|
[70] | Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs (Anaïs Barthoulot, Olivier Blazy, Sébastien Canard), In Progress in Cryptology - AFRICACRYPT 2024 - 15th International Conference on Cryptology in Africa, Douala, Cameroon, July 10-12, 2024, Proceedings (Serge Vaudenay, Christophe Petit, eds.), Springer, volume 14861, 2024.
|
[69] | A Public Key Identity-Based Revocation Scheme: - Fully Attribute-Hiding and Function Private (Olivier Blazy, Sayantan Mukherjee), In Topics in Cryptology - CT-RSA 2024 - Cryptographers' Track at the RSA Conference 2024, San Francisco, CA, USA, May 6-9, 2024, Proceedings (Elisabeth Oswald, ed.), Springer, volume 14643, 2024.
|
|
[68] | Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption (Anaïs Barthoulot, Olivier Blazy, Sébastien Canard), In Cryptology and Network Security - 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings (Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann, eds.), Springer, volume 14342, 2023.
|
[67] | Efficient Implementation of a Post-Quantum Anonymous Credential Protocol (Olivier Blazy, Céline Chevalier, Guillaume Renaut, Thomas Ricosset, Éric Sageloli, Hugo Senet), In Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, 29 August 2023- 1 September 2023, ACM, 2023.
|
[66] | How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment (Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert), In 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 (Joseph A. Calandrino, Carmela Troncoso, eds.), USENIX Association, 2023.
|
|
[65] | Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone (Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier, David Pointcheval), In 15th International Symposium on Foundations & Practice of Security (FPS--2022)., 2022. |
[64] | (Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard (Anaïs Barthoulot, Olivier Blazy, Sébastien Canard), In International Conference on Cryptology and Network Security, 2022. |
[63] | Identity-Based Encryption in DDH Hard Groups (Olivier Blazy, Saqib A. Kakvi), In International Conference on Cryptology in Africa, 2022. |
[62] | MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing (Olivier Blazy, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Cristina Onete, Léo Robert), In Symposium on Applied Computing (SAC), 2022. |
[61] | Ouroboros An efficient and provably secure KEM family (Nicolas Aragon, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor), In IEEE Transactions on Information Theory, IEEE, 2022. |
[60] | Anonymous attribute-based designated verifier signature (Olivier Blazy, Laura Brouilhet, Emmanuel Conchon, Mathieu Klingler), In Journal of Ambient Intelligence and Humanized Computing, Springer, 2022. |
[59] | Pairing-Based Cryptography (Olivier Blazy), In Asymmetric Cryptography: Primitives and Protocols, John Wiley & Sons, 2022. |
[58] | A gapless code-based hash proof system based on RQC and its applications (Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Yann Connan, Philippe Gaborit), In Designs, Codes and Cryptography, Springer, 2022. |
|
[57] | An Anonymous Trace-and-Revoke Broadcast Encryption Scheme (Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehlé), In Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings (Sushmita Ruj Joonsang Baek, ed.), Springer, volume 13083, 2021.
|
[56] | How to (Legally) Keep Secrets from Mobile Operators (Ghada Arfaoui, Olivier Blazy, Xavier Bultel, Pierre-Alain Fouque, Thibaut Jacques, Adina Nedelcu, Cristina Onete), In Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I (Elisa Bertino, Haya Shulman, Michael Waidner, eds.), Springer, volume 12972, 2021. |
[55] | Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server (Olivier Blazy, Laura Brouilhet, Céline Chevalier, Patrick Towa, Ida Tucker, Damien Vergnaud), In Theor. Comput. Sci., Elsevier, volume 895, 2021.
|
[54] | Secure Decision Forest Evaluation (Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier, David Pointcheval), In ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021 (Delphine Reinhardt, Tilo Müller, eds.), ACM, 2021. |
[53] | Zero-Knowledge Reparation of the Véron and AGS Code-based Identification Schemes (Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Philippe Gaborit), In IEEE International Symposium on Information Theory, ISIT 2021, Melbourne, Australia, July 12-20, 2021 (Stephen Hanly Henry Pfister Emina Soljanin Michael Gastpar, ed.), IEEE, volume , 2021. |
[52] | A Correction to A Code-Based Blind Signature Scheme (Olivier Blazy, Philippe Gaborit, Dang Truong Mac), In Code-Based Cryptography Workshop, 2021. |
[51] | A Rank-Metric Code-Based Group Signature Scheme (Olivier Blazy, Philippe Gaborit, Dang Truong Mac), In Code-Based Cryptography Workshop, Springer, 2021. |
[50] | Generic Plaintext Equality and Inequality Proofs (Olivier Blazy, Xavier Bultel, Pascal Lafourcade, Octavio Perez-Kempner), In Financial Cryptography and Data Security - 25th International Conference, FC 2021 (Claudia Diaz Nikita Borisov, ed.), Springer, volume 12674, 2021. |
[49] | An IoT Attribute-Based Security Framework for Topic-based Publish/Subscribe Systems (Olivier Blazy, Emmanuel Conchon, Mathieu Klingler, Damien Sauveron), In IEEE Access, IEEE, volume 9, 2021.
|
|
[48] | CCA-Secure ABE using Tag and Pair Encoding (Olivier Blazy, Sayantan Mukherjee), In Progress in Cryptology - INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Virtual Conference, December 13-16, 2020, Proceedings (Karthikeyan Bhargavan, Elisabeth Oswald, Manoj Prabhakaran, eds.), Springer, volume 12578, 2020.
|
[47] | Skipping the q in Group Signatures (Olivier Blazy, Saqib A. Kakvi), In Progress in Cryptology - INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Virtual Conference, December 13-16, 2020, Proceedings (Karthikeyan Bhargavan, Elisabeth Oswald, Manoj Prabhakaran, eds.), Springer, volume 12578, 2020.
|
[46] | Public-Key Generation with Verifiable Randomness (Olivier Blazy, Patrick Towa, Damien Vergnaud), In Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I (Shiho Moriai, Huaxiong Wang, eds.), Springer, volume 12491, 2020.
|
[45] | CROOT: Code-based Round-Optimal Oblivious Transfer (Nicolas Aragon, Olivier Blazy, Neals Fournaise, Philippe Gaborit), In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020 (Pierangela Samarati, Sabrina De Capitani di Vimercati, Mohammad S. Obaidat, Jalel Ben-Othman, eds.), ScitePress, 2020.
|
[44] | Round-Optimal Constant-Size Blind Signatures (Olivier Blazy, Laura Brouilhet, Céline Chevalier, Neals Fournaise), In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020 (Pierangela Samarati, Sabrina De Capitani di Vimercati, Mohammad S. Obaidat, Jalel Ben-Othman, eds.), ScitePress, 2020.
|
[43] | New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications (Fatma Merabet, Amina Cherif, Malika Belkadi, Olivier Blazy, Emmanuel Conchon, Damien Sauveron), In Peer-to-Peer Networking and Applications, volume 13, 2020.
|
[42] | Cryptanalysis of a rank-based signature with short public keys (Nicolas Aragon, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Terry Shue Chien Lau, Chik How Tan, Keita Xagawa), In Des. Codes Cryptogr., volume 88, 2020.
|
|
[41] | SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting (Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Elena Pagnin), In IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019, IEEE, 2019.
|
[40] | Durandal: A Rank Metric Based Signature Scheme (Nicolas Aragon, Olivier Blazy, Philippe Gaborit, Adrien Hauteville, Gilles Zémor), In Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part III (Yuval Ishai, Vincent Rijmen, eds.), Springer, volume 11478, 2019.
|
[39] | Downgradable Identity-Based Encryption and Applications (Olivier Blazy, Paul Germouty, Duong Hieu Phan), In Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings (Mitsuru Matsui, ed.), Springer, volume 11405, 2019.
|
[38] | Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers, (Olivier Blazy, Chan Yeob Yeun, eds.), Springer, volume 11469, 2019.
|
[37] | Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions (Olivier Blazy, Céline Chevalier, Quoc Huy Vu), In Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019., ACM, 2019.
|
[36] | Anonymous Identity Based Encryption with Traceable Identities (Olivier Blazy, Laura Brouilhet, Duong Hieu Phan), In Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019, ACM, 2019.
|
|
[35] | Spreading Alerts Quietly: New Insights from Theory and Practice (Olivier Blazy, Céline Chevalier), In Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany, August 27 - August 30, 2018, 2018.
|
[34] | Non-Interactive Key Exchange from Identity-Based Encryption (Olivier Blazy, Céline Chevalier), In Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, ACM, 2018.
|
[33] | Hash Proof Systems over Lattices Revisited (Fabrice Benhamouda, Olivier Blazy, Léo Ducas, Willy Quach), In Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, Proceedings, Part II, Springer, volume 10770, 2018.
|
[32] | Efficient Encryption From Random Quasi-Cyclic Codes (Carlos Aguilar Melchor, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor), In IEEE Trans. Information Theory, volume 64, 2018.
|
|
[31] | An Efficient Protocol for UAS Security (Olivier Blazy, Emmanuel Conchon, Pierre-François Bonnefoi, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Serge Chaumette), In Integrated Communications, Navigation and Surveillance Conference (ICNS), 2017, IEEE, 2017.
|
[30] | A code-based group signature scheme (Quentin Alamélou, Olivier Blazy, Stéphane Cauchie, Philippe Gaborit), In Designs, Codes and Cryptography (Pascale Charpin, Thomas Johansson, Gohar Kyureghyan, Nicolas Sendrier, Jean-Pierre Tillich, eds.), Springer, volume 82, 2017. |
[29] | A code-based blind signature (Olivier Blazy, Philippe Gaborit, Julien Schrek, Nicolas Sendrier), In 2017 IEEE International Symposium on Information Theory, ISIT 2017, Aachen, Germany, June 25-30, 2017, 2017.
|
[28] | Almost Optimal Oblivious Transfer from QA-NIZK (Olivier Blazy, Céline Chevalier, Paul Germouty), In Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings (Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi, eds.), Springer, volume 10355, 2017.
|
[27] | Efficient ID-based Designated Verifier Signature (Olivier Blazy, Emmanuel Conchon, Paul Germouty, Amandine Jambert), In Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, ACM, 2017.
|
|
[26] | Structure-Preserving Smooth Projective Hashing (Olivier Blazy, Céline Chevalier), In Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II (Jung Hee Cheon, Tsuyoshi Takagi, eds.), Springer, 2016. |
[25] | Adaptive Oblivious Transfer and Generalization (Olivier Blazy, Céline Chevalier, Paul Germouty), In Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II (Jung Hee Cheon, Tsuyoshi Takagi, eds.), Springer, 2016. |
[24] | Anonymizable Ring Signature Without Pairing (Olivier Blazy, Xavier Bultel, Pascal Lafourcade), In Foundations and Practice of Security - 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers (Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquín García-Alfaro, eds.), Springer, 2016. |
[23] | Two Secure Anonymous Proxy-based Data Storages (Olivier Blazy, Xavier Bultel, Pascal Lafourcade), In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016. (Christian Callegari, Marten van Sinderen, Panagiotis G. Sarigiannidis, Pierangela Samarati, Enrique Cabello, Pascal Lorenz, Mohammad S. Obaidat, eds.), Springer, 2016.
|
[22] | A Practical Group Signature Scheme based on Rank Metric (Quentin Alamélou, Olivier Blazy, Stéphane Cauchie, Philippe Gaborit), In Arithmetic of Finite Fields - 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers (Sylvain Duquesne, Svetla Petkova-Nikova, eds.), Springer, 2016. |
[21] | Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions (Olivier Blazy, Céline Chevalier, Damien Vergnaud), In Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings (Kazue Sako, ed.), Springer, 2016. |
[20] | Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability (Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer), In Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings (Kazue Sako, ed.), Springer, 2016. |
|
[19] | Generic Construction of UC-Secure Oblivious Transfer (Olivier Blazy, Céline Chevalier), In Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers (Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis, eds.), Springer, volume 9092, 2015. |
[18] | Non-Interactive Zero-Knowledge Proofs of Non-Membership (Olivier Blazy, Céline Chevalier, Damien Vergnaud), In Proceedings of CT-RSA (K. Nyberg, ed.), Springer, volume 9048, 2015. |
[17] | A Code-Based Group Signature Scheme (Quentin Alamélou, Olivier Blazy, Stéphane Cauchie, Philippe Gaborit), In The 9th International Workshop on Coding and Cryptography 2015 WCC2015 (Nicolas Sendrier Jean-Pierre Tillich Pascale Charpin, ed.), 2015.
|
[16] | Tightly-Secure Signatures from Chameleon Hash Functions (Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan), In Conference on Practice and Theory in Public-Key Cryptography (PKC '15) (Jonathan Katz, ed.), Springer, volume 9020, 2015. |
|
[15] | (Hierarchical) Identity-Based Encryption from Affine Message Authentication (Olivier Blazy, Eike Kiltz, Jiaxin Pan), In Advances in Cryptology - Proceedings of CRYPTO '14 (Ran Canetti, Juan Garay, eds.), Springer, volume 8616, 2014.
|
|
[14] | SPHF-Friendly Non-Interactive Commitment Schemes (Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval), In Advances in Cryptology - Proceedings of ASIACRYPT '13 (Kazue Sako, Palash Sarkar, eds.), Springer, volume 8269, 2013.
|
[13] | Short Blind Signatures (Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud), In Journal of Computer Security, IOS Press, volume 21, 2013.
|
[12] | New Techniques for SPHFs and Efficient One-Round PAKE Protocols (Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud), In Advances in Cryptology - Proceedings of CRYPTO '13 (Ran Canetti, Juan Garay, eds.), Springer, volume 8042, 2013.
|
[11] | Analysis and Improvement of Lindell's UC-Secure Commitment Schemes (Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud), In Conference on Applied Cryptography and Network Security (ACNS '13) (Rei Safavi-Naini, Michael E. Locasto, eds.), Springer, volume 7954, 2013.
|
[10] | Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages (Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud), In Conference on Practice and Theory in Public-Key Cryptography (PKC '13) (Kaoru Kurosawa, Goichiro Hanaoka, eds.), Springer, volume 7778, 2013.
|
[9] | New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange (Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud), Technical report, IACR ePrint Archive, 2013.
|
|
[8] | Preuves de connaissance interactives et non-interactives (Olivier Blazy), PhD thesis, University Paris VII -- Denis Diderot, 2012.
|
[7] | Compact Round-Optimal Partially-Blind Signatures (Olivier Blazy, David Pointcheval, Damien Vergnaud), In The 8th Conference on Security in Communication Networks (SCN '12) (Ivan Visconti, Roberto De Prisco, eds.), Springer, volume 7485, 2012.
|
[6] | Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages (Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud), Technical report, IACR ePrint Archive, 2012.
|
[5] | Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions (Olivier Blazy, David Pointcheval, Damien Vergnaud), In 9th Theory of Cryptography Conference (TCC '12) (Ronald Cramer, ed.), Springer, volume 7194, 2012.
|
[4] | Traceable Signature with Stepping Capabilities (Olivier Blazy, David Pointcheval), In Cryptography and Security: From Theory to Applications (David Naccache, ed.), Springer, volume 6805 of Lecture Notes in Computer Science, 2012. (Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday)
|
|
[3] | Achieving Optimal Anonymity in Transferable E-Cash with a Judge (Olivier Blazy, Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Hervé Sibert, Jacques Traoré), In AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa (Abderrahmane Nitaj, David Pointcheval, eds.), Springer, volume 6737, 2011.
|
[2] | Signatures on Randomizable Ciphertexts (Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud), In Conference on Practice and Theory in Public-Key Cryptography (PKC '11) (Dario Catalano, Nelly Fazio, Rosario Gennaro, Antonio Nicolosi, eds.), Springer, volume 6571, 2011.
|
|
[1] | Batch Groth-Sahai (Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud), In Conference on Applied Cryptography and Network Security (ACNS '10) (Jianying Zhou, Moti Yung, eds.), Springer, volume 6123, 2010.
|