Members
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Results
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
  • 1M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, H. Shi.
    Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions, in: Journal of Cryptology, July 2008, vol. 21, no 3, pp. 350–391.
  • 2M. Abdalla, D. Catalano, D. Fiore.
    Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions, in: Journal of Cryptology, 2014, vol. 27, no 3, pp. 544-593.
  • 3G. Barthe, D. Pointcheval, S. Zanella-Béguelin.
    Verified Security of Redundancy-Free Encryption from Rabin and RSA, in: Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS '12), Raleigh, NC, USA, T. Yu, G. Danezis, V. D. Gligor (editors), ACM Press, 2012, pp. 724–735.
  • 4F. Benhamouda, O. Blazy, C. Chevalier, D. Pointcheval, D. Vergnaud.
    New Techniques for SPHFs and Efficient One-Round PAKE Protocols, in: Advances in Cryptology – Proceedings of CRYPTO '13 (1), R. Canetti, J. A. Garay (editors), Lecture Notes in Computer Science, Springer, 2013, vol. 8042, pp. 449-475.
  • 5I. Dinur, O. Dunkelman, N. Keller, A. Shamir.
    New Attacks on Feistel Structures with Improved Memory Complexities, in: Advances in Cryptology – Proceedings of CRYPTO '15 (1), R. Gennaro, M. Robshaw (editors), Lecture Notes in Computer Science, Springer, 2015, vol. 9215, pp. 433-454.
  • 6Y. Dodis, D. Pointcheval, S. Ruhault, D. Vergnaud, D. Wichs.
    Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust, in: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '13), Berlin, Germany, V. D. Gligor, M. Yung (editors), ACM Press, 2013, pp. 647–658.
  • 7R. Gay, D. Hofheinz, E. Kiltz, H. Wee.
    Tightly CCA-Secure Encryption Without Pairings, in: Advances in Cryptology – Proceedings of Eurocrypt '16 (2), M. Fischlin, J.-S. Coron (editors), Lecture Notes in Computer Science, Springer, 2016, vol. 9665, pp. 1–27.
  • 8S. Gorbunov, V. Vaikuntanathan, H. Wee.
    Predicate Encryption for Circuits from LWE, in: Advances in Cryptology – Proceedings of CRYPTO '15 (2), R. Gennaro, M. Robshaw (editors), Lecture Notes in Computer Science, Springer, 2015, vol. 9216, pp. 503-523.
  • 9V. Lyubashevsky, C. Peikert, O. Regev.
    On Ideal Lattices and Learning with Errors over Rings, in: Journal of the ACM, 2013, vol. 60, no 6, pp. 43:1–43:35.
  • 10V. Lyubashevsky, T. Prest.
    Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices, in: Advances in Cryptology – Proceedings of Eurocrypt '15 (1), E. Oswald, M. Fischlin (editors), Lecture Notes in Computer Science, Springer, 2015, vol. 9056, pp. 789-815.
Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 16M. Abdalla, F. Benhamouda, D. Pointcheval.
    Public-key encryption indistinguishable under plaintext-checkable attacks, in: IET Information Security, November 2016, vol. 10, no 6, pp. 288–303. [ DOI : 10.1049/iet-ifs.2015.0500 ]
    https://hal.inria.fr/hal-01385178
  • 17F. Benhamouda, J. Herranz, M. JOYE, B. Libert.
    Efficient Cryptosystems From 2k -th Power Residue Symbols, in: Journal of Cryptology, April 2016. [ DOI : 10.1007/s00145-016-9229-5 ]
    https://hal.inria.fr/hal-01394400
  • 18F. Benhamouda, M. JOYE, B. Libert.
    A New Framework for Privacy-Preserving Aggregation of Time-Series Data, in: ACM Transactions on Information and System Security, April 2016, vol. 18, no 3, 21 p. [ DOI : 10.1145/2873069 ]
    https://hal.inria.fr/hal-01181321
  • 19S. Canard, D. Pointcheval, O. Sanders, J. Traoré.
    Divisible e-cash made practical, in: IET Information Security, July 2016. [ DOI : 10.1049/iet-ifs.2015.0485 ]
    https://hal.inria.fr/hal-01377998
  • 20C. Hazay, A. López-Alt, H. Wee, D. Wichs.
    Leakage-Resilient Cryptography from Minimal Assumptions, in: Journal of Cryptology, 2016, vol. 29, no 3, pp. 514–551. [ DOI : 10.1007/s00145-015-9200-x ]
    https://hal.inria.fr/hal-01378199
  • 21D. Vergnaud.
    Comment on “A strong provably secure IBE scheme without bilinear map” by M. Zheng, Y. Xiang and H. Zhou [J. Comput. Syst. Sci. 81 (2015) 125–131], in: Journal of Computer and System Sciences (JCSS), August 2016, vol. 82, no 5, 2 p. [ DOI : 10.1016/j.jcss.2015.12.003 ]
    https://hal.inria.fr/hal-01305462

International Conferences with Proceedings

  • 22M. Abdalla, M. Cornejo, A. Nitulescu, D. Pointcheval.
    Robust Password-Protected Secret Sharing, in: ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, I. Askoxylakis, S. Ioannidis, S. Katsikas, C. Meadows (editors), Lecture Notes in Computer Science, Springer, September 2016, vol. 9879, pp. 61-79. [ DOI : 10.1007/978-3-319-45741-3_4 ]
    https://hal.archives-ouvertes.fr/hal-01380699
  • 23H. Abusalah, G. Fuchsbauer.
    Constrained PRFs for Unbounded Inputs with Short Keys, in: Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, United Kingdom, June 2016. [ DOI : 10.1007/978-3-319-39555-5_24 ]
    https://hal.inria.fr/hal-01384375
  • 24H. Abusalah, G. Fuchsbauer, K. Pietrzak.
    Offline Witness Encryption, in: Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, United Kingdom, June 2016. [ DOI : 10.1007/978-3-319-39555-5_16 ]
    https://hal.inria.fr/hal-01384371
  • 25S. Belaid, F. Benhamouda, A. Passelègue, E. Prouff, A. Thillard, D. Vergnaud.
    Randomness Complexity of Private Circuits for Multiplication, in: EUROCRYPT 2016, Vienna, Austria, May 2016, pp. 616-648. [ DOI : 10.1007/978-3-662-49896-5_22 ]
    https://hal.archives-ouvertes.fr/hal-01324823
  • 26M. Bellare, G. Fuchsbauer, A. Scafuro.
    NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion, in: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 2016.
    https://hal.inria.fr/hal-01384384
  • 27F. Benhamouda, C. Chevalier, A. Thillard, D. Vergnaud.
    Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness, in: Public-Key Cryptography – PKC 2016, Taipei, Taiwan, IACR, March 2016, vol. 9615, 31 p. [ DOI : 10.1007/978-3-662-49387-8_3 ]
    https://hal.inria.fr/hal-01278460
  • 28N. Bitansky, R. Nishimaki, A. Passelègue, D. Wichs.
    From Cryptomania to Obfustopia through Secret-Key Functional Encryption, in: TCC 2016-B - Fourteenth IACR Theory of Cryptography Conference, Beijing, China, October 2016.
    https://hal.inria.fr/hal-01379256
  • 29O. Blazy, C. Chevalier, D. Vergnaud.
    Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions, in: CT-RSA 2016, San Francisco, France, K. Sako (editor), The Cryptographers' Track at the RSA Conference, February 2016, vol. LNCS, no 9610. [ DOI : 10.1007/978-3-319-29485-8_1 ]
    https://hal.archives-ouvertes.fr/hal-01292699
  • 30F. Bourse, R. Del Pino, M. Minelli, H. Wee.
    FHE Circuit Privacy Almost for Free, in: Crypto 2016 - 36th Annual International Cryptology Conference, Santa Barbara, United States, Crypto 2016, Springer Verlag, August 2016, vol. Lecture Notes in Computer Science, no 9815. [ DOI : 10.1007/978-3-662-53008-5_3 ]
    https://hal.inria.fr/hal-01360110
  • 31Z. Brakerski, D. Cash, R. Tsabary, H. Wee.
    Targeted Homomorphic Attribute-Based Encryption, in: 14th International Conference, TCC 2016-B, Beijing, China, M. Hirt, A. Smith (editors), Lecture Notes in Computer Science, Springer, October 2016, vol. 9986, pp. 330-360.
    https://hal.inria.fr/hal-01378341
  • 32Z. Brakerski, V. Vaikuntanathan, H. Wee, D. Wichs.
    Obfuscating Conjunctions under Entropic Ring LWE, in: ITCS, Cambridge, United States, 2016. [ DOI : 10.1145/2840728.2840764 ]
    https://hal.inria.fr/hal-01378193
  • 33P. Chaidos, V. Cortier, G. Fuchsbauer, D. Galindo.
    BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme, in: 23rd ACM Conference on Computer and Communications Security (CCS'16), Vienna, Austria, October 2016. [ DOI : 10.1145/2976749.2978337 ]
    https://hal.inria.fr/hal-01377917
  • 34C. Chevalier, F. Laguillaumie, D. Vergnaud.
    Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions, in: Computer Security - ESORICS 2016, Heraklion, Greece, I. G. Askoxylakis, S. Ioannidis, S. K. Katsikas, C. A. Meadows (editors), Computer Security – ESORICS 2016, Springer, September 2016, vol. 9878, pp. 261-278. [ DOI : 10.1007/978-3-319-45744-4_13 ]
    https://hal.inria.fr/hal-01375817
  • 35G. Couteau, T. Peters, T. Peters, D. Pointcheval.
    Encryption Switching Protocols, in: Crypto 2016 - 36th Annual International Cryptology Conference, Santa Barbara, United States, M. Robshaw, J. Katz (editors), Springer, August 2016. [ DOI : 10.1007/978-3-662-53018-4_12 ]
    https://hal.inria.fr/hal-01407341
  • 36R. Del Pino, V. Lyubashevsky, D. Pointcheval.
    The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs, in: SCN 2016 - 10th International Conference Security and Cryptography for Networks, Amalfi, Italy, V. Zikas, R. D. Prisco (editors), Security and Cryptography for Networks, Springer , August 2016, vol. Lecture Notes in Computer Science, no 9841, pp. 273 - 291. [ DOI : 10.1007/978-3-319-44618-9_15 ]
    https://hal.inria.fr/hal-01378005
  • 37H. Ferradi, R. Géraud, D. Maimut, D. Naccache, D. Pointcheval.
    Legally Fair Contract Signing Without Keystones, in: ACNS 2016 - 14th International Conference Applied Cryptography and Network Security, Guildford, United Kingdom, M. Manulis, A.-R. Sadeghi, S. Schneider (editors), Applied Cryptography and Network Security, Springer, June 2016, vol. LNCS, no 9696, pp. 175 - 190. [ DOI : 10.1007/978-3-319-39555-5_10 ]
    https://hal.inria.fr/hal-01377993
  • 38D. Fiore, A. Nitulescu.
    On the (In)security of SNARKs in the Presence of Oracles, in: TCC 2016-B - Fourteenth IACR Theory of Cryptography Conference, Beijing, China, Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, November 1-3, 2016, Proceedings, October 2016.
    https://hal.inria.fr/hal-01378013
  • 39G. Fuchsbauer, C. Hanser, C. Kamath, D. Slamanig.
    Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions, in: Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 2016. [ DOI : 10.1007/978-3-319-44618-9_21 ]
    https://hal.inria.fr/hal-01384381
  • 41D. Goudarzi, M. Rivain.
    On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking , in: CHES, Santa-Barbara, United States, 2016.
    https://hal.inria.fr/hal-01379296
  • 42D. Goudarzi, M. Rivain, D. Vergnaud.
    Lattice Attacks against Elliptic-Curve Signatures with Blinded Scalar Multiplication, in: Selected Areas in Cryptography - SAC 2016, St. John’s, Canada, R. Avanzi, H. Heys (editors), Selected Areas in Cryptography - SAC 2016, Springer, August 2016.
    https://hal.inria.fr/hal-01379249
  • 43L. Khati, N. Mouha, D. Vergnaud.
    Full Disk Encryption: Bridging Theory and Practice, in: CT-RSA 2017 - RSA Conference Cryptographers' Track, San Francisco, United States, Lecture Notes in Computer Science, February 2017, 16 p.
    https://hal.inria.fr/hal-01403418
  • 44H. Krawczyk, H. Wee.
    The OPTLS Protocol and TLS 1.3, in: EuroS&P, Saarbrücken, Germany, 2016. [ DOI : 10.1109/EuroSP.2016.18 ]
    https://hal.inria.fr/hal-01378195
  • 45T. Mefenza.
    Inferring Sequences Produced by a Linear Congruential Generator on Elliptic Curves Using Coppersmith's Methods, in: COCOON 2016, Ho Chi Minh City, Vietnam, T. N. Dinh, M. T. Thai (editors), 22nd International Computing and Combinatorics Conference, COCOON 2016, Springer Verlag, August 2016, vol. Lecture Notes in Computer Science, no 9797, 12 p. [ DOI : 10.1007/978-3-319-42634-1_24 ]
    https://hal.inria.fr/hal-01381658
  • 46P. Méaux, A. Journault, F.-X. Standaert, C. Carlet.
    Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts, in: Advances in Cryptology – EUROCRYPT 2016, WIEN, Austria, Lecture Notes in Computer Science, May 2016, vol. 9665, pp. 311-343. [ DOI : 10.1007/978-3-662-49890-3_13 ]
    https://hal.inria.fr/hal-01405859
  • 47D. Pointcheval, O. Sanders.
    Short Randomizable Signatures, in: The Cryptographers' Track at the RSA Conference 2016, San Francisco, United States, K. Sako (editor), Springer Verlag, February 2016, vol. LNCS, no 9610, pp. 111 - 126. [ DOI : 10.1007/978-3-319-29485-8_7 ]
    https://hal.inria.fr/hal-01377997
  • 48H. Wee.
    Déjà Q: Encore! Un Petit IBE, in: TCC 2016 A, Tel Aviv, Israel, 2016. [ DOI : 10.1007/978-3-662-49099-0_9 ]
    https://hal.inria.fr/hal-01378189
  • 49H. Wee.
    KDM-Security via Homomorphic Smooth Projective Hashing, in: Public Key Cryptography, Taipei, Taiwan, 2016. [ DOI : 10.1007/978-3-662-49387-8_7 ]
    https://hal.inria.fr/hal-01378191

Books or Proceedings Editing

  • 50D. Pointcheval, A. Nitaj, T. Rachidi (editors)
    8th International Conference on Cryptology in Africa - Africacrypt 2016, Africacrypt 2016, Springer Verlag, Fes, Morocco, 2016, vol. LNCS, no 9646. [ DOI : 10.1007/978-3-319-31517-1 ]
    https://hal.inria.fr/hal-01377995

Internal Reports

  • 51M. Abdalla, F. Bourse, A. De Caro, D. Pointcheval.
    Better Security for Functional Encryption for Inner Product Evaluations, IACR, January 2016, no Cryptology ePrint Archive: Report 2016/011.
    https://hal.archives-ouvertes.fr/hal-01380726
  • 52M. Abdalla, M. Cornejo, A. Nitulescu, D. Pointcheval.
    Robust Password-Protected Secret Sharing, IACR, May 2016, no Cryptology ePrint Archive: Report 2016/123.
    https://hal.archives-ouvertes.fr/hal-01380730
  • 53M. Abdalla, M. Raykova, H. Wee.
    Multi-Input Inner-Product Functional Encryption from Pairings, IACR, April 2016, no Cryptology ePrint Archive: Report 2016/425.
    https://hal.archives-ouvertes.fr/hal-01380735
  • 54J. Chotard, D. Hieu Phan, D. Pointcheval.
    Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms, IACR Cryptology ePrint Archive, November 2016, no Cryptology ePrint Archive: Report 2016/1089.
    https://hal.inria.fr/hal-01402517

Other Publications