture Notes in Computer Science, vol. 8042, pp. 449–475 (2013).
open access doi -
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
In Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings (Kaoru Kurosawa, and Goichiro Hanaoka, eds), Springer, Lecture Notes in Computer Science, vol. 7778, pp. 272–291 (2013).
open access doi -
Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions
In Pairing-Based Cryptography - Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers (Michel Abdalla, and Tanja Lange, eds), Springer, Lecture Notes in Computer Science, vol. 7708, pp. 234–253 (2013).
open access doi -
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith’s Methods
In Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings (Marc Fischlin, Johannes A. Buchmann, and Mark Manulis, eds), Springer, Lecture Notes in Computer Science, vol. 7293, pp. 609–626 (2012).
open access doi -
Compact Round-Optimal Partially-Blind Signatures
In Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings (Ivan Visconti, and Roberto De Prisco, eds), Springer, Lecture Notes in Computer Science, vol. 7485, pp. 95–112 (2012).
open access doi -
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions
In Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings (Ronald Cramer, ed), Springer, Lecture Notes in Computer Science, vol. 7194, pp. 94–111 (2012).
open access doi -
Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform
In Progress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings (Abderrahmane Nitaj, and David Pointcheval, eds), Springer, Lecture Notes in Computer Science, vol. 6737, pp. 41–58 (2011).
open access doi -
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
In Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings (Dong Hoon Lee, and Xiaoyun Wang, eds), Springer, Lecture Notes in Computer Science, vol. 7073, pp. 70–88 (2011).
open access doi -
Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes
In Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings (Liqun Chen, ed), Springer, Lecture Notes in Computer Science, vol. 7089, pp. 431–450 (2011).
open access doi -
Signatures on Randomizable Ciphertexts
In Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings (Dario Catalano, Nelly Fazio, Rosario Gennaro, and Antonio Nicolosi, eds), Springer, Lecture Notes in Computer Science, vol. 6571, pp. 403–422 (2011).
open access doi -
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption
In Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings (Jianying Zhou, and Moti Yung, eds), Lecture Notes in Computer Science, vol. 6123, pp. 1–18 (2010).
open access doi
Mehdi Tibouchi received the Best Student Paper Award -
Batch Groth-Sahai
In Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings (Jianying Zhou, and Moti Yung, eds), Lecture Notes in Computer Science, vol. 6123, pp. 218–235 (2010).
open access doi -
Fair Blind Signatures without Random Oracles
In Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings (Daniel J. Bernstein, and Tanja Lange, eds), Springer, Lecture Notes in Computer Science, vol. 6055, pp. 16–33 (2010).
open access doi -
Huff’s Model for Elliptic Curves
In Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010. Proceedings (Guillaume Hanrot, François Morain, and Emmanuel Thomé, eds), Springer, Lecture Notes in Computer Science, vol. 6197, pp. 234–250 (2010).
open access doi -
Mediated Traceable Anonymous Encryption
In Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings (Michel Abdalla, and Paulo S. L. M. Barreto, eds), Springer, Lecture Notes in Computer Science, vol. 6212, pp. 40–60 (2010).
open access doi -
Transferable Constant-Size Fair E-Cash
In Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings (Juan A. Garay, Atsuko Miyaji, and Akira Otsuka, eds), Springer, Lecture Notes in Computer Science, vol. 5888, pp. 226–247 (2009).
open access doi -
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
In Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings (Juan A. Garay, Atsuko Miyaji, and Akira Otsuka, eds), Springer, Lecture Notes in Computer Science, vol. 5888, pp. 498–517 (2009).
open access doi -
Adaptive-ID Secure Revocable Identity-Based Encryption
In Topics in Cryptology - CT-RSA 2009, The Cryptographers’ Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings (Marc Fischlin, ed), Springer, Lecture Notes in Computer Science, vol. 5473, pp. 1–15 (2009).
open access doi -
Provably Secure Code-Based Threshold Ring Signatures
In Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings (Matthew G. Parker, ed), Springer, Lecture Notes in Computer Science, vol. 5921, pp. 222–235 (2009).
open access doi -
Fair E-Cash: Be Compact, Spend Faster
In Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings (Pierangela Samarati, Moti Yung, Fabio Martinelli, and Claudio Agostino Ardagna, eds), Springer, Lecture Notes in Computer Science, vol. 5735, pp. 294–309 (2009).
open access doi -
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
In Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings (Stanislaw Jarecki, and Gene Tsudik, eds), Springer, Lecture Notes in Computer Science, vol. 5443, pp. 235–255 (2009).
open access doi -
Multi-use unidirectional proxy re-signatures
In Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008 (Peng Ning, Paul F. Syverson, and Somesh Jha, eds), ACM, pp. 511–520 (2008).
open access doi -
Separation Results on the "One-More" Computational Problems
In Topics in Cryptology - CT-RSA 2008, The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings (Tal Malkin, ed), Springer, Lecture Notes in Computer Science, vol. 4964, pp. 71–87 (2008).
open access doi -
Tracing Malicious Proxies in Proxy Re-encryption
In Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings (Steven D. Galbraith, and Kenneth G. Paterson, eds), Springer, Lecture Notes in Computer Science, vol. 5209, pp. 332–353 (2008).
open access doi -
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
In Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings (Ronald Cramer, ed), Springer, Lecture Notes in Computer Science, vol. 4939, pp. 360–379 (2008).
open access doi
winner of PKC Test-of-Time Award -
Gradually Convertible Undeniable Signatures
In Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings (Jonathan Katz, and Moti Yung, eds), Springer, Lecture Notes in Computer Science, vol. 4521, pp. 478–496 (2007).
open access doi -
Trapdoor Permutation Polynomials of Z/ \emphn Z and Public Key Cryptosystems
In Information Security, 10th International Conference, ISC 2007, Valparaı́so, Chile, October 9-12, 2007, Proceedings (Juan A. Garay, Arjen K. Lenstra, Masahiro Mambo, and René Peralta, eds), Springer, Lecture Notes in Computer Science, vol. 4779, pp. 333–350 (2007).
doi -
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures
In Information Security, 10th International Conference, ISC 2007, Valparaı́so, Chile, October 9-12, 2007, Proceedings (Juan A. Garay, Arjen K. Lenstra, Masahiro Mambo, and René Peralta, eds), Springer, Lecture Notes in Computer Science, vol. 4779, pp. 175–188 (2007).
open access doi -
On Kabatianskii-Krouk-Smeets Signatures
In Arithmetic of Finite Fields, First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings (Claude Carlet, and Berk Sunar, eds), Springer, Lecture Notes in Computer Science, vol. 4547, pp. 237–251 (2007).
open access doi -
New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures
In Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II (Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener, eds), Springer, Lecture Notes in Computer Science, vol. 4052, pp. 58–69 (2006).
open access doi -
Universally Convertible Directed Signatures
In Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings (Bimal K. Roy, ed), Springer, Lecture Notes in Computer Science, vol. 3788, pp. 682–701 (2005).
open access doi -
Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
In Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings (Bimal K. Roy, ed), Springer, Lecture Notes in Computer Science, vol. 3788, pp. 1–20 (2005).
open access doi
winner of the Best Paper Award
winner of IACR Test-of-Time Award -
Time-Selective Convertible Undeniable Signatures
In Topics in Cryptology - CT-RSA 2005, The Cryptographers’ Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings (Alfred Menezes, ed), Springer, Lecture Notes in Computer Science, vol. 3376, pp. 154–171 (2005).
doi -
Short Undeniable Signatures Without Random Oracles: The Missing Link
In Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings (Subhamoy Maitra, C. E. Veni Madhavan, and Ramarathnam Venkatesan, eds), Springer, Lecture Notes in Computer Science, vol. 3797, pp. 283–296 (2005).
open access doi -
RSA-Based Secret Handshakes
In Coding and Cryptography, International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers (Oyvind Ytrehus, ed), Springer, Lecture Notes in Computer Science, vol. 3969, pp. 252–274 (2006).
open access doi -
Multi-designated Verifiers Signatures
In Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings (Javier López, Sihan Qing, and Eiji Okamoto, eds), Springer, Lecture Notes in Computer Science, vol. 3269, pp. 495–507 (2004).
open access doi -
Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map
In Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers (Carlo Blundo, and Stelvio Cimato, eds), Springer, Lecture Notes in Computer Science, vol. 3352, pp. 105–119 (2005).
open access doi